1. Management's Description: This description is of the vendor's
cybersecurity risk management
program and is designed to
provide information about how
the vendor:
- Identifies its information
assets .
- The ways in which the entity
manages the cybersecurity
risks that threaten it.
- The key security policies and
processes implemented and
operated to protect the
entity’s information assets
against those risks.
2.Management's Assertion: This may be as of a point in time
or for a specified period of time.
Specifically, the assertion
addresses whether:
- The description is presented
in accordance with the
description criteria.
- The controls within the entity’s
cybersecurity risk
management program were
effective to achieve the
entity’s cybersecurity
objectives based on the
control criteria.
- The AICPA has developed control
criteria for use when evaluating
whether the controls within the
program were effective to achieve
the entity’s cybersecurity objectives.
Organizations may also choose a
different risk management
framework to use as their control
criteria.
3. CPA's Opinion
The section contains an opinion
that addresses whether:
- The description is presented in accordance with the description criteria.
- The controls within the entity’s cybersecurity risk management
program were effective to achieve the entity’s cybersecurity objectives
based on the control criteria
VISTA InfoSec Information Security Specialists are senior-level experts, holding certifications such as CISSP, CISA, and CRISC to help you maintain SOC 2 Audit compliance In Malaysia.
No comments:
Post a Comment