Discover key SOC 2 Type II compliance terms and practices, including controls, audit evidence, access management, and vendor due diligence. This quiz is designed for those seeking a simple yet thorough understanding of SOC 2 fundamentals.
What is a “control owner” responsible for during a SOC 2 Type II audit?
Explanation: A control owner is responsible for making sure the assigned control operates as designed and that supporting evidence is available for audit review. Drafting reports and interviewing employees are typically handled by auditors or managers. Setting audit deadlines is a project management activity, not the core responsibility of a control owner.
What is “audit readiness” in simple terms?
Explanation: Audit readiness means being fully prepared with documented controls and evidence ahead of time, making the audit process smoother. Delivering evidence late or delaying controls does not help readiness, while unrestricted file access may not be secure or necessary.
What is a “walkthrough” in an audit?
Explanation: An audit walkthrough involves showing the auditor each step of a process to prove a control is operating. It is not about system testing, password updates, or administrative reminders, which are unrelated to walkthroughs.
What is an “audit trail” in SOC 2 compliance?
Explanation: An audit trail tracks system or process activity to provide transparency and accountability. Completed audits and audit schedules are documentation, not audit trails, and financial reports serve a different purpose.
Why do auditors ask for “approval evidence” in access and change controls?
Explanation: Auditors review approval evidence to verify that changes or access were properly authorized to prevent unauthorized activity. Productivity, password strength, and data accuracy are not the main reasons approval evidence is collected.
What is “joiner-mover-leaver (JML)” related to in SOC 2 compliance?
Explanation: JML ensures user access is appropriately provisioned and deprovisioned during employee lifecycle changes. Payroll, training, and vendor evaluation are separate compliance activities not covered by JML processes.
What does “centralized identity” mean, and why is it useful?
Explanation: Centralized identity, such as Single Sign-On, allows user management from one platform, making access consistent and more secure. Password policies and data storage are different topics, and letting users pick any method can undermine consistency.
What is “key rotation” and why is it relevant for SOC 2?
Explanation: Key rotation is about shifting to new cryptographic keys to minimize risks if older keys are compromised. Account renaming, email deletion, and data storage practices are not related to key rotation.
What is “data classification” in the context of SOC 2 compliance?
Explanation: Data classification involves assigning sensitivity labels to data to ensure suitable controls are used. Prediction, encoding, and organizational methods are different from data classification’s intent.
What is the goal of “vendor due diligence” for SOC 2 compliance?
Explanation: Vendor due diligence is performed to ensure outside providers follow security requirements before relying on their services. Expense reduction, employee morale, and billing are unrelated to the compliance goals of vendor assessment.