The AICPA designed the Trust Services Criteria (TSC) to evaluate internal controls over the security, availability, processing integrity, confidentiality, or privacy of information and systems. The criteria was established in 2017 by the AICPA’s Assurance Services Executive Committee (ASEC) for use in SOC 2 audit and consulting engagements. Comprised of the following areas, each element measures compliance and efficiency within internal controls.
1. Security (Common Criteria) – According to the AICPA, the security (common criteria) establishes benchmarks for protecting information and systems against unauthorized access/disclosure of information and damage to systems. This highlights particular damages that could compromise the availability, integrity, confidentiality, and privacy of information or systems and affect a company’s ability to achieve its objectives.
This criteria also incorporates the COSO framework that helps organizations implement internal controls in an effort to operate ethically and in compliance with industry standards. The security (common criteria) acts as a foundation for internal controls from which additional criteria can be applied.
For example, a common control in achieving the security criteria is for “employees to undergo regular security trainings.” In the event the “privacy” criteria is also in scope, we would expect these trainings to cover privacy topics as well.
2. Availability – The availability criteria, according to the AICPA, is used to promote information and systems that are available for operation and accessible to meet an organization’s objectives.
3. Confidentiality – According to the AICPA, the confidentiality criteria is utilized to ensure controls are designed to protect confidential information. This is not to be confused with the privacy criteria, which is discussed below.
Instead, confidentiality addresses an organization’s ability to protect information throughout its lifecycle—from collecting or creating to final disposition and removal from a company’s control.
Confidential information is that which must be protected through limited access, retained securely and restricted from disclosure. This criteria follows requirements outlined in laws/regulations or contracts/agreements that contain commitments made to customers and other stakeholders.
4. Processing Integrity – This criteria is used to measure whether systems process data completely, accurately and timely to meet a company’s objectives.
The processing integrity criteria addresses whether systems achieve the purpose and intention for which they are provisioned and that they operate in an unimpaired manner, according to the AICPA.
5. Privacy – This criteria demonstrates that personal information is collected, used, retained, disclosed and disposed of to meet an organization’s objectives.
The privacy criteria applies only to personal information; whereas confidentiality can apply to various types of sensitive information, as noted above.
Of the five TSCs, only the security (common criteria) is required. Determining which of the other criteria to use should begin with an organization identifying relevant servers and system boundaries through a scoping exercise.
Knowing that SOC 2 reports intend to provide assurance over an organization’s ability to meet service commitments, it’s helpful for organizations to map out its existing service commitments when selecting the applicable, in-scope TSC. This involves reviewing service-level commitments, master service agreements, and other contracting vehicles and terms of service.
For example, an organization that makes a commitment to “system up-time” should include the availability TSC. Those companies that handle Personally Identifiable Information (PII) should include the privacy TSC.
Once the applicable scope is established, organizations can begin setting up controls to meet the relevant criteria. SOC 2, unlike other frameworks, does not establish a standard set of controls. Rather, organizations must design and implement controls to ensure it meets the requirements listed in the applicable criteria. But while specific controls may vary, there are some common SOC 2 controls that organizations typically implement across these areas.
The SOC 2 TSC provides guidance for organizations as it designs its controls. Aligning with TSC helps organizations maintain robust information security practices and be ready for a SOC 2 audit. The team at Sikich can help your organization go through the steps to achieving compliance with a SOC 2 audit and the proper TSC benchmarks. Please contact us to talk about building your TSC framework or enhancing your existing audit processes.
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.