SOC 2 Basics: Trust Services Criteria

tabla jazz, garage tango, saxophone drum and bass · 4:21

Listen on 93

Lyrics

[Verse 1]
When companies handle your precious data streams
They need to prove their systems aren't just dreams
SOC 2 audits check if trust runs deep
Five criteria guard the secrets that they keep

Type One takes a snapshot, frozen moment's glance
Type Two watches closely through time's dance
Months of monitoring, patterns they trace
To see if controls maintain their steady pace

[Chorus]
S-A-P-C-P, remember these five keys
Security locks the vault doors tight
Availability keeps the servers bright
Processing with Integrity pure
Confidentiality keeps secrets sure
Privacy shields what belongs to you
SOC 2 makes these promises true

[Verse 2]
Security builds the fortress walls up high
Firewalls and patches reach toward the sky
Access controls decide who gets inside
Authentication systems verify with pride

Availability means the lights stay on
No crashes when the morning comes with dawn
Uptime percentages, backup systems ready
Performance metrics keeping service steady

[Chorus]
S-A-P-C-P, remember these five keys
Security locks the vault doors tight
Availability keeps the servers bright
Processing with Integrity pure
Confidentiality keeps secrets sure
Privacy shields what belongs to you
SOC 2 makes these promises true

[Bridge]
Processing Integrity checks the math is right
No corruption sneaking in the night
Confidentiality wraps sensitive things
In encryption's protective wings

Privacy goes beyond just hiding files
Respects your choices, honors your profile
Collection, usage, sharing with consent
Transparency in every intent

[Verse 3]
Auditors arrive with checklists in their hands
Testing every control the company planned
Evidence and documentation they review
Management assertions - are they really true?

Months of scrutiny for Type Two's thorough way
Operating effectiveness on full display
The final report reveals what they found
Trust services criteria safe and sound

[Outro]
From design to operation, controls must prove
That customer data's in a trusted groove
S-A-P-C-P, the framework stands complete
Making digital trust concrete

← What is Compliance? CTO Fundamentals | ISO 27001: Information Security Management →