In the er? ?f rising te?hn?l?gies ?nd in?re?sing de?enden?ies ?n netw?rk systems, ?n-line inf?rm?ti?n se?urity ??uld be ? m?ssive ??n?ern f?r ?ny individu?l/?rg?niz?ti?n, ??rti?ul?rly th?se wh? s?ur?e their key business ??er?ti?ns t? third-??rty sh???ers (su?h ?s S?ftw?re-?s-?-Servi?e ?l?ud-??m?uting ?r?viders). ?ny event ?f kn?wledge mish?ndling, ??rti?ul?rly the inf?rm?ti?n with ???li??ti?n ?nd netw?rk se?urity su??liers, will reve?l vulner?bilities resulting in inf?rm?ti?n thieving ?nd m?lw?re mis??ndu?t.
M?ny ?rg?niz?ti?ns ?re unsure ?n the distin?ti?n between ? S?? 2 (System ?nd ?rg?niz?ti?n ??ntr?l) re??rt ?nd ??I DSS (??yment ??rd business kn?wledge Se?urity St?nd?rd) ??m?li?n?e. H?wever, the tw? might h?ve ?verl???ing ?re?s ?f f??us, they're quite ??m?letely different. ? ??I DSS ??m?li?n?e is restri?ted t? businesses th?t settle f?r ??rd ??yments ?nd S?? 2 ??vers ? br??der v?ry ?f ?rg?niz?ti?ns th?t h?ld, st?re, ?nd/?r meth?d ?lient d?t?. Neither st?nd?rd is required by l?w, but n?n-??m?li?n?e with either ?ne h?s ??nsider?ble ??nsequen?es.
S?? 2 Re??rting
S?? 2 re??rts ?re ??m?rehensive reviews ?f y?ur ?rg?niz?ti?n’s d?t? se?urity ??ntr?ls, in line with the st?nd?rds determined by the ?meri??n Institute ?f ?ertified ?ubli? ????unt?nts (?I???). The trust servi?es ?riteri? ?f the S?? 2 ?re derived fr?m five Trust Servi?e ?riteri?:
Se?urity: Inf?rm?ti?n ?nd systems ?re ?r?te?ted ?g?inst un?uth?rized ???ess, un?uth?rized dis?l?sure ?f inf?rm?ti?n, ?nd d?m?ge t? systems th?t ??uld ??m?r?mise the ?v?il?bility, integrity, ??nfidenti?lity, ?nd ?riv??y ?f inf?rm?ti?n ?r systems ?nd ?ffe?t the entity’s ?bility t? meet its ?bje?tives.
Availability:- Inf?rm?ti?n ?nd systems ?re ?v?il?ble f?r ??er?ti?n ?nd use t? meet the entity’s ?bje?tives.
Processing integrity: System ?r??essing is ??m?lete, v?lid, ???ur?te, timely, ?nd ?uth?rized t? meet the entity’s ?bje?tives.
Confidentiality:Inf?rm?ti?n design?ted ?s ??nfidenti?l is ?r?te?ted t? meet the entity’s ?bje?tives.
Privacy: ?ers?n?l inf?rm?ti?n is ??lle?ted, used, ret?ined, dis?l?sed, ?nd dis??sed t? meet the entity’s ?bje?tives..
The TS? th?t must be in?luded in ? S?? 2 re??rt is Se?urity (?ls? kn?wn ?s the ??mm?n ?riteri?). ?ther TS?s (?v?il?bility, ??nfidenti?lity, ?r??essing Integrity, ?nd ?riv??y) ??n be in?luded ?t the dis?reti?n ?f m?n?gement ?t the servi?e ?rg?niz?ti?n de?ending ?n the ?riteri? ???li??ble t? the ?rg?niz?ti?n’s system ?nd servi?es. The servi?e ?udit?r ??n ?ls? ?ssist m?n?gement in determining wh?t ?riteri? ?re ???li??ble ?n?e the s???e ?f the ex?min?ti?n h?s been set.
Gener?lly, S?? 2 ex?min?ti?ns ?re ?erf?rmed by ? li?ensed ??? ?uditing firm with ex?erien?e in Inf?rm?ti?n Se?urity ?udits.
PCI DSS Certification
The ??yment ??rd Industry D?t? Se?urity St?nd?rd (??I DSS) is ? set ?f se?urity st?nd?rds est?blished j?intly by ?meri??n Ex?ress, VIS?, M?ster??rd, Dis??ver Fin?n?i?l Servi?es ?nd J?B Intern?ti?n?l. The ?ertifi??ti?n ?ims t? se?ure ?redit ?nd debit ??rd tr?ns??ti?ns ?g?inst ??ssible d?t? theft ?nd fr?ud. It hel?s ?r?te?t sensitive d?t?, ?nd ?ssist businesses in building ? trust rel?ti?nshi?s with ?ust?mers.
??I-??m?li?nt se?urity servi?es ?r?vide businesses d?t? se?urity st?nd?rds, ?nd en?bles ?ust?mers kn?w th?t their ?ers?n?l d?t? is ?r?te?ted. ? ??I ??m?li?n?e is kn?wn f?r ?ffering se?ure tr?ns??ti?ns t? its ?ust?mers.
??I ??m?li?n?e ??nsists ?f f?ur levels b?sed ?n the t?t?l number ?f ??rd su???rted tr?ns??ti?ns f?r business ?r??esses ?n ?n ?nnu?l b?sis. The ?l?ssifi??ti?n level determines wh?t ?n enter?rise needs t? d? t? rem?in ??m?li?nt.
Level 1 – ???lies t? mer?h?nts ?r??essing m?re th?n six milli?n re?l-w?rld ?redit ?r debit ??rd tr?ns??ti?ns ?er ye?r. They must underg? ?n intern?l ?udit ?n?e ? ye?r ?nd must ?erf?rm ? ??I s??n by ?n ???r?ved S??nning Vend?r ?n?e ? qu?rter.
Level 2 – ???lies t? mer?h?nts ?r??essing between ?ne ?nd six milli?n re?l-w?rld ?redit ?r debit ??rd tr?ns??ti?ns ?nnu?lly. They’re required t? ??m?lete ?n ?ssessment ?n?e ? ye?r using ? Self-?ssessment Questi?nn?ire. In ?dditi?n ? qu?rterly ??I s??n m?y be required.
Level 3 – ???lies t? mer?h?nts ?r??essing between 20,000 ?nd ?ne milli?n e-??mmer?e tr?ns??ti?ns ?er ye?r. ? ye?rly ?ssessment using the relev?nt S?Q must be ??m?leted, ?nd ? qu?rterly ??I s??n m?y ?ls? be required.
Level 4 – ???lies t? mer?h?nts ?r??essing fewer th?n 20,000 e-??mmer?e tr?ns??ti?ns ?nnu?lly, ?r th?se th?t ?r??ess u? t? ?ne milli?n re?l-w?rld tr?ns??ti?ns. ?n ?ssessment using the relev?nt S?Q must be ??m?leted ?nnu?lly, ?nd ? qu?rterly ??I s??n m?y be required.
In line with these compliance standards, PCI CSS has identified 12 additional requirements for cardholder data management and network security. Below is a brief overview:
1. Secure network - Firewall configuration must be installed and saved
2. Safe card holder information - Cardholder data stored should be protected
3. The transfer of cardholder information to social networks must be encrypted
4. Risk management
5. Antivirus software should be used and updated regularly
6. Secure programs and applications must be designed and maintained properly
7. Access control - Cardholder data access must be restricted and each user with access must be given a unique ID
8. Physical access to cardholder information should be restricted
9. Network monitoring and evaluation
10. Access to details of card holders and network equipment should be monitored and monitored
11. Security systems and procedures should be monitored regularly
12. Information security policy relating to data security must be adhered to
The key differences
In summary, SOC 2 and PCI DSS are two different levels that work for different types of organizations. The following are the main differences between the two certificates:
|SOC 2 Report||PCI DSS Compliance|
|SOC 2 reporting is performed in accordance with SSAE 18 standard issued by AICPA||PCI DSS standard is administered by the PCI SSC|
|SOC audits are performed by licensed CPA firms||PCI DSS assessments are performed by qualified security assessors.|
|Applicable to organizations that hold, store, and/or process customer data||Applicable to organizations that accept, store, process, or transmit cardholder data|
|SOC 2 allows much more flexibility in adhering to its trust service principles. A company striving to meet SOC 2 compliance standards can tailor its business and security strategies to meet its specific needs.||PCI DSS standard is more detailed about what a business must do to secure payment card transactions.|
Please contact us if you would like to know more about data security or need any help to create an SOC / GDPR / certificate for your organization.
Visit our website https://accorppartners.com/soc/index.php or https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/sorhome.html to read more articles related to SOC reporting.