What is a SOC 3 Report?

A System and Organization Control (SOC) 3 report focuses on internal controls as they relate to the AICPA’s five Trust Service Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. SOC 3 is similar to the SOC 2 report, however, the difference lies in the details provided in each report. The SOC 3 report is shorter and does not contain the detailed controls and testing procedures. This report is designed for organizations that do not possess the need for or the knowledge necessary to make use of the comprehensive details contained in a SOC 2 report.

Because SOC 3 reports are considered to be general use reports, there is the option to distribute the report for marketing purposes, such as posting it to your website.

Purpose and Use

The SOC 3 report is designed for users who want assurance on a service organization’s controls, but do not have the need for the detailed, comprehensive SOC 2 report.

Essentially a smaller scale SOC 2 report, the SOC 3 is easy-to-read and can be viewed by anyone (general use).

AICPA Trust Services Principles

Like SOC 2, a SOC 3 reports on if the service organization achieved one or more of the five AICPA Trust Services Criteria, which include:

  1. Security – The system is protected against unauthorized physical and logical access.
  2. Availability – The system is available for operation and used as agreed upon.
  3. Processing Integrity – System processing is complete, accurate, timely and authorized.
  4. Confidentiality – Information designated as confidential is protected as agreed upon.
  5. Privacy  Personal information is collected, used, retained, disclosed, and/or destroyed in accordance with established standards.

Because of the lack of detail in a SOC 3 report, the audit must be a Type 2 report.

Who Needs a SOC 3 Report?

Organizations that should consider a SOC 3 report include Cloud Service Providers (e.g., SaaS, IaaS, PaaS), enterprise systems housing third party data, IT systems management, and data center colocation facilities. If you want to communicate your organization’s controls are properly designed, implemented and operating effectively, but do not want to reveal the details of controls, then the SOC 3 report may be right for you.

Why BARR for SOC 3 Reporting

  • BARR’s SOC clients report services lead to a 70% reduction in customer compliance questionnaires
  • SOC clients spend 75% less time spent on internal resources needed to pass audit
  • 100% referral and satisfaction rate from clients
  • Proven practical, adaptive approach that simplifies SOC reporting processes
  • Team members serve on task forces responsible for developing SOC reporting standards
  • Competitive, fixed rates to accommodate growing enterprises

Recent Blog Posts

Case Study: BARR Advisory and Convictional

E-Commerce Platform Partners with BARR, Utilizes SOC 2 to Grow Business and Cut Sales Cycle in Half

| Case Studies, Cloud Computing, News, SaaS, SOC Reporting | No Comments

The best way to understand how, what, and why we do what we do here at BARR is to learn about our work through another company’s experience. We’re proud to…

CyberXchange featured BARR Advisory founder and president on latest podcast.

CyberXchange’s Latest Innovator Spotlight Features BARR Founder and President Brad Thies

| CISO, Cloud Computing, Company Culture, News, SaaS, Security, SOC Reporting | No Comments

Brad Thies, BARR Advisory founder and president, recently sat down with Armistead Whitney, CEO of Apptega, to discuss a variety of topics ranging from what differentiates BARR as a company…

Person holding tablet with image of VPN button on screen

SOC 2 Trust Services Criteria: What They Are and How to Select the Right Ones

| Data Privacy, Risk Management, Security, SOC Reporting | No Comments

One of the first steps you’ll take when preparing for a SOC 2 audit is selecting which trust services criteria may be included in the report. Every SOC 2 audit…

Contact Us for a Free Consultation

We’re here to help you! Speak with a BARR specialist about your security and compliance needs.