Vinod Sebastian – B.Tech, M.Com, PGCBM, PGCPM, PGDBIO

Hi I'm a Web Architect by Profession and an Artist by nature. I love empowering People, aligning to Processes and delivering Projects.

Advertisements




SAS 70 Type II Audit – Data Security

Overview

SAS 70 (Statement on Auditing Standards) Type II Audit is an examination of the controls that impact the security, availability, processing integrity, confidentiality, and privacy of data processed by a service organization. It provides assurance to customers and stakeholders regarding the reliability of the service provider’s systems and processes.

Types of Testing in SAS 70 Type II Audit

  • Compatibility Testing: This type of testing evaluates how well software functions in specific hardware, software, operating system, network, or other environments.
  • Exploratory Testing: It involves creative and informal testing without predefined test plans or cases. Testers learn about the software while testing.
  • Ad-hoc Testing: Similar to exploratory testing, but testers have a good understanding of the software before testing begins.
  • Context-Driven Testing: Testing based on an understanding of the environment, culture, and intended use of the software. Testing strategies vary based on the software’s purpose.
  • Comparison Testing: This involves evaluating the strengths and weaknesses of software in comparison to its competitors.
  • Mutation Testing: A method to assess the effectiveness of test data or cases by intentionally introducing code changes (bugs) and retesting to check if the bugs are detected. It requires significant computational resources.

Importance of SAS 70 Type II Audit

Conducting a SAS 70 Type II Audit is crucial for service organizations to demonstrate their commitment to data security and compliance with industry standards. It enhances trust with customers and partners by providing independent validation of the organization’s controls and processes.

Conclusion

In conclusion, SAS 70 Type II Audit plays a vital role in ensuring the security and integrity of data processed by service organizations. By undergoing this audit, organizations can showcase their dedication to maintaining robust controls and meeting stringent data security requirements.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x