Compass IT Compliance Blog / IT Audit (2)

AT 101 SOC 2 Report: What is a Section III?

castle-979597_640.jpg

In the last couple of posts, we talked about how an AT 101 SOC 2 report differs from a SOC 1 and SOC 3 report and also what the differences are between a SOC 2 Type I and Type II report. In this post, we are going to continue dissecting the different terminology and components of the …

Read Story

SSAE 16 SOC 2: Differences Between Type I and Type II Reports

paper-3224638_1920

One of the challenges that we have when it comes to consulting with our clients on SSAE 16 is the confusion that comes with the different reports and types of reports. In last weeks blog post, we outlined what the key differences are between a SOC 1, SOC 2, and a SOC 3 report. This we …

Read Story

SSAE 16 SOC 2 Reports: How Are They Different From Other SOC Reports?

SSAE16_Wordcloud.jpg

Fact: More and more organizations are outsourcing business functions to third party providers so they can concentrate on their core business functions, reduce headcount, and ultimately save money. A great example of this is what is called Business Process Outsourcing (BPO) where compa …

Read Story

IT Risk Assessment and the SANS Top 20 - Part IV

IT Risk Assessment and the SANS Top 20 - Part IV

I know, I know. Before you even say it, they are called the Center for Internet Security Critical Security Controls, not the SANS Top 20 anymore. But, everyone knows them as the SANS Top 20 and often times still refers to them by this name which is why I stuck with it for the final pa …

Read Story

IT Risk Assessment and the SANS Top 20 - Part I

Black and red cartoon bugs attack code

Last week we discussed the SANS Top 20 Critical Security Controls (CSC), what they are, and where they came from. This week we are going to start to dig into a handful of the Critical Security Controls to discuss what they are and why these controls are so important. In fact, industry …

Read Story

FFIEC Guidance: Revision vs. Update

FFIEC Guidance: Revision vs. Update

When it comes to technology, we hear of terms that are often times confused and interchanged. Some examples of these terms might include Vulnerability Scanning and Penetration Testing. Another example might be the age old debate of Risk Assessment versus Audit. While seemingly similar …

Read Story

Subscribe by email