KAM Certifications is now Fendix
SOC 2

Provide confidence with a SOC 2 certification

Schedule a no-obligation introduction
Provide confidence with a SOC 2 certification

This is what a SOC 2 statement entails

SOC 2 is a global statement used to ensure the protection and control of customer data in outsourced IT operations. Consider companies that process and store customer data in the cloud or third-party service providers that manage IT infrastructure for customers.

Why SOC 2

  • You have control and protection of customer data in outsourced IT operations
  • Your customers will increasingly ask for it
  • External parties or clients may/demand that your outsourced processes be audited when you cannot demonstrate this with a certificate
  • You stand out from your competitors
  • You show that your organization complies with legal obligations, such as the AVG.

What to expect from the implementation process

The content of SOC 2 is determined by the Trust Services Criteria, a mandatory set of management objectives. It includes, among other things:

  • Risk analysis and determination of maturity level of your organization
  • Planning measures and processes within the scope
  • Technical and organizational preparations
  • External audit by IT auditor (RE).

Implementing the SOC Type 2 statement can be challenging. Fortunately, our experts can help you do just that. Because of our experience in information security and implementing management systems, we can guide your organization efficiently. Moreover, we are partners with all Certifying Bodies (CIs) in the Netherlands. This ensures direct and fast communication. This allows us to support you even better before, during and after the process.

Frequently Asked Questions

What is the cost for SOC 2 certification?

The cost of conducting a SOC 2 implementation depends on several factors, including the scope of the report, the number of processes to be audited and the support required. Want to know exactly what it will cost? We will prepare a no-obligation quote. Feel free to contact us and we will be happy to help you.


What is the difference between SOC 2 and ISAE 3402?

Whereas SOC 2 focuses on information security and privacy, ISAE 3402 focuses primarily on outsourced outsourced processes that impact the financial statements. Moreover, with SOC 2 reports, the management objectives are set in advance, whereas with an ISAE 3402 report, the organization gets to set the framework itself.


When to combine ISO 27001 and SOC 2?

When it comes to information security, ISO 27001 is the most widely used standard. With increasing digitalization, a SOC 2 statement is also increasingly being requested. Fortunately, much of ISO 27001 is covered by SOC 2. Therefore, it can be convenient to combine both implementation processes to save time and safeguard your organization's internal and external processes.

What is the difference between SOC 2 and SOC 1?

SOC 1 focuses on financial reporting and SOC 2 focuses on security, availability and confidentiality of information. Both reports are important to different audiences and have different goals and criteria. SOC 1 is the U.S. version of ISAE 3402.

What is SOC 3?

SOC 3 reports are intended for the general public, unlike SOC 1 and SOC 2, which are aimed at specific audiences. SOC 3 reports are shorter and less detailed than SOC 2 reports, and they do not include specific details about the audited organization. SOC 3 reports can often be found on an organization's Web site as a way to demonstrate security measures and public confidence.

What is an IT auditor (RE)?

An IT auditor (RE) specializes in conducting IT audits and assessing organizations' information security measures. The abbreviation "RE" stands for Registered EDP auditor. This refers to the former designation of this position. It is a protected title that may only be used by individuals who meet the specified requirements.

Why Fendix?

Pragmatic and flexible
Remote or on-site? Calling, emailing, or appending? We think with you and adapt effortlessly.
Innovative and entrepreneurial
We use the latest tools and methods to support you faster and smarter.
All-round knowledge partner
With our broad services and network of experts, we are your one-stop shop for information security and privacy.
Lasting relationships
We invest in long-term partnerships. For us, you are a valuable partner with whom we grow together.
More about us

This is how we proceed

GAP analysis
01
Risk analysis
02
Management System
03
Awareness
04
Internal audit + management review
05
External audit
06
Maintenance
07

Getting started with SOC 2

Want to get started with SOC 2? We have several services for you. Such as a quick scan for insight into what you need to do before your implementation or a guided or de-risking implementation process.

Accompanying implementation process

In the guided implementation process, we help you do the implementation yourself using our templates.
view service

GAP analysis

The GAP analysis provides a clear overview of what steps your organization still needs to take until certification.
view service

Schedule a no-obligation telephone intake today

We leggen je graag uit wat de SOC 2-norm inhoudt en wat deze voor jouw organisatie betekent, inclusief de stappen die nodig zijn voor een gestroomlijnde implementatie.
What to expect.
1
Schedule a no-obligation introduction
2 minutes
2
Free introduction
30 minutes
3
Insight into implementation process
Receipt of white paper
4
Customized proposal
Within 1 day
Your data
Additional Information
We always call afterward to provide a price estimate.
Thank you for your quote request!
We will contact you within one business day!
Oops, something seems to have gone wrong. Please check your information and try again.

Schedule a no-obligation telephone intake today

We leggen je graag uit wat de SOC 2-norm inhoudt en wat deze voor jouw organisatie betekent, inclusief de stappen die nodig zijn voor een gestroomlijnde implementatie.
What to expect.
1
Schedule a no-obligation introduction
2 minutes
2
Free introduction
30 minutes
3
Insight into implementation process
Receipt of white paper
4
Customized proposal
Within 1 day

We are a partner of