According to Garner, Inc., the worldwide public cloud services market is projected to grow 16.5 percent in 2016 to total $204 billion, up from $175 billion in 2015. This continued surge in cloud computing has more and more businesses interested in outsourcing to cloud service organizations. But with many well-publicized data breaches and privacy concerns among potential customers, the demand for adherence to standards regarding cloud security may be growing just as fast as the cloud itself.
The need for controls
When businesses enter into outsourcing agreements with cloud service providers, they are looking to offer their customers access to applications, storage and other cloud-related functions in a convenient and cost-effective way. To do so, they must submit confidential customer information to the cloud service provider for either processing or storage.
If a data breach occurs while this sensitive customer information is being handled by the cloud service provider, the business itself continues to retain responsibility for protecting it. Given this, concerns over liability and reputation have intensified the demand for related controls. Enter the AICPA’s introducution of Service Controls, known as SOC 1, SOC 2 and SOC 3.
Understanding SOC 1, 2 and 3
As defined by the AICPA, Service Organization Control (SOC) reports are internal control reports on the services provided by an organization which include valuable information that users need to assess and address the risks associated with an outsourced service. There are three types of SOC engagements.
1. A SOC 1 engagement is specifically intended to meet the needs of management and auditors as they evaluate the effect of the controls at the cloud service organization on the users’ financial statement assertions. These reports are important components of complying with laws and regulations like Sarbanes-Oxley and in planning and performing audits. The use of these reports are restricted to the management of the service organization, user entities of the service organization, and user auditors.
2. A SOC 2 engagement is a report on controls that are likely to be relevant to the security, availability or processing integrity of a cloud service provider’s system or the confidentiality or privacy of the information processed by the system. In this type of engagement, management of the service organization determines which controls to include within the scope of the engagement, develops a description of the system used to provide the services and related controls, and engages a service auditor to apply procedures and report on the identified controls. This type of report is useful for governance, risk and compliance programs, oversight and due diligence work. The users of this report are service organization management and other user entities and regulators.
A need that will continue to grow
The need for cloud service providers to reassure their users about controls over the integrity of their systems and the safety of their customer data processed by those systems will continue to lead them to practitioners who can perform SOC engagements. And with market awareness of these reports continuing to grow, firms who offer these types of services will certainly be well-positioned into the future. So, if your firm is one that is looking to offer niche services in an area that will continue to grow exponentially, then SOC engagements might be the way to go.