Ultimate Guide to the ISC Section: CPA Exam Blueprint and Study Resources

Area I - Information Systems and Data Management (35–45%)

Skill
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
A. Information systems
1. IT infrastructure Explain the purpose and recognize examples of key components of IT architecture (e.g., operating systems, servers, network infrastructure, end-user devices).
Article: ISC CPA Exam: Understanding the Purpose and Recognizing Examples of Key Components of IT Architecture
Explain cloud computing, including cloud computing models (infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS)) and deployment models (e.g., public, private, hybrid).
Article: ISC CPA Exam: Understanding Cloud Computing Models Such as IaaS, PaaS, and SaaS
Summarize the role and responsibilities of cloud service providers.
Article: ISC CPA Exam: Understanding the Role and Responsibilities of Cloud Service Providers
Explain how the COSO frameworks address cloud computing governance.
Article: ISC CPA Exam: Understanding How the COSO Framework Addresses Cloud Computing Governance
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
2. Enterprise and accounting information systems Summarize enterprise resource planning (ERP) and accounting information systems, what they encompass and how they interact.
Article: ISC CPA Exam: Understanding What ERP and Accounting Information Systems Encompass, and How They Interact
Explain how the COSO internal control framework can be used to evaluate risks related to the use of blockchain in the context of financial reporting and to design and implement controls to address such risks.
Article: ISC CPA Exam: Understand How the COSO Internal Control Framework is Used in Relation to the Use of Blockchain in Financial Reporting
Determine potential changes to business processes to improve the performance of an accounting information system (e.g., robotic process automation, outsourcing, system changes).
Article: ISC CPA Exam: Understanding How Potential Changes to Business Processes Can Improve the Performance of an Accounting Information System
Reconcile the actual sequence of steps and the information, documents, tools and technology used in a key business process of an accounting information system (e.g., sales, cash collections, purchasing, disbursements, human resources, payroll, production, treasury, fixed assets, general ledger, reporting) to the documented process (e.g., flowchart, business process diagram, narrative).
Article: ISC CPA Exam: How to Reconcile the Actual Sequence of Steps and Information Used in a Key Business Process of an AIS to the Documented Process
Detect deficiencies in the suitability or design and deviations in the operation of controls related to an information system’s processing integrity in a SOC 2® engagement using the Trust Services Criteria.
Article: ISC CPA Exam: How to Detect Deficiencies in the Operation of Controls Related to an Information System's Processing Integrity in a SOC 2 Engagement
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
3. Availability Recall the scope, purpose and key considerations for business resiliency, disaster recovery and business continuity plans.
Article: ISC CPA Exam: Understanding the Scope, Purpose, and Key Considerations for Business Resiliency, Disaster Recovery, and Business Continuity Plans
Explain the objectives of mirroring and replication.
Article: ISC CPA Exam: Understanding the Objectives of Mirroring, Replication, and Backup
Summarize steps in a business impact analysis.
Article: ISC CPA Exam: Understanding the Steps in a Business Impact Analysis
Recall measures of system availability (e.g., agreed service time, downtime).
Article: ISC CPA Exam: Understanding the Measures of System Availability Such as Agreed Service Time and Downtime
Determine the appropriateness of the organization’s data backup types (e.g., full, incremental, differential) including recovery considerations.
Article: ISC CPA Exam: Understanding the Appropriateness of the Organization's Data Backup Types Including Recovery Considerations
Detect deficiencies in the suitability or design and deviations in the operation of controls related to a service organization’s availability service commitments and system requirements in a SOC 2® engagement using the Trust Services Criteria.
Article: ISC CPA Exam: How to Detect Deficiencies in the Operation of Controls Related to an Organization's Service Commitments and System Requirements in a SOC 2 Engagement
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
4. Change management Explain the purpose of change management related to internal hardware and software applications, including the risks and the different types of documentation used (e.g., system component inventory, baseline configuration).
Article: ISC CPA Exam: Understanding Change Management Including Authorization, the Use of Different Environments, Segregation of Duties, Testing, Conversion, and Documentation
Explain the different environments used (e.g., development, staging, production) and the types of tests performed (e.g., unit, integration, system, acceptance).
Article: ISC CPA Exam: Understanding the Key Concepts of Release Management and Patch Management Procedures
Explain the approaches than can be used when converting to a new information system (e.g., direct, parallel, pilot).
Explain patch management.
Test the design and implementation of change control policies (e.g., acceptance criteria, test results, logging, monitoring) for IT resources (e.g., applications, infrastructure components, configurations) in organizations, including those that have adopted continuous integration and continuous deployment processes.
Article: ISC CPA Exam: How to Test the Design and Implementation of Change Control Policies for IT Resources
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
B. Data management
Identify data collection methods and techniques.
Article: ISC CPA Exam: Understanding Data Collection Methods and Techniques
Define the various types of data storage (e.g., data warehouse, data lake, data mart) and database schemas (e.g., star, snowflake).
Article: ISC CPA Exam: Understanding the Various Types of Data Storage and Database Schemas
Summarize the data life cycle (i.e., the span of the use of information, from creation, through active use, storage and final disposition).
Article: ISC CPA Exam: Understanding the Data Life Cycle from Data Creation to Storage and Final Disposition
Examine a relational database’s structure to determine whether it applies data integrity rules, uses a data dictionary, and normalizes the data.
Article: ISC CPA Exam: How to Examine a Relational Database's Structure to Determine Whether It Applies Data Integrity Rules, Uses a Data Dictionary, and Normalizes the Data
Examine a standard SQL query (common commands, clauses, operators, aggregate functions and string functions) to determine whether the retrieved data set is relevant and complete.
Article: ISC CPA Exam: How to Examine a SQL Query to Determine Whether the Data Set is Relevant and Complete
Integrate the data available from different data sources to provide information necessary for financial and operational analysis and decisions.
Article: ISC CPA Exam: How to Integrate Data from Different Sources to Provide Information for Financial and Operational Analysis and Decisions
Investigate a business process model (e.g., flowchart, data flow diagram, business process model and notation (BPMN) diagram) to identify potential improvements.
Article: ISC CPA Exam: How to Investigate a Business Process Model to Identify Potential Improvements

Area ll – Security, Confidentiality and Privacy (35–45%)

0 Skill
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
A. Regulations, standards and frameworks
Recall the covered entities and permitted uses and disclosures of the HIPAA Security and Privacy Rules.
Article: ISC CPA Exam: Understanding the Covered Entities and Permitted Uses and Disclosures of the HIPAA Security and Privacy Rules
Recall the scope of the GDPR and the six principles and key concepts for personal data.
Article: ISC CPA Exam: Understanding the Scope of the GDPR and Six Principles and Key Concepts for Personal Data
Recall the requirements of the PCI DSS.
Article: ISC CPA Exam: Understanding the Requirements of the PCI DSS
Recall the three parts of the NIST CSF (Framework Core, Framework Implementation Tiers, Framework Profiles).
Article: ISC CPA Exam: Understanding the Three Parts of the NIST CSF
Recall the three parts of the NIST Privacy Framework (Framework Core, Framework Profiles, Framework Implementation Tiers).
Article: ISC CPA Exam: Understanding the Three Parts of the NIST Privacy Framework
Recall the purpose, applicability, target audience and organizational responsibilities of NIST SP 800-53.
Article: ISC CPA Exam: Understanding the Purpose, Applicability, Target Audience, and Organizational Responsibilities of NIST SP 800-53
Recall the overview of each CIS Control.
Article: ISC CPA Exam: Understanding the Overview of Each CIS Control
Recall the governance system principles, governance framework principles and the components of a governance system according to COBIT 2019.
Article: ISC CPA Exam: Understanding Governance System Principles, Governance Framework Principles, and the Components of a Governance System According to COBIT 2019
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
B. Security
1. Threats and attacks Classify the different types of threat agents (e.g., internal or external, nation or non-nation state-sponsored, adversary, threat actors, attacker or hacker).
Article: ISC CPA Exam: How to Classify the Different Types of Threat Agents Such as Internal vs External, or Attacker vs Hacker
Identify types of attacks (e.g., physical, distributed denial of service, malware, social engineering, web application attacks, mobile device attacks).
Article: ISC CPA Exam: Understanding the Types of Attacks Such as Malware, Social Engineering, Distributed Denial of Service, etc
Identify techniques used in a cyber-attack (e.g., buffer overflow, mobile code, cross-site scripting, SQL injections, race conditions, covert channel, replay and return-oriented attack).
Article: ISC CPA Exam: Understanding Techniques Used in a Cyber-Attack
Explain the stages in a cyber-attack (e.g., reconnaissance, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Article: ISC CPA Exam: Explain the Stages in a Cyber-Attack
Identify the cybersecurity risks related to using cloud environments, platforms and services.
Article: ISC CPA Exam: Understanding the Cybersecurity Risks Related to Using Cloud Environments, Platforms, and Services
Identify the cybersecurity risks related to the Internet of Things (IoT).
Article: ISC CPA Exam: Understanding the Cybersecurity Risks Related to the Internet of Things
Identify the cybersecurity risks related to mobile technologies.
Article: ISC CPA Exam: How to Identify Cybersecurity Risks Related to Mobile Technologies
Explain threat modeling and threat landscape.
Article: ISC CPA Exam: Understanding Threat Modeling and Threat Landscape in Cybersecurity
Determine the specific cybersecurity threats in an organization’s connections with customers, vendors and partner organizations.
Article: ISC CPA Exam: How to Determine the Specific Cybersecurity Threats in an Organization's Connections with Customers, Vendors, and Partner Organizations
Determine the specific cybersecurity threats to an organization’s on-premise and cloud-based applications, networks and connected devices (e.g., mobile and Internet of Things (IOT) devices).
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
2. Mitigation Identify ways to protect networks and devices used to access the network remotely (e.g., isolation and segmentation, virtual private network (VPN), wireless network security, endpoint security, system hardening, intrusion prevention and detection systems).
Article: ISC CPA Exam: Ways to Protect Networks and Devices Used to Access a Network Remotely
Recall the definition and purpose of vulnerability management.
Article: ISC CPA Exam: Understanding the Definition and Purpose of Vulnerability Management
Explain the concepts of layered security and defense-in-depth.
Article: ISC CPA Exam: Understanding the Concepts of Layered Security and Defense-in-Depth
Define the concepts of least-privilege, zero-trust, whitelisting and the need-to-know principle.
Article: ISC CPA Exam: Understanding the Concepts of Least-Privilege, Zero-Trust, Whitelisting, and the Need-to-Know Principle
Recall the purpose and content of a technology acceptable use policy including considerations specific to mobile technologies and bring-your-own-device (BYOD).
Article: ISC CPA Exam: Understanding the Purpose and Content of a Technology Acceptable Use Policy Including Considerations Specific to Mobile and BYOD Technology
Explain how the COSO frameworks can be used to assess cyber risks and controls.
Article: ISC CPA Exam: Understanding How the COSO Frameworks Can Be Used to Assess Cyber Risks and Controls
Determine the common preventive, detective or corrective controls (e.g., intrusion prevention systems, device and software hardening, log analysis, intrusion detection systems, virus quarantining, patches) to mitigate risk of cyber-attacks for an organization.
Article: ISC CPA Exam: Understanding the Preventive, Detective, or Corrective Controls to Mitigate Risk of Cyber-Attacks for an Organization
Determine the appropriate identification and authentication techniques and technologies (e.g., password management, single sign-on, multi-factor authentication, personal identification number (PIN) management, digital signatures, smart cards, biometrics) in a specific scenario.
Article: ISC CPA Exams: Understanding the Appropriate Identification and Authentication Techniques and Technologies in a Specific Scenario
Determine the appropriate authorization model (e.g., discretionary, role-based, mandatory) and the controls (e.g., access control list, account restrictions, physical barriers) used to implement the model in a specific scenario.
Article: ISC CPA Exam: How to Determine the Appropriate Authorization Model and the Controls Used to Implement the Model in a Specific Scenario
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
3. Testing Perform procedures to obtain an understanding how the entity communicates information to improve security knowledge and awareness and to model appropriate security behaviors to personnel through a security awareness training program.
Article: ISC CPA Exam: How to Perform Procedures to Understand How the Entity Communicates and Models Security Behaviors Through a Training Program
Provide input into a security assessment report by documenting the issues, findings and recommendations identified while performing tests of controls.
Article: ISC CPA Exam: How to Provide Input into a Security Assessment Report by Documenting the Issues, Findings, and Recommendations Identified After Performing Test of Controls
Perform a walkthrough of an organization’s procedures relevant to IT security (e.g., IT risk management, human resources, training and education) and compare the observed procedure with the documented policy requirement.
Article: ISC CPA Exam: How to Perform a Walkthrough of an Organization's Procedures Relevant to IT Security and Compare with the Documented Policies
Detect deficiencies in the suitability or design and deviations in the operation of controls related to a service organization’s security service commitments and system requirements in a SOC 2® engagement using the Trust Services Criteria.
Article: ISC CPA Exam: How to Detect Deficiencies in the Operation of Controls in an Organization's Commitments and Requirements in a SOC 2 Engagement
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
C. Confidentiality and privacy
Explain encryption fundamentals, techniques and applications.
Article: ISC CPA Exam: Understanding Encryption Fundamentals, Techniques, and Applications
Recall the differences between confidentiality and privacy.
Article: ISC CPA Exam: Understanding the Differences Between Confidentiality and Privacy in Cybersecurity
Identify methods for the protection of confidential data during the design, development, testing and implementation of applications that use confidential data (e.g., data obfuscation, tokenization).
Article: ISC CPA Exam: Methods for the Protection of Data During the Design, Development, Testing, and Implementation of Applications Using Confidential Data
Explain Data Loss Prevention (DLP).
Article: ISC CPA Exam: Understanding Data Loss Prevention (DLP) in Cybersecurity
Identify financial and operational implications of a data breach.
Article: ISC CPA Exam: Understanding Financial and Operational Implications of a Data Breach
Determine controls and data management practices to securely collect, process, store, transmit and delete confidential data or data subject to privacy regulations.
Article: ISC CPA Exam: Determining Controls and Data Management Practices to Securely Collect, Process, Store, Transmit, and Delete Confidential Data
Detect deficiencies in the suitability or design and deviations in the operation of controls related to a service organization’s confidentiality and privacy service commitments and system requirements in a SOC 2® engagement using the Trust Services Criteria.
Article: ISC CPA Exam: Detecting Deficiencies in the Operation of Controls in a Service Organization's Service Commitments and Systems in a SOC 2 Engagement
Perform a walkthrough of an organization’s procedures relevant to confidentiality and privacy (e.g., IT risk management, human resources, training and education) and compare the observed procedure with the documented policy requirement.
Article: ISC CPA Exams: How to Perform a Walkthrough of an Organization's Procedures Related to Confidentiality and Privacy and Compare with Documented Policies
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
D. Incident response
Recall the differences between security/cybersecurity events and incidents.
Article: ISC CPA Exam: Understanding the Differences Between Security and Cybersecurity Events and Incidents
Explain the use of insurance as a mitigation strategy for a security incident or data breach.
Article: ISC CPA Exam: Understanding the Use of Insurance as a Mitigation Strategy for a Security Incident or Data Breach
Summarize contents commonly included in incident response plans (e.g., roles, responsibilities, methods, steps, timelines).
Article: ISC CPA Exam: Understanding Contents Commonly Included in Incident Response Plans
Perform procedures to test whether the entity responded to cybersecurity incidents in accordance with the incident response plan.
Article: ISC CPA Exams: How to Perform Procedures to Test Whether the Entity Responded to Cybersecurity Incidents in Accordance with the Incident Response Plan

Area III – Considerations for System and Organization Controls (SOC) Engagements (15–25%)

Skill
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
A. Considerations specific to planning and performing a SOC engagement
Explain the purpose of the Trust Services Criteria and its organization (e.g., alignment with the COSO Internal Control – Integrated Framework, supplemental criteria, common criteria and additional specific criteria).
Article: ISC CPA Exam: Understanding the Trust Services Criteria and Its Organization in a SOC Engagement
Recall the types of subject matters a practitioner may be engaged to report on using the Trust Services Criteria.
Article: ISC CPA Exam: Understanding he Types of Subject Matters a Practitioner May be Engaged to Report on Using the Trust Services Criteria
Identify management assertions specific to the different categories and types (Type 1 and Type 2) of SOC engagements (SOC 1®, SOC 2®, SOC 3®).
Article: ISC CPA Exam: How to Identify Management Assertions Specific to the Different Categories and Types of SOC Engagements
Recall the intended users of SOC 1®, SOC 2® and SOC 3® reports.
Article: ISC CPA Exam: Understanding the Intended Users of SOC 1, SOC 2, and SOC 3 Reports
Summarize the independence considerations between the service auditor, service organization and subservice organizations.
Article: ISC CPA Exam: Understanding the Independence Considerations Between the Service Auditor, Service Organization, and Subservice Organizations
Explain how materiality is determined and used in performing a SOC engagement (SOC 1®, SOC 2®).
Article: ISC CPA Exam: Understanding How Materiality is Determined and Used in Performing a SOC 1 or SOC 2 Engagement
Identify the risk assessment requirements for a service organization and the service auditor.
Article: ISC CPA Exam: Understanding the Risk Assessment Requirements for a Service Organization and the Service Auditor
Summarize the criteria for a vendor to be considered a subservice organization.
Article: ISC CPA Exam: Understanding the Criteria for a Vendor to be Considered a Subservice Organization
Explain the considerations for deciding between, and use of, the inclusive and carve-out method for subservice organizations and complementary subservice organization controls (CSOCs).
Article: ISC CPA Exam: Understanding the Considerations for Deciding Between and Use of, the Inclusive and Carve-Out Method for Subservice Organizations and CSOCs
Define service commitments and system requirements in a SOC 2® engagement and how they correspond to an entity’s objectives referred to in the Trust Services Criteria.
Article: ISC CPA Exam: Understanding Service Commitments and System Requirements in a SOC 2 Engagement and How They Correspond to the Trust Services Criteria
Recall the impact of subsequently discovered facts on the SOC engagement (SOC 1®, SOC 2®).
Article: Understanding the Impact of Subsequently Discovered Facts on a SOC 1 or SOC 2 Engagement
Explain the purpose and common sections of a system description subject to SOC 1® or SOC 2® engagements.
Article: ISC CPA Exam: Understanding the Purpose and Common Sections of a System Description Subject to SOC 1 or SOC 2 Engagements
Recall the Description Criteria for Management’s Description of an Entity’s Cybersecurity Risk Management Program.
Article: ISC CPA Exam: Understanding the Description Criteria for Management's Description of an Entity's Cybersecurity Risk Management Program
Explain the purpose of complementary user entity controls (CUECs) identified by service organization management in their system description.
Article: ISC CPA Exam: Understanding the Purpose of Complementary User Entity Controls (CUECs) Identified by Service Organization Management in their System Description
Recall requirements about obtaining management’s written representations in a SOC engagement (SOC 1®, SOC 2®).
Article: ISC CPA Exam: Understanding Requirements About Obtaining Management's Written Representations in a SOC 1 or SOC 2 Engagement
Obtain an understanding of the system addressed by a SOC 2® engagement, including the clear identification of the boundaries of the system as defined by the service organization.
Article: How to Obtain an Understanding of the System Addressed by a SOC 2 Engagement, Including the Boundaries of the System
Perform procedures to obtain an understanding of how a service organization provides its personnel and external users information on how to report failures, incidents, concerns and other complaints related to a system subject to a SOC 2® engagement.
Article: ISC CPA Exam: How to Obtain an Understanding of How a Service Organization Provides Its Users Information on How to Report on a System Subject to a SOC 2 Engagement
Prepare a comparison of management’s system description to suitable criteria in a SOC 1® engagement or to the description criteria in a SOC 2® engagement.
Article: ISC CPA Exam: How to Prepare a Comparison of Management's System Description to Suitable Criteria in a SOC 1 or SOC 2 Engagement
Determine the effect of subsequent events in a SOC 1® or SOC 2® engagement.
Article: ISC CPA Exam: How to Perform Procedures to Identify Subsequent Events That Could Require Disclosure Related to a SOC 1 or SOC 2 Engagement
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
B. Considerations specific to reporting on a SOC engagement
Explain the effect of CUECs on the SOC report (SOC 1®, SOC 2®).
Article: ISC CPA Exam: Understanding the Effect of CUECs on a SOC 1 or SOC 2 Report
Summarize the carve-out vs. the inclusive method of reporting on CSOCs.
Article: ISC CPA Exam: Understanding the Carve-Out vs the Inclusive Method of Reporting on CSOCs in a SOC Engagement
Explain the types of opinions and report modifications when deficiencies have been identified.
Article: ISC CPA Exam: Understanding the Types of Opinions and Report Modifications When Deficiencies Have Been Identified in a SOC Engagement
Prepare results of testing of controls to be included in the SOC 2® report of the test of a control, including when there was an exception identified by the test.
Article: ISC CPA Exam: How to Prepare Results of Testing of Controls to be Included in the SOC 2 Report of the Test of a Control
Determine the appropriate form and content of a report on the examination of controls at a service organization (SOC 1®, SOC 2®).
Article: ISC CPA Exam: How to Determine the Appropriate Form and Content of a Report on the Examination of Controls at a Service Organization Related to a SOC Engagement
Skill
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
A. Considerations specific to planning and performing a SOC engagement
Explain the purpose of the Trust Services Criteria and its organization (e.g., alignment with the COSO Internal Control – Integrated Framework, supplemental criteria, common criteria and additional specific criteria).
Article: ISC CPA Exam: Understanding the Trust Services Criteria and Its Organization in a SOC Engagement
Recall the types of subject matters a practitioner may be engaged to report on using the Trust Services Criteria.
Article: ISC CPA Exam: Understanding he Types of Subject Matters a Practitioner May be Engaged to Report on Using the Trust Services Criteria
Identify management assertions specific to the different categories and types (Type 1 and Type 2) of SOC engagements (SOC 1®, SOC 2®, SOC 3®).
Article: ISC CPA Exam: How to Identify Management Assertions Specific to the Different Categories and Types of SOC Engagements
Recall the intended users of SOC 1®, SOC 2® and SOC 3® reports.
Article: ISC CPA Exam: Understanding the Intended Users of SOC 1, SOC 2, and SOC 3 Reports
Summarize the independence considerations between the service auditor, service organization and subservice organizations.
Article: ISC CPA Exam: Understanding the Independence Considerations Between the Service Auditor, Service Organization, and Subservice Organizations
Explain how materiality is determined and used in performing a SOC engagement (SOC 1®, SOC 2®).
Article: ISC CPA Exam: Understanding How Materiality is Determined and Used in Performing a SOC 1 or SOC 2 Engagement
Identify the risk assessment requirements for a service organization and the service auditor.
Article: ISC CPA Exam: Understanding the Risk Assessment Requirements for a Service Organization and the Service Auditor
Summarize the criteria for a vendor to be considered a subservice organization.
Article: ISC CPA Exam: Understanding the Criteria for a Vendor to be Considered a Subservice Organization
Explain the considerations for deciding between, and use of, the inclusive and carve-out method for subservice organizations and complementary subservice organization controls (CSOCs).
Article: ISC CPA Exam: Understanding the Considerations for Deciding Between and Use of, the Inclusive and Carve-Out Method for Subservice Organizations and CSOCs
Define service commitments and system requirements in a SOC 2® engagement and how they correspond to an entity’s objectives referred to in the Trust Services Criteria.
Article: ISC CPA Exam: Understanding Service Commitments and System Requirements in a SOC 2 Engagement and How They Correspond to the Trust Services Criteria
Recall the impact of subsequently discovered facts on the SOC engagement (SOC 1®, SOC 2®).
Article: Understanding the Impact of Subsequently Discovered Facts on a SOC 1 or SOC 2 Engagement
Explain the purpose and common sections of a system description subject to SOC 1® or SOC 2® engagements.
Article: ISC CPA Exam: Understanding the Purpose and Common Sections of a System Description Subject to SOC 1 or SOC 2 Engagements
Recall the Description Criteria for Management’s Description of an Entity’s Cybersecurity Risk Management Program.
Article: ISC CPA Exam: Understanding the Description Criteria for Management's Description of an Entity's Cybersecurity Risk Management Program
Explain the purpose of complementary user entity controls (CUECs) identified by service organization management in their system description.
Article: ISC CPA Exam: Understanding the Purpose of Complementary User Entity Controls (CUECs) Identified by Service Organization Management in their System Description
Recall requirements about obtaining management’s written representations in a SOC engagement (SOC 1®, SOC 2®).
Article: ISC CPA Exam: Understanding Requirements About Obtaining Management's Written Representations in a SOC 1 or SOC 2 Engagement
Obtain an understanding of the system addressed by a SOC 2® engagement, including the clear identification of the boundaries of the system as defined by the service organization.
Article: How to Obtain an Understanding of the System Addressed by a SOC 2 Engagement, Including the Boundaries of the System
Perform procedures to obtain an understanding of how a service organization provides its personnel and external users information on how to report failures, incidents, concerns and other complaints related to a system subject to a SOC 2® engagement.
Article: ISC CPA Exam: How to Obtain an Understanding of How a Service Organization Provides Its Users Information on How to Report on a System Subject to a SOC 2 Engagement
Prepare a comparison of management’s system description to suitable criteria in a SOC 1® engagement or to the description criteria in a SOC 2® engagement.
Article: ISC CPA Exam: How to Prepare a Comparison of Management's System Description to Suitable Criteria in a SOC 1 or SOC 2 Engagement
Determine the effect of subsequent events in a SOC 1® or SOC 2® engagement.
Article: ISC CPA Exam: How to Perform Procedures to Identify Subsequent Events That Could Require Disclosure Related to a SOC 1 or SOC 2 Engagement
Content group/topic Remembering & Understanding Application Analysis Evaluation Representative Task
B. Considerations specific to reporting on a SOC engagement
Explain the effect of CUECs on the SOC report (SOC 1®, SOC 2®).
Article: ISC CPA Exam: Understanding the Effect of CUECs on a SOC 1 or SOC 2 Report
Summarize the carve-out vs. the inclusive method of reporting on CSOCs.
Article: ISC CPA Exam: Understanding the Carve-Out vs the Inclusive Method of Reporting on CSOCs in a SOC Engagement
Explain the types of opinions and report modifications when deficiencies have been identified.
Article: ISC CPA Exam: Understanding the Types of Opinions and Report Modifications When Deficiencies Have Been Identified in a SOC Engagement
Prepare results of testing of controls to be included in the SOC 2® report of the test of a control, including when there was an exception identified by the test.
Article: ISC CPA Exam: How to Prepare Results of Testing of Controls to be Included in the SOC 2 Report of the Test of a Control
Determine the appropriate form and content of a report on the examination of controls at a service organization (SOC 1®, SOC 2®).
Article: ISC CPA Exam: How to Determine the Appropriate Form and Content of a Report on the Examination of Controls at a Service Organization Related to a SOC Engagement