PROACTIVE RISK
  • RESOURCES
    • Tech News
    • Blog
    • Events - Meet-Up
    • Guides | Tools
    • Videos
    • Gorilla
  • Careers
  • SOLUTIONS
    • Policies and Plans
    • Staffing
    • MeasureRISK® GRC >
      • HIPAA
      • CCPA
      • SOC2
      • NIST CSF
      • CMMC
      • Login
    • MonitorIT®
    • PhishIT®
    • CATSCAN®
    • ProtectIT®
    • ManageIT®
    • PENTESTON®
    • FINDIT®
    • Threat Modeling
    • Domains | DNS
    • Software Development
  • About Us
    • Our Manifesto
    • Capabilities Summary
    • Join the Team
    • Terms of Service
    • Contact Us

What is SOC 2

SOC 2—System and Organization Controls 2—establishes criteria to help your organization manage and protect sensitive customer data. The American Institute of CPAs (AICPA) developed SOC 2 criteria for reporting and auditing processes, which are based on five trust service criteria (TSC):
  • Security
  • Availability
  • Processing integrity
  • Confidentiality
  • Privacy
Unlike more stringent frameworks such as the Cybersecurity Maturity Model Certification (CMMC) or PCI DSS, SOC 2 is not a regulatory requirement. However, demonstrating your organization meets SOC 2 criteria is a great way to show your customers, partners, and key stakeholders that your company values and applies SOC 2 standards for product or service delivery. And many organizations submit themselves to SOC 2 audits to provide attestations of compliance to their customers.

Contact Info

Proactive Risk Inc.
759 Bloomfield Ave #172
West Caldwell, NJ 07006
Tel: +1 (973)298-1160
Web: www.proactiverisk.com
eMail: sales(at)proactiverisk.com

Veteran Owned and Operated
Contact Us
Picture
© COPYRIGHT 2021. ALL RIGHTS RESERVED.
  • RESOURCES
    • Tech News
    • Blog
    • Events - Meet-Up
    • Guides | Tools
    • Videos
    • Gorilla
  • Careers
  • SOLUTIONS
    • Policies and Plans
    • Staffing
    • MeasureRISK® GRC >
      • HIPAA
      • CCPA
      • SOC2
      • NIST CSF
      • CMMC
      • Login
    • MonitorIT®
    • PhishIT®
    • CATSCAN®
    • ProtectIT®
    • ManageIT®
    • PENTESTON®
    • FINDIT®
    • Threat Modeling
    • Domains | DNS
    • Software Development
  • About Us
    • Our Manifesto
    • Capabilities Summary
    • Join the Team
    • Terms of Service
    • Contact Us