{"id":1577,"date":"2023-08-14T06:35:58","date_gmt":"2023-08-14T06:35:58","guid":{"rendered":"https:\/\/www.iso-saudi.net\/blog\/?p=1577"},"modified":"2023-08-14T06:35:58","modified_gmt":"2023-08-14T06:35:58","slug":"ensure-continued-functionality-with-the-soc-audit-processes","status":"publish","type":"post","link":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/","title":{"rendered":"Ensure continued functionality with the SOC audit processes"},"content":{"rendered":"<p style=\"font-weight: 400;\"><strong><em>\u201cReduce your cost of compliant upfront with us\u201d<\/em><\/strong><\/p>\n<p style=\"font-weight: 400;\">If you are struggling to provide assurance around the risk management and controls, ISO-SAUDI\u00a0 will help you to attain the right path. You need to know\u00a0\u00a0about the term \u2018SOC\u2019 and this is abbreviated as <strong>System and Organization Controls\u00a0<\/strong>which is type of assessment which analyses an organization\u2019s internal security controls for IT systems, data security, financial reporting and other operational areas. It is also considered as one of the best methodologies to develop trust which is performed by a third-party independent CPA (Auditors) or any firm accredited by the American Institute of Certified Public Accountants (AICPA). They provide the clients and stakeholders reassurance concerning the efficiency and the security of the systems and its data.<\/p>\n<figure id=\"attachment_1578\" aria-describedby=\"caption-attachment-1578\" style=\"width: 1920px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1578 size-full\" src=\"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg\" alt=\"Ensure continued functionality with the SOC audit processes\" width=\"1920\" height=\"1080\" srcset=\"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg 1920w, https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes-300x169.jpg 300w, https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes-1024x576.jpg 1024w, https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes-1536x864.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><figcaption id=\"caption-attachment-1578\" class=\"wp-caption-text\">\u00a0<\/figcaption><\/figure>\n<p style=\"font-weight: 400;\"><strong>HOW IT IS DONE<\/strong><\/p>\n<p style=\"font-weight: 400;\">The company\u2019s information security controls will be assessed by ISO-SAUDI and the CPA who will also gauge the extent to which each SOC control target is met by the documentation provided.\u00a0\u00a0The CPA will publish a SOC report on whether the company\u2019s internal cybersecurity posture complies with the SOC 2 security standards and requirements. A SOC audit report will boost up the trust quickly and it would serve as a great reference from an auditor, as they are well known important player in this sector.<\/p>\n<p style=\"font-weight: 400;\"><strong>TYPES OF SOC AUDIT REPORTS<\/strong><\/p>\n<p style=\"font-weight: 400;\">In SOC audit, reports play a key role here, and there are three different types of SOC reports. For the evaluation, the type of SOC report can vary depending on the service of the organization. They might need one, two or all the three types of the reports. The three types of SOC reports are listed as,<\/p>\n<ul>\n<li style=\"font-weight: 400;\">SOC 1<\/li>\n<li style=\"font-weight: 400;\">SOC 2<\/li>\n<li style=\"font-weight: 400;\">SOC 3<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">As mentioned earlier, the coverage and the utility differ from one report to the other.<\/p>\n<p style=\"font-weight: 400;\"><strong>SOC 1<\/strong><\/p>\n<p style=\"font-weight: 400;\">This type of SOC report covers the Internal Controls over Financial Reporting (ICFR). It applies to businesses that provide service that has an effect on the financial statements of their customers such as data centres, payroll processing businesses and collection agencies.<\/p>\n<p style=\"font-weight: 400;\"><strong>SOC 2<\/strong><\/p>\n<p style=\"font-weight: 400;\">This is a type of report which has a more general set of controls and is available to all service organizations. There are five trust services criteria, Security, Privacy, Confidentiality, Availability and Processing Integrity. The entity may request both the reports if the organization is large enough to offer financial reporting services in addition to other services.<\/p>\n<p style=\"font-weight: 400;\">An SOC 2 audit report generally includes,<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Opinion letter<\/li>\n<li style=\"font-weight: 400;\">Management assertion<\/li>\n<li style=\"font-weight: 400;\">Detailed description of system<\/li>\n<li style=\"font-weight: 400;\">Details on selected trust services categories<\/li>\n<li style=\"font-weight: 400;\">Test of controls<\/li>\n<li style=\"font-weight: 400;\">Results<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><strong>SOC 3<\/strong><\/p>\n<p style=\"font-weight: 400;\">SOC 3 and SOC 2 are similar but not the same. Both uses the trust services as an evaluation criterion. The target audience are where they differ, SOC 2 is a lengthy, in-depth audit report intended primarily for other businesses to study whereas, SOC 3 is a shorter, more legible audit report that is meant to be read by the general public.<\/p>\n<p style=\"font-weight: 400;\">If the organisation is a service provider to both businesses and individual customers, then both SOC 2 and SOC 3 both audit report are required for the evaluation.<\/p>\n<p style=\"font-weight: 400;\">There is another form of report in addition to the ones, listed above.<\/p>\n<ul>\n<li style=\"font-weight: 400;\">SOC TYPE I- It is a short, crisp and a less detailed report. It usually takes a little three weeks to complete this report. Additionally, it was tested to see if the controls were created appropriately.<\/li>\n<li style=\"font-weight: 400;\">Pros: Time Saver<\/li>\n<li style=\"font-weight: 400;\">Cons: Less Assurance<\/li>\n<li style=\"font-weight: 400;\">SOC TYPE II- This is contradictory to Type I, this is an elaborative and evaluated over a period of time. It is mainly used to determine whether the control functions are deliberated. It can take up to 12 months to complete.<\/li>\n<li style=\"font-weight: 400;\">Pros: More Comprehensive<\/li>\n<li style=\"font-weight: 400;\">Cons: Time and Money<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><em>\u00a0<\/em><em>\u201cAuditing is not the destination; it is a journey, discovery at each step\u201d\u00a0<\/em><\/p>\n<p style=\"font-weight: 400;\"><strong>SOC for Cybersecurity<\/strong><\/p>\n<p style=\"font-weight: 400;\">SOC for cybersecurity is a newbie where it highlights about the controls of the organization\u2019s cybersecurity risk programs.<\/p>\n<p style=\"font-weight: 400;\"><strong>\u00a0<\/strong><strong>SOC for Vendor Supply<\/strong><\/p>\n<p style=\"font-weight: 400;\">AICPA has released a new guidance for SOC for Supply Chain reporting that provides information on the procedures and risk-mitigation measures used.<\/p>\n<p style=\"font-weight: 400;\"><strong>Trusted Services Categories<\/strong><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><strong>Security-\u00a0<\/strong>How well it safeguards from unauthorized invasion<\/li>\n<li style=\"font-weight: 400;\"><strong>Availability-\u00a0<\/strong>How easily the information systems are accessible<\/li>\n<li style=\"font-weight: 400;\"><strong>Privacy-\u00a0<\/strong>Usage and disposal of private data.<\/li>\n<li style=\"font-weight: 400;\"><strong>Confidentiality-<\/strong>How well it protects the sensitive data<\/li>\n<li style=\"font-weight: 400;\"><strong>Processing Integrity-<\/strong>Systems able to function properly.<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\"><strong>\u00a0<\/strong><strong>HOW TO PREPARE FOR A SOC AUDIT<\/strong><\/p>\n<ol>\n<li style=\"font-weight: 400;\">Report type<\/li>\n<li style=\"font-weight: 400;\">Define Audit scope<\/li>\n<li style=\"font-weight: 400;\">Gap analysis<\/li>\n<li style=\"font-weight: 400;\">Rediness assessment<\/li>\n<\/ol>\n<p style=\"font-weight: 400;\">SOC summarises the findings of detailed evaluation of organisation\u2019s control, systems and procedures. It also provides succinct overview of the audit, efficiency and the areas that require further investigation. SOC is essential for giving stakeholders valuable insights about the organisation\u2019s security, compliance and integrity. ISO-SAUDI offers this comprehensive process for your organization to establish the trust and transparency within your user entities.<\/p>\n<p>Drop us an email\u00a0<strong>info@iso-saudi.net<\/strong><\/p>\n<p>Services Offered :- Riyadh, Dammam, Yanbu, Jeddah, Jubail, Hofuf<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cReduce your cost of compliant upfront with us\u201d If you are struggling to provide assurance around the risk management and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1578,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[583],"tags":[598],"class_list":["post-1577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-soc-1-certification","tag-soc-1"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ensure continued functionality with the SOC audit processes - ISO Saudi Arabia<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ensure continued functionality with the SOC audit processes - ISO Saudi Arabia\" \/>\n<meta property=\"og:description\" content=\"\u201cReduce your cost of compliant upfront with us\u201d If you are struggling to provide assurance around the risk management and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/\" \/>\n<meta property=\"og:site_name\" content=\"ISO Saudi Arabia\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-14T06:35:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/#\/schema\/person\/d8b33624737a3c0e53b36522a4f404fd\"},\"headline\":\"Ensure continued functionality with the SOC audit processes\",\"datePublished\":\"2023-08-14T06:35:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/\"},\"wordCount\":817,\"publisher\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg\",\"keywords\":[\"SOC 1\"],\"articleSection\":[\"soc 1 certification\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/\",\"url\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/\",\"name\":\"Ensure continued functionality with the SOC audit processes - ISO Saudi Arabia\",\"isPartOf\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg\",\"datePublished\":\"2023-08-14T06:35:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#primaryimage\",\"url\":\"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg\",\"contentUrl\":\"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Ensure continued functionality with the SOC audit processes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iso-saudi.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ensure continued functionality with the SOC audit processes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/#website\",\"url\":\"https:\/\/www.iso-saudi.net\/blog\/\",\"name\":\"ISO Saudi Arabia\",\"description\":\"ISO Saudi Arabia\",\"publisher\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iso-saudi.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/#organization\",\"name\":\"ISO Saudi Arabia\",\"url\":\"https:\/\/www.iso-saudi.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2019\/11\/logo-1.png\",\"contentUrl\":\"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2019\/11\/logo-1.png\",\"width\":181,\"height\":38,\"caption\":\"ISO Saudi Arabia\"},\"image\":{\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iso-saudi.net\/blog\/#\/schema\/person\/d8b33624737a3c0e53b36522a4f404fd\",\"name\":\"admin\",\"sameAs\":[\"http:\/\/9558030567f6cd9afb9be1c2f5fc56bf\"],\"url\":\"https:\/\/www.iso-saudi.net\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ensure continued functionality with the SOC audit processes - ISO Saudi Arabia","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/","og_locale":"en_US","og_type":"article","og_title":"Ensure continued functionality with the SOC audit processes - ISO Saudi Arabia","og_description":"\u201cReduce your cost of compliant upfront with us\u201d If you are struggling to provide assurance around the risk management and [&hellip;]","og_url":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/","og_site_name":"ISO Saudi Arabia","article_published_time":"2023-08-14T06:35:58+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#article","isPartOf":{"@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/"},"author":{"name":"admin","@id":"https:\/\/www.iso-saudi.net\/blog\/#\/schema\/person\/d8b33624737a3c0e53b36522a4f404fd"},"headline":"Ensure continued functionality with the SOC audit processes","datePublished":"2023-08-14T06:35:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/"},"wordCount":817,"publisher":{"@id":"https:\/\/www.iso-saudi.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg","keywords":["SOC 1"],"articleSection":["soc 1 certification"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/","url":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/","name":"Ensure continued functionality with the SOC audit processes - ISO Saudi Arabia","isPartOf":{"@id":"https:\/\/www.iso-saudi.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#primaryimage"},"image":{"@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg","datePublished":"2023-08-14T06:35:58+00:00","breadcrumb":{"@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#primaryimage","url":"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg","contentUrl":"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2023\/08\/Ensure-continued-functionality-with-the-SOC-audit-processes.jpg","width":1920,"height":1080,"caption":"Ensure continued functionality with the SOC audit processes"},{"@type":"BreadcrumbList","@id":"https:\/\/www.iso-saudi.net\/blog\/ensure-continued-functionality-with-the-soc-audit-processes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iso-saudi.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Ensure continued functionality with the SOC audit processes"}]},{"@type":"WebSite","@id":"https:\/\/www.iso-saudi.net\/blog\/#website","url":"https:\/\/www.iso-saudi.net\/blog\/","name":"ISO Saudi Arabia","description":"ISO Saudi Arabia","publisher":{"@id":"https:\/\/www.iso-saudi.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iso-saudi.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iso-saudi.net\/blog\/#organization","name":"ISO Saudi Arabia","url":"https:\/\/www.iso-saudi.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iso-saudi.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2019\/11\/logo-1.png","contentUrl":"https:\/\/www.iso-saudi.net\/blog\/wp-content\/uploads\/2019\/11\/logo-1.png","width":181,"height":38,"caption":"ISO Saudi Arabia"},"image":{"@id":"https:\/\/www.iso-saudi.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iso-saudi.net\/blog\/#\/schema\/person\/d8b33624737a3c0e53b36522a4f404fd","name":"admin","sameAs":["http:\/\/9558030567f6cd9afb9be1c2f5fc56bf"],"url":"https:\/\/www.iso-saudi.net\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/posts\/1577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/comments?post=1577"}],"version-history":[{"count":1,"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/posts\/1577\/revisions"}],"predecessor-version":[{"id":1579,"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/posts\/1577\/revisions\/1579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/media\/1578"}],"wp:attachment":[{"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/media?parent=1577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/categories?post=1577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iso-saudi.net\/blog\/wp-json\/wp\/v2\/tags?post=1577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}