Compass IT Compliance Blog / Compliance (4)

Understanding SOC 2 Compliance & Vendor Management

SOC 2 Vendor Management

SOC 2 (System and Organization Controls 2) is a trusted auditing standard developed by the American Institute of Certified Public Accountants (AICPA). It assesses an organization’s information systems against the Trust Services Criteria (TSC): security, availability, processing integr …

Read Story

Understanding DoD Impact Levels for Cloud Security

DoD Impact Levels

The security of information is a cornerstone of the Department of Defense's (DoD) operations. To safeguard sensitive data, the DoD has developed Impact Levels (ILs), a framework that categorizes information systems based on their sensitivity and the potential impact of a compromise. T …

Read Story

SAS 145 and IT General Controls: What Organizations Need to Know

SAS 145 and IT General Controls

The release of SAS 145 (Statement on Auditing Standards No. 145) represents a significant shift in how auditors evaluate and respond to the risks of material misstatements, particularly in complex IT environments. As IT General Controls (ITGCs) underpin key financial processes and rep …

Read Story

Leveraging a Virtual CISO (vCISO) for SOC 2 Compliance

Leveraging Virtual CISO for SOC 2 Compliance

In the rapidly evolving landscape of cybersecurity and data privacy, achieving and maintaining compliance with industry standards like SOC 2 is critical for businesses of all sizes. However, this process can be daunting, especially for organizations lacking the internal expertise or r …

Read Story

What is TISAX Assessment Level 2.5 (AL 2.5)?

TISAX Assessment Level 2.5

In the realm of automotive and industrial information security, TISAX (Trusted Information Security Assessment Exchange) plays a vital role in standardizing security assessments among partners and suppliers. One of its unique features is the concept of assessment levels, which determi …

Read Story

Do SOC 2 Auditors Read and Review Code?

SOC 2 Code Review

For organizations pursuing SOC 2 compliance, understanding the scope and focus of the audit process is crucial. A common question that arises is whether auditors review source code as part of the SOC 2 audit. Having clarity on this topic is essential, and organizations can benefit fro …

Read Story

Subscribe by email