SOC 2
AICPA service organization report
Independent CPA opinion on whether a service organization's controls meet the AICPA Trust Services Criteria. Type 1 is point-in-time; Type 2 covers an observation window of three to twelve months.
Every framework brings its own vocabulary. Some terms are interchangeable across regimes; some look identical but mean different things. This is the glossary HSD's engineers use day to day, written without the consultant-speak.
AICPA service organization report
Independent CPA opinion on whether a service organization's controls meet the AICPA Trust Services Criteria. Type 1 is point-in-time; Type 2 covers an observation window of three to twelve months.
Point-in-time control design opinion
Auditor opinion on whether controls were suitably designed at a specific date. Useful as a sales artifact while accumulating operating history for Type 2.
Operating effectiveness over a window
Auditor opinion that controls were suitably designed and operated effectively over an observation window, typically three to twelve months. The artifact most enterprise procurement teams want to see.
AICPA criteria used in SOC 2
Five criteria categories used in SOC 2: Security (mandatory), Availability, Processing Integrity, Confidentiality, and Privacy. Maintained by the AICPA Assurance Services Executive Committee.
Public-facing summary of SOC 2
Short, public version of a SOC 2 Type 2 report intended for general distribution. No detailed test results; suitable for marketing pages.
ISMS certification standard
International standard for an Information Security Management System. Certification by an accredited certification body, valid three years with annual surveillance audits. The 2022 revision restructured Annex A into 93 controls across four themes.
Information Security Management System
The set of policies, procedures, controls, and processes that an organization runs to manage information security risk. ISO 27001 certifies whether an ISMS meets the standard's requirements.
ISO 27001 control list
The catalog of reference controls in ISO/IEC 27001:2022, organized into organizational, people, physical, and technological themes. Selection of which controls to include is captured in the Statement of Applicability.
ISO 27001 control selection document
Required artifact listing every Annex A control with a determination of inclusion, exclusion, or partial inclusion, plus rationale for each. Among the most-scrutinized documents in the Stage 1 audit.
United States health information law
United States federal law governing protected health information held by covered entities and business associates. The Security Rule covers ePHI safeguards; the Privacy Rule covers PHI use and disclosure.
Protected Health Information
Individually identifiable health information held or transmitted by a covered entity or business associate, in any form. Subject to HIPAA Privacy Rule.
Electronic Protected Health Information
PHI created, received, maintained, or transmitted in electronic form. Subject to HIPAA Security Rule technical safeguards.
HIPAA-required vendor contract
Contract between covered entity and business associate (or business associate and downstream subcontractor) with specific terms required by 45 CFR §164.504(e). Required before PHI is disclosed.
Payment card data security standard
Payment Card Industry Data Security Standard. Current version v4.0 with phased enforcement through 2025. Compliance level depends on transaction volume.
QSA-issued PCI DSS report
Formal Report on Compliance signed by a Qualified Security Assessor for Level 1 PCI DSS merchants. Includes detailed test results and is submitted to the acquirer.
Merchant-completed PCI DSS attestation
PCI DSS questionnaire merchants complete themselves, in variants A through D depending on processing method. SAQ A applies when card data flow is fully outsourced to a processor.
PCI DSS summary attestation
One-page summary attesting to PCI DSS compliance, signed by the merchant or the QSA. Submitted to acquirers; the public-facing artifact.
PCI-approved external vulnerability scanner
Vendor approved by the PCI SSC to perform external vulnerability scans against the cardholder data environment. Quarterly scans are required.
PCI-approved auditor
Firm or individual approved by the PCI SSC to perform PCI DSS assessments and issue Reports on Compliance. Required for Level 1 merchants.
EU data protection regulation
European Union regulation governing the processing of personal data of EU and EEA residents. Effective 2018. Penalties tier to four percent of global turnover.
India data protection law
Digital Personal Data Protection Act 2023, India's data protection law. Uses the terms Data Fiduciary and Data Principal. Implementation rules phased through 2024 and 2025.
Decides processing purposes (GDPR)
Under GDPR, the natural or legal person that determines the purposes and means of processing personal data. The party with primary responsibility for compliance.
Processes on behalf of a controller (GDPR)
Under GDPR, the natural or legal person that processes personal data on behalf of a controller. Article 28 contracts govern the relationship.
Two controllers, jointly determining purposes
Under GDPR Article 26, two or more controllers that jointly determine the purposes and means of processing. Must arrange transparency about responsibilities.
DPDP equivalent of controller
Under India's DPDP Act, the entity that determines the purpose and means of processing personal data. Equivalent in concept to GDPR controller.
DPDP equivalent of data subject
Under India's DPDP Act, the individual to whom the personal data relates. Equivalent in concept to GDPR data subject.
DPDP elevated obligations tier
A Data Fiduciary designated by the central government based on volume and sensitivity of processing. SDFs face additional obligations including DPO based in India and annual independent data audit.
Privacy program lead
Required under GDPR Article 37 for some processing types and under DPDP for Significant Data Fiduciaries. Independent role responsible for monitoring compliance and advising the organization.
Processor's downstream vendor
A vendor a processor engages to process personal data on behalf of the processor's customer. Requires controller authorization and a flow-down processor agreement.
HIPAA-regulated organization
Under HIPAA, a health plan, healthcare clearinghouse, or healthcare provider that transmits health information electronically in connection with a covered transaction.
HIPAA vendor handling PHI
Any vendor that creates, receives, maintains, or transmits PHI on behalf of a covered entity. Direct HIPAA obligations under the Omnibus Rule.
Issues ISO certificates
Accredited organization that performs ISO 27001 audits and issues the certificate. Must be accredited under an IAF member such as UKAS or ANAB for the certificate to be internationally recognized.
Issues audit opinion
Independent firm that performs the audit and issues the report or certificate. For SOC 2 a licensed CPA firm; for ISO 27001 an accredited certification body.
Auditor opinion on assertions
An auditor's opinion on whether management's assertions about controls are fairly stated. SOC 2 reports are attestation engagements under AICPA SSAE 18.
Third-party affirmation against a standard
An accredited body's affirmation that an organization meets the requirements of a standard. ISO 27001 is a certification; SOC 2 is an attestation.
Authority to certify
A national or international body's recognition that a certification body is competent to perform certifications. UKAS and ANAB are accreditation bodies for certification bodies that issue ISO 27001 certificates.
Auditor process review
Auditor procedure where they walk through a process step by step with the responsible party to understand how a control operates in practice. Common during SOC 2 fieldwork.
Auditor question
Auditor obtains information by asking responsible parties. Lowest-evidence procedure; usually combined with corroborating procedures.
Auditor evidence review
Auditor examines records, documents, or assets. Higher-evidence procedure than inquiry.
Auditor independently performs the control
Auditor independently executes the control to test its operation. Strongest single procedure, used selectively.
Subset of a population tested
Auditor selects a representative subset of items from a population (such as access reviews or change tickets) to test rather than examining every instance. Sample size depends on control frequency and risk.
Control gap
A control that is missing, poorly designed, or not operating as intended. Identified during the audit; severity ranges from minor to material weakness.
Severe deficiency
A deficiency, or combination of deficiencies, that creates a reasonable possibility of a material misstatement of the entity's assertions. Triggers a qualified or adverse opinion.
Audit opinion with exceptions
Auditor opinion that is favorable except for specific identified exceptions, which are described in the report. Better than adverse but worse than unqualified.
Clean audit opinion
Auditor opinion without exceptions. The cleanest result; what most service organizations target.
ISO documentation review
First of two ISO 27001 certification audit stages. Reviews ISMS documentation, Statement of Applicability, internal audit results, and management review records before fieldwork.
ISO operational fieldwork
Second ISO 27001 certification audit stage. Fieldwork against the operating ISMS; certification decision based on findings. Usually two to six weeks after Stage 1.
Annual ISO check-in
Annual ISO 27001 audit performed by the certification body to confirm the ISMS continues to meet the standard. Lighter than Stage 2 but reviews specific clauses each year.
SOC 2 gap-period attestation
Letter from auditor or service organization addressing the period between the SOC 2 report end date and the customer's reliance date. Common when reports lag the request.
Governance, Risk, and Compliance
Umbrella term for the disciplines and tooling around an organization's policy program, risk management, and compliance posture. Often used loosely to describe compliance automation platforms.
Third-Party Risk Management
Process for assessing and monitoring the risk introduced by vendors and partners. Includes vendor due diligence, ongoing monitoring, and contractual controls.
Identification and analysis of risks
Documented process to identify, analyze, and prioritize risks. Required by every major framework. Methodology and frequency vary; the methodology itself must be documented.
Risk before controls
Level of risk in the absence of any controls. Comparing inherent risk to residual risk shows the effectiveness of the control program.
Risk remaining after controls
Level of risk that remains after applying controls. Risk acceptance, transfer, or further treatment decisions are made on residual risk.
Plan to address identified risks
Decision and plan for what to do with each identified risk: accept, transfer, mitigate, or avoid. Required ISO 27001 artifact.
Mechanism that addresses a risk
Policy, procedure, or technical mechanism intended to reduce a specific risk or assert a specific assurance. Controls map to framework requirements.
Alternative when standard control is impractical
Alternative control implemented when the prescribed control is not feasible. Must achieve the same risk reduction; documentation must justify the substitution.
Recovery Time Objective
Maximum acceptable downtime for a business process or system after a disruption. Drives backup and disaster recovery design.
Recovery Point Objective
Maximum acceptable amount of data loss measured in time. Drives backup frequency.
Business Continuity Plan
Plan for maintaining or quickly resuming critical business functions during and after a disruption. Tested at least annually under most frameworks.
Disaster Recovery Plan
Plan focused specifically on recovering IT systems and data after a disruption. Subset of business continuity planning.
Data Protection Impact Assessment
Required under GDPR Article 35 for high-risk processing including systematic profiling, large-scale special categories, and systematic monitoring. Documents risks and mitigations before processing begins.
GDPR Article 28 contract
Contract between controller and processor with terms required by GDPR Article 28. Customers' security teams typically expect a current DPA before signing.
EU-approved transfer clauses
EU Commission-approved contract clauses for transferring personal data to non-adequate countries. The 2021 SCCs replaced the 2010 versions; old contracts must be updated.
EU recognition of country protection
EU Commission decision that a non-EU country provides adequate data protection. Transfers to adequate countries do not require additional safeguards. Limited list including UK, Switzerland, Japan, and a few others.
GDPR Article 30 inventory
Required inventory of processing activities under GDPR Article 30. Maintained by both controllers and processors. Most-requested artifact in supervisory authority inquiries.
Individual rights request
Request from a data subject to exercise rights under GDPR (access, rectification, erasure, portability, objection) or equivalent rights under other privacy regimes. Response window typically one month.
GDPR justification for processing
One of six bases under GDPR Article 6 that justifies processing personal data: consent, contract, legal obligation, vital interests, public interest, legitimate interests. Must be identified before processing begins.
Sensitive personal data under GDPR
Categories of personal data with elevated protection under GDPR Article 9: race, ethnic origin, political opinions, religious beliefs, trade union membership, genetic data, biometric data, health, sex life, sexual orientation.
Reversible de-identification
Processing personal data so it can no longer be attributed to a data subject without additional information held separately. Reduces risk under GDPR but data remains personal data.
Irreversible de-identification
Processing personal data so it can no longer be attributed to any data subject by any means reasonably likely to be used. Truly anonymous data falls outside GDPR scope.
Multi-Factor Authentication
Authentication using two or more factors from different categories: knowledge, possession, inherence. Required by every modern compliance framework, with PCI DSS v4.0 expanding scope to all CDE access.
Single Sign-On
Centralized authentication so a user signs in once and accesses multiple applications. Typically implemented via SAML or OIDC. Auditors expect SSO for production access.
System for Cross-domain Identity Management
Standard protocol for automating user provisioning and deprovisioning across SaaS applications. Reduces manual offboarding errors that auditors flag in access reviews.
Just-In-Time access provisioning
Granting elevated access only when needed and only for the time required. Reduces standing privileged access; preferred control for cloud production environments.
Security Information and Event Management
Centralized aggregation, correlation, and analysis of security event data. Required under most frameworks for monitoring and detection.
Endpoint Detection and Response
Endpoint security capability that detects, investigates, and responds to threats on devices. Increasingly expected by auditors as antivirus alone is no longer considered sufficient.
Mobile Device Management
Centralized management of company devices: enforcement of disk encryption, screen lock, OS updates, application allowlists. Required for endpoint compliance under most frameworks.
Encryption of stored data
Cryptographic protection of data while stored. Cloud providers typically offer this by default; auditors verify it is enabled for systems holding sensitive data.
Encryption of data in motion
Cryptographic protection of data while moving across networks. Typically TLS 1.2 or higher; auditors verify enforcement and certificate management.
Authorized adversarial test
Authorized simulation of an attack against systems, performed under defined rules of engagement, to identify exploitable vulnerabilities. Required annually under PCI DSS and expected under SOC 2.
Automated weakness check
Automated scan to identify known vulnerabilities. Different from penetration testing; typically run quarterly or more frequently. Required under PCI DSS via Approved Scanning Vendor.
Pentest scope and constraints
Documented rules governing a penetration test: in-scope assets, out-of-scope assets, testing windows, escalation contacts, authorized techniques. Required before any pentest begins.
Email any compliance term you wish was defined here. We add the ones that come up in real engagements.