Cybersecurity Risks and Controls - The CPA Journal - 18 minutes read
Cybersecurity Risks and Controls
As high-profile corporate data breaches continue to occupy headline space, businesses are grappling with how to confront a serious risk that changes on an almost daily basis. In an effort to help, the AICPA has released a framework for measuring, addressing, and monitoring cybersecurity risk, called System for Organization Controls for Cybersecurity (SOC-C). This article provides a detailed discussion of SOC-C, reviewing the services and activities it prescribes and the benefits and challenges it presents to CPAs and management. Cybersecurity is one of the biggest risks modern companies face. In 2017, the average cost of a data breach in the United States was $7.35 million, or approximately $225 for each lost or stolen electronic record. The costs include identifying the breach, notifying the affected parties, downtime, recovery, repairs, lawsuits, and customer losses (2018 Cost of a Data Breach Study, IBM, https://ibm.co/2WJ475C). Cybersecurity threats are ubiquitous; they affect all businesses across all industries. Even for a small business, breaches are costly. The data suggest that the cost of a breach isolated to payroll records of a business with only five employees, bimonthly pay periods, and operating for 10 years could be nearly $300,000. Federal and state regulators have not ignored the importance of companies protecting their electronic assets. In 2011, the SEC issued CF Disclosure Guidance: Topic 2—Cybersecurity, and in February 2018, it issued additional interpretive guidance about companies’ cybersecurity risk and incident disclosures. These rules require that companies 1) maintain comprehensive policies and procedures related to cybersecurity risks and incidents; 2) establish and maintain appropriate and effective disclosure controls and procedures that enable them to make accurate and timely disclosures of material events, including those related to cybersecurity; and 3) have policies and procedures in place to thwart insider trading during the period between when a material cybersecurity incident is discovered and is publicly disclosed. In March 2017, the New York State Department of Financial Services (DFS) issued 23 NYCRR 500, Cybersecurity Requirements for Financial Services Companies. With limited exceptions, entities under DFS’s jurisdiction (e.g., banks, insurance companies, broker-dealers, charitable foundations) are required to specifically assess the risk of cybersecurity and design a program to address these risks in a “robust fashion,” which includes the designation of a chief information security officer (CISO), staff training, establishment of multi-factor access authentication, penetration testing, and timely reporting of incidents. Other states and state agencies have, or are in process of developing, cybersecurity-related rules and regulations (e.g., Massachusetts, Colorado, Vermont). Reputational and out-of-pocket cybersecurity costs create significant pressure on entities to ensure that information shared with customers, vendors, employees, and investors is safe and to comply with regulations. This article describes how entities might address these objectives by engaging a CPA to perform the services prescribed by the AICPA’s recently issued System for Organization Controls for Cybersecurity (SOC-C) and discusses the benefits and limitations of SOC-C services.
The impetus to establish and evaluate the design and operating effectiveness of controls intended to address an entity’s risks is not new to managers and accountants. Companies often use the Committee of Sponsoring Organizations of the Treadway Commission’s (COSO) Enterprise Risk Management (ERM)—Integrated Framework to identify important risks that may adversely affect the achievement of business strategies, as well as to design controls to address and monitor these risks. Managers and auditors use COSO’s Internal Control—Integrated Framework to evaluate the design and operating effectiveness of systems of internal control over financial reporting (ICFR). Frameworks designed to address information technology risks have been developed by the Information Systems Audit and Control Association (ISACA) and the International Organization for Standardization (ISO) [Control Objectives for Information and Related Technologies (COBIT) and ISO 27001 Information Security Management, respectively]. The National Institute of Standards and Technology (NIST) describes a continuous improvement process framework designed to specifically assist companies in developing a robust process to identify and address cybersecurity risks. The NIST framework includes the following control criteria: Identify—develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities Protect—develop and implement appropriate safeguards to ensure delivery of critical services Detect—develop and implement appropriate activities to identify the occurrence of a cybersecurity incident Respond—develop and implement appropriate activities to take action regarding a detected cybersecurity incident Recover—develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber-security incident. Just as COSO’s internal control framework helps managers design and evaluate controls intended to address financial reporting risks, the NIST framework can help managers and board members reduce the risk of security breaches and comply with federal and state regulations by serving as a guideline to design and evaluate controls intended to address cybersecurity risks. The AICPA also has a cybersecurity risk framework that, as described below, was developed to be used in conjunction with a SOC-C engagement.
SOC-C was developed to “enhance public trust in entity-prepared communications about the effectiveness of their cybersecurity risk management programs” (Cybersecurity Risk Management Reporting Fact Sheet, http://bit.ly/2Hj1wdC). SOC-C’s process is similar to evaluating and reporting on the design and effectiveness of ICFR (required for publicly traded companies by PCAOB Auditing Standard 2201, An Audit of Internal Control over Financial Reporting) in that it gives management the responsibility to design and implement a cybersecurity risk management program (CRMP) and to evaluate whether program controls are effective to achieve management’s objectives. A CRMP is defined by SOCC as “the set of policies, processes, and controls designed to protect information and systems from security events that could compromise the achievement of the entity’s cybersecurity objectives and to detect, respond to, mitigate, and recover from, on a timely basis, security events that are not prevented.” It is also management’s responsibility to identify and document important information assets, possible threats to those assets, controls that reduce the likelihood of threats, and security breach response plans. CPAs may then independently provide positive assurance about whether controls are designed and operating effectively. SOC-C describes two services: a nonat-test consulting engagement and an examination of the design and operating effectiveness of cybersecurity controls. In a SOC-C consulting engagement, CPAs provide guidance to an entity developing a CRMP, helping to identify control deficiencies and making recommendations for improvement using the AICPA’s cybersecurity risk framework. This framework serves as a tool for both management and CPAs in preparing for and conducting a SOC-C engagement. It includes 19 description criteria that, along with implementation guidance, are summarized in nine categories (see the Exhibit). In a SOC-C examination, the CPA forms a conclusion about the design of an entity’s CRMP and the operating effectiveness of its program controls based on an independent evaluation and testing. Like an auditor’s reporting on the design and operating effectiveness of ICFR, which commonly uses the COSO internal control framework as a basis for evaluation, the basis for the CPA’s conclusion about a client’s CRMP should be grounded in a framework with specific, relevant control criteria like those described by NIST, or the AICPA’s Trust Services Criteria (http://bit.ly/2WQVTIE). Management may select any description or control criterion as the basis for its assertion about the entity’s CRMP and program controls, so long as the criterion selected is relevant, objective, measurable, and does not omit factors that could reasonably be expected to impact users’ decisions. The SOC-C examination report includes three sections: 1) management’s description of its CRMP, 2) management’s assertion about whether the description is in accordance with the description criteria and the program controls are effective based on given control criteria, and 3) the CPA’s conclusion about the CRMP and program controls. The report is intended for general use. In comparison, before SOC-C, CPAs could be engaged to provide companies with positive assurance that certain controls of service organizations were designed or operating effectively; these services are commonly referred to as SOC 1, 2 or 3. CPAs are typically engaged to perform SOC services by companies who want to provide their customers with an independent opinion about the adequacy of their internal controls. For example, Amazon Web Services provides SOC reports to clients who purchase website hosting services. The reports describe the controls Amazon has in place and include attestation by a CPA as to whether the controls meet control criteria described by Amazon. A comparison of the purpose and intended users of SOC services is provided on the AICPA’s website (http://bit.ly/2EhFN3A). SOC-C describes two services: a nonattest consulting engagement and an examination of the design and operating effectiveness of cybersecurity controls.
SOC-C benefits apply equally to all entities, be they privately held, publicly traded, for-profit, or not-for-profit. Arguably, the greatest benefit of SOC-C is derived from its requirement that management identify, document, and evaluate its CRMP. If an entity has dedicated little time to cybersecurity risks, the description and control criteria provide a framework that CPAs can use to help management develop a robust CRMP. If the entity is sophisticated in identifying and responding to cybersecurity risks, the description and control criteria will help identify gaps in its CRMP. This comparison process is similar to when the COSO internal control framework was updated in 2013 to include a heightened focus on fraud, IT, and outsourcing risks, and many entities found control gaps in these areas. To accomplish either a start-from-scratch or critical evaluation of CRMP, CPAs should recommend that employees with the appropriate skills and influence be included in the process. These might include the CFO, CISO, IT staff, and internal auditors. A SOC-C consulting project provides an objective assessment of an entity’s residual cybersecurity risk, helps establish a tone at the top that prioritizes cybersecurity risk, and helps demonstrate compliance with federal and state cybersecurity regulations. A SOC-C examination adds credibility to an entity’s CRMP and signals external stakeholders that management intends to maintain a strong system of cybersecurity controls. A SOC-C examination may even reduce an entity’s cyber-security insurance premiums. On the other hand, the examination does not guarantee that a security breach will not occur or will be detected in a timely manner. Like all internal controls, CRMP controls reduce the likelihood of errors and fraud, but they cannot prevent them. In addition, the form and origination of security threats is constantly changing. A well-controlled technology environment today could be at risk of being breached tomorrow. The evaluation of all control systems must be continuous, not one-and-done. Of concern is management’s selection of the criteria against which the entity’s CRMP is to be evaluated; management may choose to include all, or omit some, specific criteria. For example, the AICPA’s Trust Services’ control criteria are security, availability, processing integrity, confidentiality, and privacy. If management chooses to omit evaluation of the privacy criteria, the SOC-C report would be silent with respect to the design adequacy and operating effectiveness of privacy program controls, possibly creating an expectations gap regarding CPAs’ responsibilities. Users of SOC-C reports must carefully evaluate the extent of services performed when determining whether their needs are met and not over-rely on the results of a SOC-C examination. Just as importantly, CPAs should evaluate engagement risk before agreeing to undertake SOC-C services. As an example, Ernst & Young (EY) certified certain IT security controls of Equifax using ISO Standard 27001 prior to Equifax’s 2017 security breach (Francine McKenna, “Unit of Equifax’s Auditor EY Certified the Information Security That Was Later Breached,” MarketWatch, Dec. 20, 2018, https://on.mktw.net/2VzURUU). Although Ernst & Young may not ultimately be held liable in ensuing shareholder lawsuits against Equifax, it is highly likely that its costs of information production alone will far exceed the fees billed for the provided certification services. It is important that CPAs identify the potential expectations of users of the results of SOC-C engagements, as well as have the relevant skills to perform SOC-C services. For CPAs who decide to offer SOCC services, IT skills and current experience are important. Credentials like the Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional (CISSP) can help deepen relevant skills. In addition, the AICPA offers a Cybersecurity Advisory Certificate. The program, which takes 15.5 hours to complete, is described as for “practitioners who are interested in providing cybersecurity advisory services and want to build their competencies in and understanding of these types of services.” It also cautions, “Participants must have either IT expertise or access to IT professionals who possess the skills to perform this work.” Given the pace of change in cybersecurity risk, CPAs who want to build a practice in SOC-C should consider hiring individuals with specialized IT and cybersecurity skills.
Solving Problems before They Become Problems The result of a cybersecurity breach can, on a proportionate basis, be equally as costly to a small nonprofit as it is to a large, publicly traded company. Building and maintaining a robust CRMP is a continuous effort that requires the commitment of board members and senior management, as well as investment in capital and human assets. Using SOCC’s description and control criteria as part of a consulting engagement to help an entity design, implement, and evaluate the operating effectiveness of its CRMP can be valuable to management and board members, while performing an independent examination of the design and operating effectiveness of an entity’s cybersecurity controls can enhance public trust in its communications about the effectiveness of its CRMP. While there are other cybersecurity-related certification options (e.g., ISO 27001, HITRUST), SOC-C may be a more cost-effective solution in many contexts. SOC-C’s common criteria for disclosure and evaluation of an entity’s CRMP cover a broad range of stakeholders’ cybersecurity information needs and concerns, thereby reducing the number of certifications that might otherwise be required. In addition, management selects the control criteria to be evaluated, which increases flexibility. Importantly, SOC-C services can only be provided by independent CPAs acting in accordance with the AICPA’s Code of Professional Conduct.
Source: Cpajournal.com
Powered by NewsAPI.org
Keywords:
Computer security • Business • Risk management • American Institute of Certified Public Accountants • Computer security • Risk management • System • Organization • Control system • Computer security • Conversation • Service (economics) • Economics • Management • Computer security • Risk management • Corporation • Data breach • United States • Cost • Downtime • Lawsuit • Cost • Data breach • IBM • Computer security • Small business • Data • Employment • Corporation • Electronics • U.S. Securities and Exchange Commission • Corporation • Computer security • Corporation • Computer security • Risk • Incident management • Corporation • Policy • Computer security • Corporation • Accuracy and precision • Materialism • Event (philosophy) • Computer security • Policy • Insider trading • Computer security • Incident management • New York State Department of Financial Services • Disc Filing System • New York Codes, Rules and Regulations • Computer security • Requirements analysis • Financial services • Disc Filing System • Bank • Insurance • Risk management • Computer security • Design • Computer programming • Chief information security officer • Chief information security officer • Authentication • Penetration test • Computer security • Massachusetts • Colorado • Vermont • Information • Customer • Distribution (business) • Employment • Investment • Safety • Regulation • Project management • Certified Public Accountant • Service (economics) • American Institute of Certified Public Accountants • System • Organization • Control system • Computer security • Economics • Service (economics) • Motivation • Software design • Effectiveness • Scientific control • Legal personality • Risk • Management • Accounting • Company • Committee of Sponsoring Organizations of the Treadway Commission • Committee of Sponsoring Organizations of the Treadway Commission • Enterprise risk management • Enterprise risk management • Strategic management • Design controls • Risk • Management • Audit • Committee of Sponsoring Organizations of the Treadway Commission • Internal control • System integration • Software framework • Software design • Effectiveness • System • Internal control • Financial statement • Software framework • Information technology • Risk • ISACA • ISACA • International Organization for Standardization • Control (management) • Project management • Technology • COBIT • ISO/IEC 27001:2013 • Information security management • National Institute of Standards and Technology • National Institute of Standards and Technology • Continual improvement process • Software framework • Computer security • National Institute of Standards and Technology • Software framework • Control theory • Economic development • Organization • Understanding • Computer security • Risk • System • Person • Data • Protectionism • Economic development • Tool • Critical theory • Service (economics) • Economic development • Computer security • Incident management • Tool • Computer security • Computer security • Incident management • Committee of Sponsoring Organizations of the Treadway Commission • Internal control • Software framework • Management • Software design • Evaluation • Financial statement • National Institute of Standards and Technology • Management • Board of directors • Risk • Security • Government • Regulation • Software design • Computer security • American Institute of Certified Public Accountants • Computer security • Risk • System on a chip • System on a chip • Entity • Communication • Computer security • Risk management • Computer program • Computer security • Risk management • Financial statement • Business process • Evaluation • Effectiveness • Public company • Public Company Accounting Oversight Board • Audit • Technical standard • Audit • Internal control • Financial statement • Social responsibility • Software design • Computer security • Risk management • Computer program • Computer program • Scientific control • Project management • Set (mathematics) • Policy • Business process • Information • System • Event (philosophy) • Entity • Computer security • Project management • Event (philosophy) • Management • Moral responsibility • Information • Probability • Security • Positive assurance • Evaluation • Software design • Computer security • Certified Public Accountant • Control theory • American Institute of Certified Public Accountants • Computer security • Risk management • Management • Evaluation • Certified Public Accountant • Logical consequence • Software design • Entity • Effectiveness • Evaluation • Experiment • Financial audit • Financial statement • Software design • Effectiveness • Committee of Sponsoring Organizations of the Treadway Commission • Internal control • Evaluation • Certified Public Accountant • Relevance • National Institute of Standards and Technology • American Institute of Certified Public Accountants • Entity • Relevance • Objectivity (philosophy) • Measurement • Factor analysis • Decision-making • Evaluation • Management • Management • Description • Description • Certified Public Accountant • Positive assurance • Amazon Web Services • Client (computing) • Web hosting service • Amazon.com • Certified Public Accountant • Amazon.com • User (computing) • American Institute of Certified Public Accountants • Website • Service (economics) • Consultant • Evaluation • Design • Effectiveness • Computer security • Health • Privately held company • Nonprofit organization • Management • Legal personality • Computer security • Risk • Control theory • Software framework • Entity–relationship model • Computer security • Risk management • Business process • Committee of Sponsoring Organizations of the Treadway Commission • Internal control • Fraud • Outsourcing • Risk • Critical thinking • Employment • Skill • Business process • Chief financial officer • Chief information security officer • Employment • Audit • Consultant • Project management • Goal • Risk assessment • Legal personality • Computer security • Risk management • Tone at the top • Computer security • Risk • Regulatory compliance • Government • Computer security • Regulation • Evaluation • Legal personality • Military communications • Stakeholder (corporate) • Management • System • Computer security • Evaluation • Legal personality • Computer security • Insurance • Insurance • Evaluation • Security • Technology • One and Done • American Institute of Certified Public Accountants • Trust (emotion) • Service (economics) • Security • Availability • Data processing • Integrity • Confidentiality • Privacy • Management • Evaluation • Privacy • C++ Report • Privacy • Risk management • Ernst & Young • Ernst & Young • Computer security • Security controls • Equifax • International Organization for Standardization • Equifax • Security • Equifax • Audit • Ernst & Young • Information security • Breach of contract • MarketWatch • Ernst & Young • Legal liability • Shareholder • Lawsuit • Equifax • Information • Manufacturing • Professional certification • Service (economics) • Skill • Skill • Certified Information Systems Auditor • Certified Information Systems Auditor • Certified Information Systems Security Professional • Certified Information Systems Security Professional • Skill • American Institute of Certified Public Accountants • Computer security • Professional certification • Education • Computer security • Service (economics) • Skill • Service (economics) • Expert • Information technology • Skill • Employment • Change management • Computer security • Risk • Computer security • Skill • Computer security • Public company • Contract • Senior management • Investment • Capital (economics) • Human capital • Control (management) • Consultant • Legal personality • Design • Effectiveness • Management • Evaluation • Design • Effectiveness • Legal personality • Computer security • Control system • Communication • Computer security • ISO/IEC 27001:2013 • Common Criteria • Stakeholder (corporate) • Computer security • Control theory • American Institute of Certified Public Accountants •
As high-profile corporate data breaches continue to occupy headline space, businesses are grappling with how to confront a serious risk that changes on an almost daily basis. In an effort to help, the AICPA has released a framework for measuring, addressing, and monitoring cybersecurity risk, called System for Organization Controls for Cybersecurity (SOC-C). This article provides a detailed discussion of SOC-C, reviewing the services and activities it prescribes and the benefits and challenges it presents to CPAs and management. Cybersecurity is one of the biggest risks modern companies face. In 2017, the average cost of a data breach in the United States was $7.35 million, or approximately $225 for each lost or stolen electronic record. The costs include identifying the breach, notifying the affected parties, downtime, recovery, repairs, lawsuits, and customer losses (2018 Cost of a Data Breach Study, IBM, https://ibm.co/2WJ475C). Cybersecurity threats are ubiquitous; they affect all businesses across all industries. Even for a small business, breaches are costly. The data suggest that the cost of a breach isolated to payroll records of a business with only five employees, bimonthly pay periods, and operating for 10 years could be nearly $300,000. Federal and state regulators have not ignored the importance of companies protecting their electronic assets. In 2011, the SEC issued CF Disclosure Guidance: Topic 2—Cybersecurity, and in February 2018, it issued additional interpretive guidance about companies’ cybersecurity risk and incident disclosures. These rules require that companies 1) maintain comprehensive policies and procedures related to cybersecurity risks and incidents; 2) establish and maintain appropriate and effective disclosure controls and procedures that enable them to make accurate and timely disclosures of material events, including those related to cybersecurity; and 3) have policies and procedures in place to thwart insider trading during the period between when a material cybersecurity incident is discovered and is publicly disclosed. In March 2017, the New York State Department of Financial Services (DFS) issued 23 NYCRR 500, Cybersecurity Requirements for Financial Services Companies. With limited exceptions, entities under DFS’s jurisdiction (e.g., banks, insurance companies, broker-dealers, charitable foundations) are required to specifically assess the risk of cybersecurity and design a program to address these risks in a “robust fashion,” which includes the designation of a chief information security officer (CISO), staff training, establishment of multi-factor access authentication, penetration testing, and timely reporting of incidents. Other states and state agencies have, or are in process of developing, cybersecurity-related rules and regulations (e.g., Massachusetts, Colorado, Vermont). Reputational and out-of-pocket cybersecurity costs create significant pressure on entities to ensure that information shared with customers, vendors, employees, and investors is safe and to comply with regulations. This article describes how entities might address these objectives by engaging a CPA to perform the services prescribed by the AICPA’s recently issued System for Organization Controls for Cybersecurity (SOC-C) and discusses the benefits and limitations of SOC-C services.
The impetus to establish and evaluate the design and operating effectiveness of controls intended to address an entity’s risks is not new to managers and accountants. Companies often use the Committee of Sponsoring Organizations of the Treadway Commission’s (COSO) Enterprise Risk Management (ERM)—Integrated Framework to identify important risks that may adversely affect the achievement of business strategies, as well as to design controls to address and monitor these risks. Managers and auditors use COSO’s Internal Control—Integrated Framework to evaluate the design and operating effectiveness of systems of internal control over financial reporting (ICFR). Frameworks designed to address information technology risks have been developed by the Information Systems Audit and Control Association (ISACA) and the International Organization for Standardization (ISO) [Control Objectives for Information and Related Technologies (COBIT) and ISO 27001 Information Security Management, respectively]. The National Institute of Standards and Technology (NIST) describes a continuous improvement process framework designed to specifically assist companies in developing a robust process to identify and address cybersecurity risks. The NIST framework includes the following control criteria: Identify—develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities Protect—develop and implement appropriate safeguards to ensure delivery of critical services Detect—develop and implement appropriate activities to identify the occurrence of a cybersecurity incident Respond—develop and implement appropriate activities to take action regarding a detected cybersecurity incident Recover—develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber-security incident. Just as COSO’s internal control framework helps managers design and evaluate controls intended to address financial reporting risks, the NIST framework can help managers and board members reduce the risk of security breaches and comply with federal and state regulations by serving as a guideline to design and evaluate controls intended to address cybersecurity risks. The AICPA also has a cybersecurity risk framework that, as described below, was developed to be used in conjunction with a SOC-C engagement.
SOC-C was developed to “enhance public trust in entity-prepared communications about the effectiveness of their cybersecurity risk management programs” (Cybersecurity Risk Management Reporting Fact Sheet, http://bit.ly/2Hj1wdC). SOC-C’s process is similar to evaluating and reporting on the design and effectiveness of ICFR (required for publicly traded companies by PCAOB Auditing Standard 2201, An Audit of Internal Control over Financial Reporting) in that it gives management the responsibility to design and implement a cybersecurity risk management program (CRMP) and to evaluate whether program controls are effective to achieve management’s objectives. A CRMP is defined by SOCC as “the set of policies, processes, and controls designed to protect information and systems from security events that could compromise the achievement of the entity’s cybersecurity objectives and to detect, respond to, mitigate, and recover from, on a timely basis, security events that are not prevented.” It is also management’s responsibility to identify and document important information assets, possible threats to those assets, controls that reduce the likelihood of threats, and security breach response plans. CPAs may then independently provide positive assurance about whether controls are designed and operating effectively. SOC-C describes two services: a nonat-test consulting engagement and an examination of the design and operating effectiveness of cybersecurity controls. In a SOC-C consulting engagement, CPAs provide guidance to an entity developing a CRMP, helping to identify control deficiencies and making recommendations for improvement using the AICPA’s cybersecurity risk framework. This framework serves as a tool for both management and CPAs in preparing for and conducting a SOC-C engagement. It includes 19 description criteria that, along with implementation guidance, are summarized in nine categories (see the Exhibit). In a SOC-C examination, the CPA forms a conclusion about the design of an entity’s CRMP and the operating effectiveness of its program controls based on an independent evaluation and testing. Like an auditor’s reporting on the design and operating effectiveness of ICFR, which commonly uses the COSO internal control framework as a basis for evaluation, the basis for the CPA’s conclusion about a client’s CRMP should be grounded in a framework with specific, relevant control criteria like those described by NIST, or the AICPA’s Trust Services Criteria (http://bit.ly/2WQVTIE). Management may select any description or control criterion as the basis for its assertion about the entity’s CRMP and program controls, so long as the criterion selected is relevant, objective, measurable, and does not omit factors that could reasonably be expected to impact users’ decisions. The SOC-C examination report includes three sections: 1) management’s description of its CRMP, 2) management’s assertion about whether the description is in accordance with the description criteria and the program controls are effective based on given control criteria, and 3) the CPA’s conclusion about the CRMP and program controls. The report is intended for general use. In comparison, before SOC-C, CPAs could be engaged to provide companies with positive assurance that certain controls of service organizations were designed or operating effectively; these services are commonly referred to as SOC 1, 2 or 3. CPAs are typically engaged to perform SOC services by companies who want to provide their customers with an independent opinion about the adequacy of their internal controls. For example, Amazon Web Services provides SOC reports to clients who purchase website hosting services. The reports describe the controls Amazon has in place and include attestation by a CPA as to whether the controls meet control criteria described by Amazon. A comparison of the purpose and intended users of SOC services is provided on the AICPA’s website (http://bit.ly/2EhFN3A). SOC-C describes two services: a nonattest consulting engagement and an examination of the design and operating effectiveness of cybersecurity controls.
SOC-C benefits apply equally to all entities, be they privately held, publicly traded, for-profit, or not-for-profit. Arguably, the greatest benefit of SOC-C is derived from its requirement that management identify, document, and evaluate its CRMP. If an entity has dedicated little time to cybersecurity risks, the description and control criteria provide a framework that CPAs can use to help management develop a robust CRMP. If the entity is sophisticated in identifying and responding to cybersecurity risks, the description and control criteria will help identify gaps in its CRMP. This comparison process is similar to when the COSO internal control framework was updated in 2013 to include a heightened focus on fraud, IT, and outsourcing risks, and many entities found control gaps in these areas. To accomplish either a start-from-scratch or critical evaluation of CRMP, CPAs should recommend that employees with the appropriate skills and influence be included in the process. These might include the CFO, CISO, IT staff, and internal auditors. A SOC-C consulting project provides an objective assessment of an entity’s residual cybersecurity risk, helps establish a tone at the top that prioritizes cybersecurity risk, and helps demonstrate compliance with federal and state cybersecurity regulations. A SOC-C examination adds credibility to an entity’s CRMP and signals external stakeholders that management intends to maintain a strong system of cybersecurity controls. A SOC-C examination may even reduce an entity’s cyber-security insurance premiums. On the other hand, the examination does not guarantee that a security breach will not occur or will be detected in a timely manner. Like all internal controls, CRMP controls reduce the likelihood of errors and fraud, but they cannot prevent them. In addition, the form and origination of security threats is constantly changing. A well-controlled technology environment today could be at risk of being breached tomorrow. The evaluation of all control systems must be continuous, not one-and-done. Of concern is management’s selection of the criteria against which the entity’s CRMP is to be evaluated; management may choose to include all, or omit some, specific criteria. For example, the AICPA’s Trust Services’ control criteria are security, availability, processing integrity, confidentiality, and privacy. If management chooses to omit evaluation of the privacy criteria, the SOC-C report would be silent with respect to the design adequacy and operating effectiveness of privacy program controls, possibly creating an expectations gap regarding CPAs’ responsibilities. Users of SOC-C reports must carefully evaluate the extent of services performed when determining whether their needs are met and not over-rely on the results of a SOC-C examination. Just as importantly, CPAs should evaluate engagement risk before agreeing to undertake SOC-C services. As an example, Ernst & Young (EY) certified certain IT security controls of Equifax using ISO Standard 27001 prior to Equifax’s 2017 security breach (Francine McKenna, “Unit of Equifax’s Auditor EY Certified the Information Security That Was Later Breached,” MarketWatch, Dec. 20, 2018, https://on.mktw.net/2VzURUU). Although Ernst & Young may not ultimately be held liable in ensuing shareholder lawsuits against Equifax, it is highly likely that its costs of information production alone will far exceed the fees billed for the provided certification services. It is important that CPAs identify the potential expectations of users of the results of SOC-C engagements, as well as have the relevant skills to perform SOC-C services. For CPAs who decide to offer SOCC services, IT skills and current experience are important. Credentials like the Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional (CISSP) can help deepen relevant skills. In addition, the AICPA offers a Cybersecurity Advisory Certificate. The program, which takes 15.5 hours to complete, is described as for “practitioners who are interested in providing cybersecurity advisory services and want to build their competencies in and understanding of these types of services.” It also cautions, “Participants must have either IT expertise or access to IT professionals who possess the skills to perform this work.” Given the pace of change in cybersecurity risk, CPAs who want to build a practice in SOC-C should consider hiring individuals with specialized IT and cybersecurity skills.
Solving Problems before They Become Problems The result of a cybersecurity breach can, on a proportionate basis, be equally as costly to a small nonprofit as it is to a large, publicly traded company. Building and maintaining a robust CRMP is a continuous effort that requires the commitment of board members and senior management, as well as investment in capital and human assets. Using SOCC’s description and control criteria as part of a consulting engagement to help an entity design, implement, and evaluate the operating effectiveness of its CRMP can be valuable to management and board members, while performing an independent examination of the design and operating effectiveness of an entity’s cybersecurity controls can enhance public trust in its communications about the effectiveness of its CRMP. While there are other cybersecurity-related certification options (e.g., ISO 27001, HITRUST), SOC-C may be a more cost-effective solution in many contexts. SOC-C’s common criteria for disclosure and evaluation of an entity’s CRMP cover a broad range of stakeholders’ cybersecurity information needs and concerns, thereby reducing the number of certifications that might otherwise be required. In addition, management selects the control criteria to be evaluated, which increases flexibility. Importantly, SOC-C services can only be provided by independent CPAs acting in accordance with the AICPA’s Code of Professional Conduct.
Source: Cpajournal.com
Powered by NewsAPI.org
Keywords:
Computer security • Business • Risk management • American Institute of Certified Public Accountants • Computer security • Risk management • System • Organization • Control system • Computer security • Conversation • Service (economics) • Economics • Management • Computer security • Risk management • Corporation • Data breach • United States • Cost • Downtime • Lawsuit • Cost • Data breach • IBM • Computer security • Small business • Data • Employment • Corporation • Electronics • U.S. Securities and Exchange Commission • Corporation • Computer security • Corporation • Computer security • Risk • Incident management • Corporation • Policy • Computer security • Corporation • Accuracy and precision • Materialism • Event (philosophy) • Computer security • Policy • Insider trading • Computer security • Incident management • New York State Department of Financial Services • Disc Filing System • New York Codes, Rules and Regulations • Computer security • Requirements analysis • Financial services • Disc Filing System • Bank • Insurance • Risk management • Computer security • Design • Computer programming • Chief information security officer • Chief information security officer • Authentication • Penetration test • Computer security • Massachusetts • Colorado • Vermont • Information • Customer • Distribution (business) • Employment • Investment • Safety • Regulation • Project management • Certified Public Accountant • Service (economics) • American Institute of Certified Public Accountants • System • Organization • Control system • Computer security • Economics • Service (economics) • Motivation • Software design • Effectiveness • Scientific control • Legal personality • Risk • Management • Accounting • Company • Committee of Sponsoring Organizations of the Treadway Commission • Committee of Sponsoring Organizations of the Treadway Commission • Enterprise risk management • Enterprise risk management • Strategic management • Design controls • Risk • Management • Audit • Committee of Sponsoring Organizations of the Treadway Commission • Internal control • System integration • Software framework • Software design • Effectiveness • System • Internal control • Financial statement • Software framework • Information technology • Risk • ISACA • ISACA • International Organization for Standardization • Control (management) • Project management • Technology • COBIT • ISO/IEC 27001:2013 • Information security management • National Institute of Standards and Technology • National Institute of Standards and Technology • Continual improvement process • Software framework • Computer security • National Institute of Standards and Technology • Software framework • Control theory • Economic development • Organization • Understanding • Computer security • Risk • System • Person • Data • Protectionism • Economic development • Tool • Critical theory • Service (economics) • Economic development • Computer security • Incident management • Tool • Computer security • Computer security • Incident management • Committee of Sponsoring Organizations of the Treadway Commission • Internal control • Software framework • Management • Software design • Evaluation • Financial statement • National Institute of Standards and Technology • Management • Board of directors • Risk • Security • Government • Regulation • Software design • Computer security • American Institute of Certified Public Accountants • Computer security • Risk • System on a chip • System on a chip • Entity • Communication • Computer security • Risk management • Computer program • Computer security • Risk management • Financial statement • Business process • Evaluation • Effectiveness • Public company • Public Company Accounting Oversight Board • Audit • Technical standard • Audit • Internal control • Financial statement • Social responsibility • Software design • Computer security • Risk management • Computer program • Computer program • Scientific control • Project management • Set (mathematics) • Policy • Business process • Information • System • Event (philosophy) • Entity • Computer security • Project management • Event (philosophy) • Management • Moral responsibility • Information • Probability • Security • Positive assurance • Evaluation • Software design • Computer security • Certified Public Accountant • Control theory • American Institute of Certified Public Accountants • Computer security • Risk management • Management • Evaluation • Certified Public Accountant • Logical consequence • Software design • Entity • Effectiveness • Evaluation • Experiment • Financial audit • Financial statement • Software design • Effectiveness • Committee of Sponsoring Organizations of the Treadway Commission • Internal control • Evaluation • Certified Public Accountant • Relevance • National Institute of Standards and Technology • American Institute of Certified Public Accountants • Entity • Relevance • Objectivity (philosophy) • Measurement • Factor analysis • Decision-making • Evaluation • Management • Management • Description • Description • Certified Public Accountant • Positive assurance • Amazon Web Services • Client (computing) • Web hosting service • Amazon.com • Certified Public Accountant • Amazon.com • User (computing) • American Institute of Certified Public Accountants • Website • Service (economics) • Consultant • Evaluation • Design • Effectiveness • Computer security • Health • Privately held company • Nonprofit organization • Management • Legal personality • Computer security • Risk • Control theory • Software framework • Entity–relationship model • Computer security • Risk management • Business process • Committee of Sponsoring Organizations of the Treadway Commission • Internal control • Fraud • Outsourcing • Risk • Critical thinking • Employment • Skill • Business process • Chief financial officer • Chief information security officer • Employment • Audit • Consultant • Project management • Goal • Risk assessment • Legal personality • Computer security • Risk management • Tone at the top • Computer security • Risk • Regulatory compliance • Government • Computer security • Regulation • Evaluation • Legal personality • Military communications • Stakeholder (corporate) • Management • System • Computer security • Evaluation • Legal personality • Computer security • Insurance • Insurance • Evaluation • Security • Technology • One and Done • American Institute of Certified Public Accountants • Trust (emotion) • Service (economics) • Security • Availability • Data processing • Integrity • Confidentiality • Privacy • Management • Evaluation • Privacy • C++ Report • Privacy • Risk management • Ernst & Young • Ernst & Young • Computer security • Security controls • Equifax • International Organization for Standardization • Equifax • Security • Equifax • Audit • Ernst & Young • Information security • Breach of contract • MarketWatch • Ernst & Young • Legal liability • Shareholder • Lawsuit • Equifax • Information • Manufacturing • Professional certification • Service (economics) • Skill • Skill • Certified Information Systems Auditor • Certified Information Systems Auditor • Certified Information Systems Security Professional • Certified Information Systems Security Professional • Skill • American Institute of Certified Public Accountants • Computer security • Professional certification • Education • Computer security • Service (economics) • Skill • Service (economics) • Expert • Information technology • Skill • Employment • Change management • Computer security • Risk • Computer security • Skill • Computer security • Public company • Contract • Senior management • Investment • Capital (economics) • Human capital • Control (management) • Consultant • Legal personality • Design • Effectiveness • Management • Evaluation • Design • Effectiveness • Legal personality • Computer security • Control system • Communication • Computer security • ISO/IEC 27001:2013 • Common Criteria • Stakeholder (corporate) • Computer security • Control theory • American Institute of Certified Public Accountants •