NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
August 29, 2018

Assessing Vendor Risk: Is Reviewing a SOC Report Enough?

Brianna Blanchard Brianna Blanchard
SOC Reports and Vendor Management

Statement on Standards for Attestation Engagements (SSAE) audits are conducted by third-party auditors and are used to document and evaluate internal controls. The SOC reports produced by an SSAE audit can be reviewed as part of vendor security risk assessments. Different types of SOC reports cover different controls and scopes. The most helpful for vendor assessments is the SOC 2 Type II because it covers more of the security and IT related controls over a period of time instead of at a point in time.

Some organizations depend solely on reviewing their vendors’ yearly SOC reports for their vendor security risk assessment process. This isn’t an effective approach because SOC reports often don’t cover all the relevant security controls that you should assess your vendors for.

Components of a SOC Report

When using an SSAE audit report to assess your vendor’s security posture, two sections in the SOC report typically contain the most relevant security information.

The “Description of the System” section includes a summary of the services or a specific system. This section often contains helpful information when reviewing the organization’s security practices and operations.

The “Test Cases and Results” section describes the different test cases that the auditor used to assess whether the organization met the test criteria.

A SOC 2 Type II report often includes information about the following security controls:

  • Risk Management
  • Change Management
  • Logical Access Controls (sometimes Physical Access Controls depending on the service or system)
  • Security Policies and Procedures
  • Data Backup
  • System Monitoring
What’s Missing?

SOC reports aren’t always consistent in the security controls they cover. The company under audit has input about which control groups they’re assessed on. There are groups of controls that are often not in scope for SOC reports and may need to be monitored by your company using a different method.

Some of the security controls that are generally not addressed in SOC reports include:

  • Details about the vendor’s incident response (IR) and disaster recovery (DR) plans. These procedures could impact your company, especially if they don’t meet your IR and DR requirements.
  • Application development controls aren’t usually included and would be especially relevant if you’re assessing a SaaS solution.
  • Technical testing processes such as vulnerability scanning or penetration tests.
  • Security operations processes like the use of a SIEM, software patching, and secure configuration standards for servers and network devices.
  • Detailed information about subservice organizations that may have access to your company’s data or that may impact the service your vendor is providing.
  • Data privacy controls such as data use and sharing, data destruction and disposal, and privacy training.
Addressing the Missing Controls

In addition to reviewing SOC reports, other methods can be used to assess the controls that are missing in a SOC report, including:

  • Third-party audit reports or security certifications. These are only helpful if you have information about the standards that the audit or certification is based on.
  • Copies of the vendor’s security policies, procedures, and standards.
  • Responses to a customized security questionnaire. It’s easier to target specific security controls or missing information by creating a questionnaire that your vendors can complete.
  • Solution- or service-specific security related documentation such as network and data flow diagrams.
  • The SOC reports of any subservice organizations that your vendor shares your data with, such as hosting or SaaS providers.
Conclusions on SOC Reports and Vendor Management

To streamline your vendor assessment process, it’s helpful to create a list of documentation that you need to request from your vendors on a yearly basis. You should also create a list of the relevant security controls that need to be assessed so that you can determine if reviewing your vendor’s SOC report is adequate or if additional assessment methods are needed. In most cases, a SOC report by itself does not provide enough information for a complete assessment.

Included Topics

  • Security Operations
Brianna Blanchard
Brianna Blanchard

Brianna Blanchard is the Senior Manager of Information Assurance and Advisory Services at NuHarbor Security where she leads a team of professionals. She has over 15 years of experience working in cybersecurity and information technology. Before joining NuHarbor Security, Brianna worked for government organizations helping them build their security compliance and governance programs from the ground up. Brianna currently is involved in co-leading the Women in Cybersecurity Council at Champlain College, with the goal of making cybersecurity more inclusive and Champlain College the best place for women in cyber.

Related Posts

Security Testing 2 min read
Risk Management - Which Vendors Should I Assess? Read More
Compliance 2 min read
Less is more: Focusing your third-party vendor risk assessments on the basics Read More
Compliance 3 min read
Not your father’s controls - Keeping your vendor assessment process updated Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.