If you work with any third parties to support the delivery of your service that are responsible for your information security controls (either fully or partially), these third parties will be termed a ‘subservice organisation’ in a SOC 2 context and will need to be identified within your SOC 2 report. The report will also need to identify the SOC 2 criteria and the information security controls they are responsible for, and how it fulfils your requirements for those controls.
Here, the ideal scenario is for your subservice organisations to have their own SOC 2 report, as this can be used as evidence. However, if the subservice organisation does not have a SOC 2 report but does have an ISO 27001 certification, for example, you can utilise information relating to this certification and the controls they have in place to maintain it.

Preparing for a Successful SOC 2 Audit
URM’s blog offers key advice on what to expect from your SOC 2 audit in practice, the types of evidence you will need to provide, how best to prepare, and more.
URM’s blog answers key questions about SOC 2, including what it is & who it applies to, why it is beneficial, how SOC 2 reports are structured & more.

