Software

Gain a 360-degree view of third-party risk by using our SaaS software to centralize, track, automate, assess and report on your vendors. 

Managed Services

Let us handle the manual labor of third-party risk management by collaborating with our experts to reduce the workload and mature your program. 

Overview
Document Collection
Policy/Program Template/Consulting
Virtual Vendor Management Office
Vendor Site Audit

Ongoing Monitoring

Let us handle the manual labor of third-party risk management by collaborating with our experts.

VX LP Sequence USE FOR CORPORATE SITE-thumb
Venminder Exchange

As Venminder completes assessments for clients on new vendors, they are then made available inside the Venminder Exchange for you to preview scores and purchase as you need.

CREATE FREE ACCOUNT

Use Cases

Learn more on how customers are using Venminder to transform their third-party risk management programs. 

Industries

Venminder is used by organizations of all sizes in all industries to mitigate vendor risk and streamline processes

Why Venminder

We focus on the needs of our customers by working closely and creating a collaborative partnership

1.7.2020-what-is-a-third-party-risk-assessment-FEATURED
Sample Vendor Risk Assessments

Venminder experts complete 30,000 vendor risk assessments annually. Download samples to see how outsourcing to Venminder can reduce your workload.

DOWNLOAD SAMPLES

Resources

Trends, best practices and insights to keep you current in your knowledge of third-party risk.

Webinars

Earn CPE credit and stay current on the latest best practices and trends in third-party risk management.  

See Upcoming Webinars

On-Demand Webinars

 

Community

Join a free community dedicated to third-party risk professionals where you can network with your peers. 

Weekly Newsletter

Receive the popular Third Party Thursday newsletter into your inbox every Thursday with the latest and greatest updates.

Subscribe

 

Venminder Samples

Download samples of Venminder's vendor risk assessments and see how we can help reduce the workload. 

resources-whitepaper-state-of-third-party-risk-management-2023
State of Third-Party Risk Management 2023!

Venminder's seventh annual whitepaper provides insight from a variety of surveyed individuals into how organizations manage third-party risk today.

DOWNLOAD NOW

The Finer Points of a Third-Party Vendor's SOC 2 Report

4 min read
Featured Image

Technology vendors, such as data centers, cloud service providers, and credit card processors, must be assessed as part of an organization’s overall third-party risk management (TPRM) program. A third-party vendor’s SOC 2 report is an essential due diligence element that reveals details about a vendor’s control environment related to one or more of the five Trust Services Criteria – security, availability, processing integrity, confidentiality, and privacy.

This report is conducted by an independent certified public accountant (CPA) who provides an attestation on the vendor’s controls. A SOC 2 Type I report covers the control environment over a single point in time, while a SOC 2 Type II report covers a period of time, typically 6-12 months. There’s also a SOC 2+ report, which expands upon the basic model of a SOC 2 report and evaluates whether a vendor’s controls follow specific compliance requirements.

Reviewing a third-party vendor’s SOC 2 report helps give your organization confidence that your sensitive data is protected, even when it’s stored or handled by a third party. These reviews should be conducted by someone with ample knowledge in information security. Some credentials that can give you a level of confidence that the reviewer is experienced are CISM, CISA, CTPRP, CISSP, etc. 

Here’s an overview of the main components of a third-party vendor’s SOC 2 report and some tips on what to look for as you review this document.

Main Components of a Third-Party Vendor’s SOC 2 Report


SOC 2 reports are generally structured in a similar format, making it easier to find the specific information you need. Each section can offer valuable insights into your vendor's security practices and controls. 

finer points third-party vendor soc 2 report

The main SOC 2 sections will cover the following topics: 

  • Independent Service Auditor’s Report – This section states the auditor’s opinion of the vendor’s control environment, which may be one of these four types:
    • Unqualified opinion – The auditor is confident that the vendor’s controls are accurately described and suitably designed. This opinion in a Type II report also means the controls are operating effectively. 
    • Qualified opinion – The auditor found one or more controls that were not operating effectively or as designed.
    • Disclaimer – There was no evidence to prove or disprove whether a control was implemented or effective.
    • Adverse opinion – Words like “misrepresentation” or “inadequate” are red flags that point to inaccuracies or weaknesses in the vendor’s control environment. An adverse opinion indicates the vendor held back and/or modified information about whether its controls were in place or operating effectively. 
  • Management’s Assertion – This is where your vendor’s management team describes its system and control environment and states how its controls are intended to work. Management’s assertion may contain exclusionary language, such as “except for” or “not including,” which should warrant additional scrutiny. The SOC 2 report describes whether the auditor agrees or disagrees with management’s assertion. 
  • Description of System and Controls – A vendor SOC 2 report will contain a lot of valuable information in this section, such as a description of its subservice providers (fourth parties), details about its controls, and complementary user entity controls (CUECs). CUECs are the controls that the user (your organization) must implement to ensure the vendor’s controls objectives are met. For example, the vendor may state that the user must have procedures in place to ensure transactions are appropriately authorized.   
  • Testing Matrix – This section of a third-party vendor’s SOC 2 report covers the vendor’s testing of controls and evaluating results that are related to applicable Trust Services Criteria. Vendors can choose to be audited on one or more of the following criteria: 
    • Security – Is the vendor’s system protected against unauthorized access?
    • Availability – Is the vendor’s system available for operation as promised, contractually or otherwise?
    • Processing Integrity – Is the vendor’s system accurate and trustworthy?
    • Confidentiality – Is customer information protected?
    • Privacy – Is nonpublic personal information (NPI) collected, used, retained, disclosed, and destroyed in accordance with the vendor’s privacy policy? 
    Not all of the Trust Services Criteria will apply to every vendor, so it’s not necessarily a red flag if the vendor chooses not to be audited on every criterion. This is largely dependent on the vendor’s product or service. 

Understanding the basics of a vendor SOC 2 report and how to evaluate one effectively is an important skill to master in third-party risk management. Reviewing these reports as part of your initial and ongoing due diligence will help ensure your organization is continuing to mitigate third-party risk. 

Subscribe to Venminder

Get expert insights straight to your inbox.

Ready to Get Started?

Schedule a personalized solution demonstration to see if Venminder is a fit for you.

Request a Demo