Skip to main content

36 docs tagged with "compliance"

View all tags

Audit Principles and Concepts

There are quite a few auditing principles and concepts that might seem foreign to management or perhaps even an inexperienced service auditor.

Audit Procedures

Testing will occur for different criteria and controls that have been implemented by the service organization. For example the testing and evidence for availability will be different than that of privacy.

Bridge Letters

Your SOC 2 is only valid for a year after your audit. If you’re behind on renewing your SOC 2 report and it falls past the date in which it’s valid, you may need a SOC 2 bridge letter. In this guide, we’ll explain what a SOC 2 bridge letter is and the role it plays in maintaining trust with your customers as you renew your report.

CMMC Overview

Cybersecurity Maturity Model Certification - DoD Framework for Protecting Federal Contract Information and Controlled Unclassified Information

Compliance & Security Glossary

Comprehensive glossary of compliance, security, and GRC terminology including SOC 2, ISO 27001, GDPR, HIPAA, risk management, and audit-related terms and definitions

Conducting a SOC2 Audit

Guide to conducting a SOC 2 audit including communication strategies, audit procedures, documentation requirements, and best practices for successful compliance attestation

Documents

Share security documentation with Trust Center visitors

FAQ

No, a SOC 2 is not legally required by any organization. However, your customer may require you to obtain one in order to do business with you.

Frameworks

Display compliance certifications on your Trust Center

HIPAA Overview

Health Insurance Portability and Accountability Act - Protecting Health Information Privacy and Security

NIST CSF Overview

NIST Cybersecurity Framework - Identify, Protect, Detect, Respond, Recover

Overview

User groups and access management for compliance teams

Overview

Managing your controls within the Openlane platform

Overview

Evidence management for compliance programs and audit preparation

Overview

What a Program is and how to use it

Overview

Comprehensive guide to Cloud Controls Matrix (CCM) compliance, security controls, and risk management for cloud service providers

Overview

Comprehensive guide to CIS compliance including benchmarks, certification process, and implementation strategies for cybersecurity best practices

Overview

Overview of NIST 800-53 compliance including security controls, risk management framework, and implementation guidelines for federal information systems

Overview

Overview of SAMM compliance including maturity levels, assessment framework, and implementation strategies for software security

PCI-DSS Overview

Payment Card Industry Data Security Standard - Protecting Cardholder Data

Planning and Preparation

The below diagram does not depict all processes in an audit however it provides you with a high-level overview of what high level steps are involved in going through a SOC2 audit. Every auditing firm, consultant, and lead implementer will have its own processes and techniques for completing the audit.

Policies

Overview of policies and procedures within Openlane

SOC 2 Overview

Comprehensive guide to SOC 2 compliance including Trust Services Criteria, AICPA framework, implementation timeline, costs, and audit requirements for service organizations

SOC2 Framework Details

You should always refer to the published standard for details regarding the prescribed controls or implementation guidance. At the time of writing, the most current SOC 2 version is the 2017 with revised points of focus 2022. However, the below tables provide a high-level overview of the common criteria for each Trust Services Criteria (TSC) and the points of focus that should be used as guidance for convenience and easier readability.

Subcontrols

Granular sub-requirements and components within compliance controls

Trust Center Overview

Customer-facing portal for demonstrating your security posture and compliance status