Data security (SOC 2)
Introduction
SOC 2 (Service Organisation Control Type 2) is a cybersecurity framework that assesses how well a service organisation protects client data.
Purpose
Developed by the American Institute of Certified Public Accountants (AICPA), the purpose of SOC 2 is to:
- Ensure that client data is handled securely by third-party service providers 
- Build trust between a company and its customers 
- Demonstrate a company's maturity in handling customer data 
The SOC 2 report
The SOC 2 report evaluates controls against the Trust Services Criteria, focusing on controls in five categories:
The Patchworks SOC 2 report is available upon request.
Security
Information and systems are protected against unauthorised access/disclosure, and damage to the system that could compromise availability, confidentiality, integrity and privacy. Protections include:
- Firewalls 
- Intrusion detection 
- Multi-factor authentication 
Availability
Systems, tools, and processes are in place to ensure systems are available for operational use. These include:
- Performance monitoring 
- Disaster recovery 
- Incident handling 
Confidentiality
Systems, tools, and processes are in place to ensure information is protected and available on a legitimate, need-to-know basis (applies to various types of sensitive information). These include:
- Encryption 
- Access controls 
- Firewalls 
Processing integrity
Resources, tools and processes are in place to ensure system processing is complete, valid, accurate, timely and authorised. These include
- Quality assurance 
- Process monitoring 
- Adherence to principle 
Privacy
Systems, tools, and processes are in place to ensure personal information is collected, used, retained, disclosed and disposed of according to policy (privacy applies only to personal information). These include:
- Access control 
- Multi-factor authentication 
- Encryption 
Last updated
Was this helpful?
