• Company close button
  • Company
    About us →
    Who we are, what we do and why?
    Our Partners →
    Connect with our great partner network for additional services and holistic value
    Open Roles →
    Want to work with exciting, high-growth clients, on audits that matter?
    Case Studies →
    Read about why clients trust us as their auditors
    Trust Centre →
    Learn more about our own security compliance program
    Case Studies
    New wave audit technology for end-to-end AI automation platforms
    Read More
  • Audits close button
  • Audit Frameworks Read More
    SOC 1 →
    Prove the integrity of your systems for supporting financial reporting data
    SOC 2 →
    Demonstrate the security of your system and organisational controls
    ISO 27001 →
    Certify your information security management system (ISMS)
    ISO 42001 →
    Certify your artificial intelligence management system (AIMS)
    CSA STAR →
    Demonstrate best-practice cloud security controls with CSA STAR Level 2 certification
    Privacy Compliance →
    Demonstrate your privacy compliance; GDPR, CCPA, ISO 27701 and more
    Consumer Data Right →
    Achieve accreditation for the CDR with an assurance report covering Schedule
    HIPAA →
    Demonstrate compliance with the HIPAA regulation for enterprise healthcare customers
    Asset Management →
    Build trust with institutional investors through GS 007 reporting
    Sustainability Reporting →
    Improve and report on your environmental, social and governance impact
    How-to Guides Read More
    Free guide for leaders who think their next phase of growth will require a security and compliance focus.
    Download
    Google CDR Security White Paper
    Explore our Google CDR Security Whitepaper
    Download
    AWS CDR Security White Paper
    Explore our AWS CDR Security Whitepaper
    Download
  • Apps close button
  • Apps
    Pillar →
    Access 30+ frameworks and run audits your way with our GRC platform
    PolicyTree →
    Generate a tailored set of 21 policies and your compliance system description
    ISO 27001 Launchpad →
    Work towards your ISO 27001 certification with our step-by-step guide
    AI-powered audits →
    AI-powered audits provide fast client feedback, increases efficiency and reduces unnecessary audit queries.
  • Resources close button
  • Resources
    Knowledge Base →
    Our searchable guidance with answers to common questions
    Compare Standards →
    Compare the leading standards to see which is best for you
    Best Practice Series →
    The why and how-to-guides for InfoSec best practices
    Case Studies →
    Practical tips, insights and the user experience of our clients
    Blogs →
    Simple guides, industry updates and thought leadership on audits and compliance
    Comprehensive SOC 2 Guide →
    The gold standard when earning the trust of your dream customers.
    CXO Guide →
    Our complete CXO guide on security and compliance
    CDR How-to Guides →
    Complete guides on the information security requirements of the CDR
    CDR AWS Security White Paper →
    Complete guide on CDR AWS Security
    CDR Google Security White Paper →
    Complete guide on CDR Google Security
    Latest Blog Post
    GS 007 - What’s involved
    Read More
    The importance of the CSRD Reporting initiative
    Read More
    Contact us

Resources, insights & guidance

Content to help you understand and achieve your compliance goals

  • SOC 3
  • SOC 2
  • SOC 1
  • Practice guides
  • ISO 42001
  • ISO 27001
  • HIPAA
  • GS 007
  • GDPR
  • ESG
  • CSA STAR
  • CPS 230
  • CDR
  • CCPA/CPRA
  • About AssuranceLab
Search

    Post

    Search

    Navigating cyber privacy and data protection in Australia

    In Australia, the cyber privacy and data protection landscape consists of several national regulations plus international influences. Understanding...

    Share Post
    Share Post
    Share Link
    2 min Read

    The acai bowl of compliance

    A fresh take on frameworks. Get your baskets ready, because we’re heading to the fruit market of compliance to see how common frameworks compare to the...

    Share Post
    Share Post
    Share Link
    4 min Read

    What to expect in the ACCC accreditation process?

    Many of our clients push hard and fast to achieve compliance, complete their audit, and submit their CDR application to the ACCC to get accredited....

    Share Post
    Share Post
    Share Link
    3 min Read

    Is unrestricted CDR accreditation the best path? 5 reasons it might be

    There are now five ways to use Consumer Data Right data; unrestricted, sponsored, operating as a representative or trusted advisor, or using CDR...

    Share Post
    Share Post
    Share Link
    2 min Read

    The Latest Updates to the Consumer Data Right Rules (Version 3)

    There are now five access models for CDR data, after previously only the unrestricted accreditation model.

    Share Post
    Share Post
    Share Link
    5 min Read

    The boundary of your CDR Data Environment

    Defining the boundary of your CDR Data Environment is an important early step in your pursuit of CDR accreditation. Why?

    Share Post
    Share Post
    Share Link
    3 min Read

    Google CDR Security

    Google's Cloud Platform and Workspace provide a comprehensive suite of products, settings, and user guides for achieving the CDR accreditation.

    Share Post
    Share Post
    Share Link
    2 min Read

    How to Align Your SOC 2 to the CDR

    The SOC 2 Plus CDR approach to accreditation requires a few tweaks from the standard SOC 2 reporting approach.

    Share Post
    Share Post
    Share Link
    3 min Read

    Why SOC 2 for CDR Accreditation?

    There are three (3) major benefits to achieving accreditation through the more established SOC 2 reporting standard.

    Share Post
    Share Post
    Share Link
    2 min Read

    SOC 1, SOC 2, or ASAE 3150 for CDR Accreditation?

    The CDR accreditation requires an independently audited SOC report to demonstrate the minimum set of information security controls.

    Share Post
    Share Post
    Share Link
    4 min Read

    Open Banking - What Happens Now?

    What happens with Open Banking in Australia? What are the requirements for third-party providers?

    Share Post
    Share Post
    Share Link
    2 min Read
    All posts
  • All Posts
  • We earn trust, to help our clients earn trust.

    CPA-firm-logo

    AICPA Accredited Firm

    CA-ANZ-logo

    Certified Public Practice

    CPA-firm-logo-1

    Certified CSA STAR Auditor

    AWS-partner-logo

    AWS Partner Network

    GCP-partner-logo

    Google Cloud Partner

    B-Corp-logo

    Certified by B-Lab

    CPA-firm-logo

    SOC 2 Type II Achieved

    SOC-1

    GDPR Compliant

    IAS_Mgt_Sys_Cert_V_CMYK

    IAS Accredited ISO 27001 (MSCB-379)

    assurance lab logo
    Our mission is to elevate trust, business growth, and better practice, with audits.
     
    Our Office Locations
    APAC: Level 3/11 York Street, Sydney
    NSW 2000
    US: 1400 Lavaca Street, Suite 700, Austin, Texas 78702 
    EMEA: Block 2 Charlemont St, Charlemont Row, Saint Kevin's, Dublin, D02 F6X6
     

    Follow us

    linkedin logo facebook logo

    Company

      • About
      • Careers
      • Partners
      • Case Studies
      • Trust Centre

    Products

      • Pillar
      • PolicyTree
      • ISO 27001 Launchpad
      • AI-Audits

    Audits

      • SOC 1
      • SOC 2
      • ISO 27001
        ISO 42001
      • CSA STAR
      • Privacy Compliance
      • Consumer Data Right
      • HIPAA
      • Asset Management
      • ESG Reporting
      • Certificate Directory

    Resources

      • Blog
      • Knowledge Base
      • Partner Referrals

    Liability limited by a scheme approved under Professional Standards Legislation.

    Terms & Conditions

    Privacy Policy