Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
The SOC 2 audit: What, how, and why?
#1
Exclamation 
Quote:
[Image: soc2-audit-featured.jpg]

As you may already know from Eugene Kaspersky’s blog or our official press release, we recently passed our SOC 2 audit. In case you do not know what that is and why it was necessary, we will fill in the details now.

What is an SOC 2 audit?

The Service and Organization Controls 2 (SOC 2) is an audit of control procedures at IT organizations that provide services. In essence, it is an international reporting standard for cybersecurity risk management systems. This standard, developed by the American Institute of Certified Public Accountants (AICPA), was updated in March 2018.

This post is about the SOC 2 Type 1 audit (which we passed), which certifies that security control mechanisms have been effectively established in a single system. That is, third-party auditors came to us and examined our risk-management system, looking at what practices we have implemented, how closely we follow the stated procedures, and how we record changes in the process.

Why do we need to undergo audits?

Any company that provides any services has the potential to pose a threat to its customers. Even a totally legitimate company could become a link in a supply chain through which an attack is conducted. But companies working in the field of information security have an even greater responsibility: Their products must be allowed the highest level of access to user information systems.

Therefore, from time to time, customers, particularly large corporations, may have legitimate questions, such as: How much can we trust these services? What kind of internal policies do we have for the services we use? Could someone harm us with their products or corresponding services?

Here’s the twist: The answers we provide do not matter, because the answers we, or any company, provide can always sound convincing. That’s why we turn to external auditors for an outside expert opinion. It is important to us that our customers and partners have no doubt our products and services are reliable. We also believe that it is important that our internal processes comply with international standards and best practices.

What did the auditors examine?

The biggest concern is always the mechanism for delivering information to client computers. Our solutions cover various market segments and industries, and most of them use an antivirus engine as a core defensive technology to scan objects for signs of cyberthreats. Among its many technologies, the engine uses superfast hashes, emulation in an isolated environment, and machine-learning mathematical models that are highly mutation-resistant, all of which require regular updates of antivirus databases to be effective against modern cyberthreats.

Independent auditors have studied our system for managing those databases and our methods for monitoring the integrity and authenticity of updates for antivirus product databases for Windows and Unix servers. They ascertained that our control methods are functioning correctly, and they also checked the development and release process of antivirus databases for any possibilities of unauthorized tampering.

How did they conduct their study?

The auditors look at how vendor processes comply with each of the five fundamental principles of security: protection (is the process protected against unauthorized access?), availability (is the process generally functional?), process integrity (is the data delivered to the client kept safe?), confidentiality (can anyone else access this data?), and privacy (is personal data stored on our side, and if so, then how?)

In our case, the auditors examined:

* What our services offer,

* How our systems interact with users and potential partners,

* How we implement process control, and what its limitations are,

* What control tools users have, and how they interact with our control tools,

* What risks our service faces, and what control tools minimize these risks.
Continue Reading
[-] The following 1 user says Thank You to harlan4096 for this post:
  • silversurfer
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
GFYI [Official] EaseUS Data Recovery Wi...
Congratulations to a...jAcos — 12:53
GFYI [Official] Wise Video Converter Pr...
Congratulations to a...jAcos — 12:46
Mozilla Firefox 125 brings text highligh...
Mozilla is set to ...harlan4096 — 10:53
AV-Comparatives - Real-World Protection ...
Introduction Th...harlan4096 — 09:14
AV-Comparatives - Malware Protection Tes...
AV-Comparatives - M...harlan4096 — 09:10

[-]
Birthdays
Today's Birthdays
avatar (48)fuspeukChark
avatar (42)werriewWaiNg
avatar (36)Freemanleo
Upcoming Birthdays
avatar (43)wapedDow
avatar (47)oapedDow
avatar (40)Sanchowogy
avatar (42)techlignub
avatar (41)Stevenmam
avatar (48)onlinbah
avatar (49)steakelask
avatar (43)Termoplenka
avatar (41)bycoPaist
avatar (47)pieloKat
avatar (41)ilyagNeexy
avatar (49)donitascene
avatar (49)Toligo
avatar (36)RobertUtelt

[-]
Online Staff
There are no staff members currently online.

>