Glossary of Compliance

Compliance Glossary

Our list of curated compliance glossary offers everything you to know about compliance in one place.

Glossary » SOC 2 » SAS 70

SAS 70

SAS 70 is a standard developed by the American Institute of Certified Public Accountants (AICPA) to evaluate the security controls of service organizations. It guides them and their auditors to demonstrate the effectiveness of their controls to their clients and their clients’ auditors.

SAS 70 is currently replaced by the Statement on Standards for Attestation Engagements (SSAE) 18, which is the current standard for evaluating the controls of service organizations. While the SSAE 18 standard includes the same types of evaluations as SAS 70, it is updated to align with current industry best practices and to reflect changes in technology and the business environment.

Today, SOC 2 audits follow the SSAE 18 standard rather than SAS 70.

Additional reading

Best incident response software

What is Incident Response Software: How to Choose one?

Oct 2021: a printer in a hospital in Tokushima, Japan, started printing out papers on its own after their systems were compromised by ransomware. Attackers demanded money in exchange for decrypting the encrypted patient data of 85,000 patients. They recovered eventually but could have avoided the situation had they deployed incident response software.  The security…
Risk assessment tools

Best Risk Assessment Tools for Managing Cyber Risk

Risk assessment is an activity that helps organizations strengthen their security posture. A well-rounded risk assessment process will help you identify potential risks to your compliance, evaluate risk severity, and minimize their impact on business operations and continuity.  It will require more than assessing risk to streamline your security-strengthening process; your organization must also deploy…

Cybersecurity Architecture: Building a Strong Security Foundation

In May 2021, one of the largest fuel pipelines in the United States was forced to shut down after malicious actors successfully breached their computer network and launched a ransomware attack. The shutdown of this critical infrastructure highlights how hackers can exploit vulnerabilities and halt operation, even in large government systems.  Officials responding to this…

Sprinto: Your growth superpower

Use Sprinto to centralize security compliance management – so nothing
gets in the way of your moving up and winning big.