You are on page 1of 1

KirkpatrickPrice

Innovation. Integrity. Delivered.

SOC 1 Compliance Checklist


SOC 1 Compliance Checklist Is access to data, software, functions, and other
IT resources limited to authorized personnel
Does your organization have a defined based on roles?
organizational structure?
Does your organization restrict physical access to
Has your organization designated authorized sensitive locations to authorized personnel only?
employees to develop and implement policies
and procedures? Has your organization implemented an access control
system and implemented monitoring to identify
What is your organization’s background intrusions?
screening procedure?
Has your organization developed and tested incident
Does your organization have established response procedures?
workforce conduct standards?
Is software, hardware, and infrastructure updated
Do clients and employees understand their role regularly as necessary?
in using your system or service?
Does your organization have a change management
Are system changes effectively communicated process to address deficiencies in controls?
to the appropriate personnel in a timely manner?
What is your organization’s data backup and recovery
Has your organization performed a formal risk policies?
assessment?
How is your organization addressing
• Has your organization identified potential environmental risks?
threats to the system?
Have your organization’s disaster recovery and
• Has your organization analyzed the business continuity plans been tested
significance of the risks associated with and documented?
each threat?
How is your organization ensuring data is being
• What are your organization’s mitigation processed, stored, and maintained accurately
strategies for those risks? and timely?

Does your organization perform regular vendor How is your organization protecting confidential
management assessments? information (especially financial information) against
unauthorized access, use, and disclosure?
Has your organization developed policies and
procedures that address all controls? Does your organization have a fully documented data
retention policy?
Does your organization perform an annual policy
and procedure review?

Does your organization have physical and logical


access controls in place?

You might also like