IT Examiner School, Providence, RI
Pen Test Value
Ascertain the likelihood of gaining system access
Likelihood of exploiting a low risk vulnerability to gain higher level access
Detecting vulnerabilities not easily found using standard system protective means
Measure of risk for a cyber attack
List of vulnerabilities needing patching
Ability of current security methods to detect or repel an attack
Additional efforts needed to protect the network(s)/system(s)
Service Organization Control (SOC) Reports
• Type I • Describes the servicer’s descriptions of controls at a specific point in time • Auditor performs no testing of servicer’s controls‐ attesting to controls based on servicer’s account of controls‐ no opinion • Type II (preferred) • Includes information from a Type I Report • Detailed testing of the servicer’s controls over a minimum consecutive six month period • Auditor expresses an opinion based on their testing
There are two types of Service Organizatio n Control (SOC) Reports:
Made with FlippingBook Annual report