Wednesday, August 6, 2014

Third Party Risk Management: Attestations

Third Party Risk Management:  Attestations

Third party risk management is an area of increasing concern for most organizations today.  The growing adoption of IT services provided by third parties, combined with stricter regulatory and compliance requirements for managing third party risks, as well as the increasing publicity of attacks resulting from third party risks is causing most organizations to review their third party risk management programs.  There are many facets to managing third party risks, but one area that I will cover in this article is third party security attestations.  Some day, we will get to a point where service providers have implemented continuous monitoring, and are able to share the near real time information about the security of their service with customers.  However, we aren’t there yet, and organizations that need to assess the risk of using a third party will likely have to rely upon some type of attestation.

There are various types of attestations that an organization can provide to explain the information security program that protects the confidentiality, integrity and availability of the service (including the customer data stored, processed or transmitted) provided to customers.

In the simplest case, a service provider can make a simple statement “we have a strong security program”, however, as an attestation, this has very little value, and organizations would be wise to avoid accepting such statements.  To have credibility, the attestation should come from an independent third party rather than the service provider.  The need for this independent, third party attestation has resulted in several programs such as ISO-27001 certification, SAS-70, SSAE-16,  SOC-2, and SOC-3.  Some people include the PCI DSS Report on Compliance (ROC) as a form of attestation, but because of the tight focus and scoping on payment card data, the PCI DSS ROC may not be adequate for many organizations, unless they are solely focused on the security of payment card data.

Let’s dig into some of these attestations a bit:

ISO-27001 certification

The ISO 27000 family of standards is focused on information security.  The core of the family defines an “information security management system” ISMS as the program necessary to ensure the confidentiality, integrity and availability of an organization’s information assets.  An organization can seek certification under ISO-27001 in which an approved auditing organization will validate that the organization has an ISMS that is compliant with ISO-27001. 
It is important to understand that if you rely upon a service provider’s ISO-27001 certification, all you will see is a one page piece of paper that states that the organization was certified by the auditing firm.  You won’t learn anything about the specific security controls that the organization has in place.  Still, it is an attestation that the organization has an ISO-27001 certified ISMS.  Note that ISO-27001 certifications are typically valid for three years, which is quite a long time in the dynamic world of IT.

SAS-70 and SSAE-16

Prior to the adoption of the Statement on Standards for Attestation Engagements (SSAE-16) standard and the Service Organization Control (SOC) reports, many service organizations relied upon the Statement on Auditing Standards Number 70, also known as the SAS-70, to provide a description of controls in place, and a third party audit of the suitability of the design of the controls to achieve the specified control objectives.
In June of 2011, the SSAE-16 standard replaced the SAS-70 standard.  The SAS-70 is a retired standard, and as such, it should no longer be used.
The SSAE-16 standard, a US based standard created by the American Institute of Certified Public Accountants (AICPA), was designed to be compatible with the international standard ISAE 3402, which was released in December of 2009.

SOC Report Types


SOC reports can be either a type I or type II reports.  The simplest way to explain the difference between the type I and type II reports is to examine the time period for which the audit examined the controls.

Type I Report

Type I report:  a point in time report.  From the AICPA web site: “report on the fairness of the presentation of management’s description of the service organization’s system and the suitability of the design of the controls to achieve the related control objectives included in the description as of a specified date.

Type II Report

Type II report:  a report covering a specific period of time, typically either six months or one year.  From the AICPA web site:  report on the fairness of the presentation of management’s description of the service organization’s system and the suitability of the design and operating effectiveness of the controls to achieve the related control objectives included in the description throughout a specified period.

Based upon these definitions, it should be clear why most organizations prefer a type II report from their service providers as opposed to a type I report.  Type II reports require that the audit team review evidence throughout the time period of the report to ensure the control’s implementation.  It would be much easier to complete a type I audit, as all you have to do is show that the control was in place on the day the auditor was present.

Note that because the Type II report is an attestation of the implementation of controls over a period of time, it is always a “look back” report, meaning that the report covers a period of time in the past.  It’s not possible to report on the presence of a control for a future time period.  Keep that in mind if someone asks “Why is this report for last year?” or “This is good but where is the report for this year?”.

SOC 1, SOC 2, SOC 3


As described above, there are type I reports and type II reports, but there are also three different kinds of SOC reports:  SOC 1, SOC 2 and SOC 3.

SOC 1

SOC 1 reports are based upon the SSAE-16/ISAE-3402 standards.  The SOC 1 report replaces the SAS-70, and is intended to evaluate controls over an organization’s IT systems that are material for financial statements.  It is not intended to attest to the controls related to general security, integrity, availability or privacy.

SOC 1 Reports are intended for a very limited distribution.  The report includes details about the controls that management has decided to report.  The report is typically classified as a confidential document and is not shared with external parties unless under terms of non-disclosure.

Because of the very limited focus of a SOC 1 report to IT systems that are material for financial statements, they are not generally speaking well suited for most organizations seeking attestation of a service provider's security for a given service.

SOC 2

SOC 2 reports are based on the AT-101 Trust Service Principals.  There are five TSPs:  Security, Availability, Confidentiality, Processing Integrity, and Privacy.  An organization determines which of the 5 TSPs are appropriate for its SOC 2 audit.  Some service provider organizations may include all five TSPs, while others may use a sub set of the TSPs.  Service provider organizations select the TSPs that they believe are most appropriate for the services they provide.  As a customer, or potential customer of the service provider, you should evaluate if the selected TSPs are appropriate for your use of the service.

In a SOC 1 report, the organization determines which the controls it feels are appropriate, and the accounting firm checks to see if the controls were in place over the reporting period.  The auditing firm does not issue an opinion about the appropriateness of the controls.  The SOC 2’s TSPs have defined criteria, and the audit checks to ensure that the control activities implemented by the service provider are adequate to meet the requirements of the Trust Service Principle criteria. 

Because the SOC 2 audit focuses on defined Trust Service Principle criteria, many people believe it is more appropriate for cloud service providers as an attestation of the service provider’s controls over their systems.  For example, in the Security TSP, one of the criteria is “1.0 Policies:  The entity defines and documents its polices for the security of its system.”  While not likely, it is possible to have a SOC 1 report that doesn’t include anything about security policies.

Like the SOC 1 report, a SOC 2 report is not intended for public distribution.  The report includes details about the controls in place to meet the principles and criteria of the Trust Service Principle(s).  The report is typically classified as a confidential document and is not shared with external parties unless under terms of non-disclosure.

The SOC 2 is widely understood to be the attestation of choice for cloud service providers.  The Cloud Security Alliance released a paper in February of 2013 stating that the SOC 2 is likely the best attestation for most users of cloud services.

SOC 3

The SOC 3 report is a short report that is intended for wide distribution.  It provides an attestation that the service provider’s controls meet the requirements to satisfy the stated Trust Service Principles.

In addition to a report, the SOC 3 seal is often displayed on the service provider’s web site, as a public statement of the provider’s achievement in meeting the requirements of the stated Trust Service.

The SOC 3 report does not provide information about the controls the service provider implemented to meet the requirements of the stated Trust Service Principles.

Summary

I hope this summary has been helpful.  Here are some short takeaways to remember:

  • SAS-70 is a retired standard that has been replaced by the SSAE-16 standard.  Let’s stop using the SAS-70 standard in contracts and other documents.  It’s been over three years, time to let it go.
  • ISO-27001 certification is a good indicator that an organization has an information security program, but you won’t learn much about the specific security controls that are used, and since the certifications are valid for three years, it isn’t very timely.
  • SOC-2 reports are most likely the most appropriate attestation report for a service provider at this time, although adoption by service providers is still lagging.  Part of the reason for this is that the switch from a SOC 1 to SOC 2 is often a multi-year process.
  • If your service provider hasn’t yet adopted the SOC-2, you should ask them when they expect to move to it.  It could take some time, but they should be moving toward the SOC-2.



11 comments:

  1. Thank you for more detailed information very well written Third Party Risk Management Software. especially about the features or benefits a Third Party Risk Management Software should provide Improve business productivity while mitigating the risk and costs of growing volumes of content.

    ReplyDelete
  2. Thanks for give me this information really this product is very effective.

    iso 27000 certification

    ReplyDelete
  3. Thanks for sharing this wonderful knowledge here. This is very important, Very good explanation. keep sharing this.Soc 2 Process Definition India

    ReplyDelete
  4. Great post. this article is meaningful and very important for me. thank for sharing this amazing post. we also provide Soc 2 Process Definition India. for more information visit on our website.

    ReplyDelete
  5. You have provided valuable data for us. It is great and informative for everyone. Keep posting always. I am very thankful to you. Read more info about Iso Consultant in Dubai

    ReplyDelete
  6. Very good, This information is essential and informative which you have shared here. It is beneficial for beginners to develop their knowledge. It is very gainful information. Thanks for share it. Read more info about International type approval Consulting

    ReplyDelete
  7. Nice info, I am very thankful to you that you have shared this special information with us. I got some different kind of knowledge from your web page, and it is really helpful for everyone. Thanks for share it. Read more info about apics certification

    ReplyDelete
  8. You have given essential data for us. about ISO 45001 certification in UAE It is excellent and good for everyone. Keep posting always. I am very thankful to you.

    ReplyDelete
  9. Loads of significant information can be taken from your article about a sleeping pad. I'm glad that you have imparted extraordinary data to us, It is a productive article for us. Grateful to you for sharing an article like this.Iso 27001 Implementation Chennai

    ReplyDelete
  10. Third-party risk management is a critical but often overlooked part of project execution. Courses like the Top Project Management Course in Dubai, UAE offer deep dives into risk assessment, vendor evaluation, and compliance strategies—equipping project managers with tools to handle external dependencies confidently and protect project outcomes.

    ReplyDelete
  11. Third-party risk management is such a critical topic! This post on attestations nails its importance for secure projects. The Best Project Management Seminar in Dubai, UAE could provide more strategies for managing risks effectively. Great read!

    ReplyDelete