Looking for

An Experienced Auditor

With a lot of experience in audit, hiring us will become a proper solution for your business!

Trusted Clients
Years of Experience
  • Kick off Deck
  • Project plan (Timelines and detailed deliverables based on identified objectives)
  • Performing gap analysis for identified objectives and also SOC controls and risks. Provide solution for identified gaps
  • Control design and documentation
  • Perform testing and share final issue log
  • Draft SOC Report
  • Final SOC report

Let’s start by connecting


This Stream includes all of our Case Studies Flipbooks

  • Sitrion Case Study

    SOC Audit Case Study for a Payroll Process

    This query has been heard many times by different organization that -What is SOC 1 report?

    View Case Study
  • Sitrion Case Study

    ABC Ltd - SOC 2 Readiness Assessment Case Study

    ABC Ltd provides hosted platforms services using secure and reliable cloud technologies.ABC contacted the Accorp Partners in July 2020 as ABC had been asked by one of their US clients to undergo a SOC 2 Type 1 audit in line with the AICPA Trust Services Criteria. The AICPA Trust Services Criteria and the subsequent audit examines and reports on controls at a service organization relevant to security, availability, processing integrity, confidentiality and privacy.

    View Case Study

FAQ Related to SOC 2

SOC 1 financial reporting controls
  1. Financial services – Custodial services
  2. Healthcare claims processing
  3. Payroll processing
  4. Payment Processing
  1. Cloud ERP service
  2. Data center colocation
  3. IT systems management

SOC 2/SOC 3 operational controls

  1. Enterprise cloud e-mail
  2. Cloud collaboration
  3. Software-as-a-service-(SaaS)- based HR services
  4. SaaS enterprise system housing third-party data
  5. Any service where topics such as security, availability, and privacy are areas of concern
Domain Trust Services Principle Applicability
Security Under this Trust service principle, the SOC scoped IT system and Business services are protected against unauthorized access that addresses physical and logical both ways of access.
  1. Most commonly requested area of coverage
  2. Security Criteria are also incorporated into the other Principles because security controls provide a foundation for the other domains
  3. Applicable to all outsourced environments, particularly where enterprise users require assurance regarding the service provider’s security controls for any system, nonfinancial or financial
Availability This trust service principle ensure that the IT and Business system should be available for operation and provide services as committed or agreed with the client and respected stake holders.
  1. Second most commonly requested area of coverage, particularly where disaster recovery is provided as part of the standard service offering
  2. Most applicable where enterprise users require assurance regarding processes to achieve system availability SLAs as well as disaster recovery which cannot be covered as part of SAS 70 or SOC 1 reports
Confidentiality This trust service principle addresses that the Information which are designated as confidential should be protected adequately as committed or agreed by the stakeholders.
  1. Most applicable where the user requires additional assurance regarding the service provider’s practices for protecting sensitive business information
Processing Integrity This trust service principle addresses that the System processing is complete, accurate, timely and authorized.
  1. Potentially applicable for a wide variety of non- financial, and financial scenarios wherever assurance is required as to the completeness, accuracy, timeliness, and authorization of system processing
Privacy This trust service principle ensures that the Personal information is adequately collected, stored, used, disclosed and purged in compliance with the commitments as per the user entity’s privacy notice and by setting up a criterion set forth in normally accepted privacy principles in accordance with AICPA.
  1. Most applicable where the service provider interacts directly with end users, and gathers their personal information
  2. Provides a strong mechanism for demonstrating the effectiveness of controls for a privacy program
Audit Preparation Audit
Define audit scope, and overall project time line Provide overall project plan
Identify existing or required controls through discussions with management, and review of available documentation Complete advance data collection before on-site work to accelerate the audit process
Perform readiness review to identify gaps requiring management attention Conduct on-site meetings, and testing
Communicate prioritized recommendations to address any identified gaps Complete off-site analysis of collected information
Hold working sessions to discuss alternatives, and remediation plans Conduct weekly reporting of project status, and any identified issues
Verify that gaps have been closed before beginning the formal audit phase Provide a draft report for management review, and electronic, and hard copies of the final report
Determine the most effective audit, and reporting approach to address the service provider’s external requirements Provide an internal report for management containing any overall observations, and recommendations for consideration

A SOC 2 Type 1 audit is an audit report containing procedures and controls prepared at a particular point of time. It is generally the design of controls report which evaluates the design on controls put into operations at a point of time. A SOC 2 Type 2 audit reports audits the operating effectiveness of the controls throughout a declared time period, between 6 months and one year. It provides the highest level of assurance to all customers and clients.

SOC 2 preparation usually happens in a few stages. First, your company should identify all “key systems” and perform a gap analysis against all requirements documented in the Trust Services Principles and Criteria. Next, existing security controls should be identified and policies and procedures should be written to meet all requirements. This can take anywhere from a few weeks to up to 6 months, depending on the size and maturity of your company. At this point you are ready for the SOC 1 Type I audit. A SOC 2 Type II audit is typically performed 6 months later.

Traditional SAS 70 SOC 1 SOC 2 SOC 3
Auditor’s Opinion Auditor’s Opinion Auditor’s Opinion Auditor’s Opinion
- Auditor’s Opinion Management Assertion Management Assertion
Assertion System Description (including controls) System Description (including controls) System Description (including controls) System Description (including controls)
Control objectives Control objectives Criteria Criteria (referenced)
Control activities Control activities Control activities -
Tests of operating effectiveness Tests of operating effectiveness Tests of operating effectiveness -
Results of tests Results of tests Results of tests -
Other Information (if applicable) Other Information (if applicable) Other Information (if applicable) -

Featured Resources


AICPA Trust Services Criteria 2018 FREE Download

Click on the link below to for a FREE Download the latest version of the AICPA Trust Services Criteria.

our team

Sample Report


Project plan

Our industry specialization

Our years of experience across industries runs deep while we maintain a constant lookout for what's next. See what we deliver in your sector.

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

Lorem Ipsum is simply dummy text of the printing and typesetting industry.