Explore the key terms and concepts critical to achieving and maintaining SOC 2 Type II compliance, from service commitments to automated monitoring. This quiz covers foundational knowledge ideal for professionals new to SOC 2.
What is a “service commitment” in the context of SOC 2 compliance?
Explanation: Service commitments in SOC 2 are promises or assurances made to customers about critical aspects like security and data protection, which the controls must help achieve. Legal contracts for auditor reviews, technical development documents, and financial statements are unrelated to service commitments in this context.
Which best describes a “system requirement” in SOC 2?
Explanation: SOC 2 system requirements are the operational or technical needs that help an organization fulfill its service commitments. Password policies, license agreements, and marketing goals are not considered system requirements in the SOC 2 context.
What is meant by “control precision” in SOC 2 compliance, and why is it important?
Explanation: Control precision refers to how accurately a control can detect or prevent errors, helping to lower potential risk gaps. Longevity, cost, and review frequency are not directly related to the precision or effectiveness of the control.
How do manual controls differ from automated controls in SOC 2 programs?
Explanation: Manual controls depend on human execution, whereas automated controls are executed by automated systems without direct human action. Legal requirements, process types, and likelihood of failure do not define the distinction between these control types.
What is a “compensating control” in SOC 2 when a primary control is not effective?
Explanation: A compensating control is an alternative measure used to mitigate risks when the primary control does not work as intended. Financial backups, documentation, or training sessions are not the definition of compensating controls in SOC 2.
What does “evidence integrity” mean in the context of SOC 2 compliance?
Explanation: Evidence integrity means the evidence is trustworthy, unaltered, and accurately shows what happened in the system. Collection frequency, file size, and team lists are not aspects of evidence integrity.
What is involved in “access recertification effectiveness testing” for SOC 2?
Explanation: This process involves checking that access reviews happen as scheduled and that any issues found are addressed. Granting temporary access, long-term archiving, and random password changes are unrelated to recertification effectiveness.
What is the purpose of “data integrity validation” within processing controls?
Explanation: Data integrity validation verifies that data has not been changed or corrupted, so it stays accurate as it's processed or transferred. Backups, encryption, and physical security relate to other aspects, not directly to data integrity validation.
What does “control environment maturity” indicate in SOC 2 compliance?
Explanation: Maturity refers to how robust and well-established the organization's control-related values and oversight are. Control revision frequency, system age, and quantity do not by themselves indicate maturity.
What does “continuous monitoring automation” mean in advanced SOC 2 programs?
Explanation: Continuous monitoring automation involves leveraging technology to actively monitor controls without waiting for scheduled audits. External assessments, frequent manual reviews, or offline logs are not automation nor real-time activities.