• Company close button
  • Company
    About us →
    Who we are, what we do and why?
    Our Partners →
    Connect with our great partner network for additional services and holistic value
    Open Roles →
    Want to work with exciting, high-growth clients, on audits that matter?
    Case Studies →
    Read about why clients trust us as their auditors
    Trust Centre →
    Learn more about our own security compliance program
    Case Studies
    New wave audit technology for end-to-end AI automation platforms
    Read More
  • Audits close button
  • Audit Frameworks Read More
    SOC 1 →
    Prove the integrity of your systems for supporting financial reporting data
    SOC 2 →
    Demonstrate the security of your system and organisational controls
    ISO 27001 →
    Certify your information security management system (ISMS)
    ISO 42001 →
    Certify your artificial intelligence management system (AIMS)
    CSA STAR →
    Demonstrate best-practice cloud security controls with CSA STAR Level 2 certification
    Privacy Compliance →
    Demonstrate your privacy compliance; GDPR, CCPA, ISO 27701 and more
    Consumer Data Right →
    Achieve accreditation for the CDR with an assurance report covering Schedule
    HIPAA →
    Demonstrate compliance with the HIPAA regulation for enterprise healthcare customers
    Asset Management →
    Build trust with institutional investors through GS 007 reporting
    Sustainability Reporting →
    Improve and report on your environmental, social and governance impact
    How-to Guides Read More
    Free guide for leaders who think their next phase of growth will require a security and compliance focus.
    Download
    Google CDR Security White Paper
    Explore our Google CDR Security Whitepaper
    Download
    AWS CDR Security White Paper
    Explore our AWS CDR Security Whitepaper
    Download
  • Apps close button
  • Apps
    Pillar →
    Access 30+ frameworks and run audits your way with our GRC platform
    PolicyTree →
    Generate a tailored set of 21 policies and your compliance system description
    ISO 27001 Launchpad →
    Work towards your ISO 27001 certification with our step-by-step guide
    AI-powered audits →
    AI-powered audits provide fast client feedback, increases efficiency and reduces unnecessary audit queries.
  • Resources close button
  • Resources
    Knowledge Base →
    Our searchable guidance with answers to common questions
    Compare Standards →
    Compare the leading standards to see which is best for you
    Best Practice Series →
    The why and how-to-guides for InfoSec best practices
    Case Studies →
    Practical tips, insights and the user experience of our clients
    Blogs →
    Simple guides, industry updates and thought leadership on audits and compliance
    Comprehensive SOC 2 Guide →
    The gold standard when earning the trust of your dream customers.
    CXO Guide →
    Our complete CXO guide on security and compliance
    CDR How-to Guides →
    Complete guides on the information security requirements of the CDR
    CDR AWS Security White Paper →
    Complete guide on CDR AWS Security
    CDR Google Security White Paper →
    Complete guide on CDR Google Security
    Latest Blog Post
    GS 007 - What’s involved
    Read More
    The importance of the CSRD Reporting initiative
    Read More
    Contact us

Resources, insights & guidance

Content to help you understand and achieve your compliance goals

  • SOC 3
  • SOC 2
  • SOC 1
  • Practice guides
  • ISO 42001
  • ISO 27001
  • HIPAA
  • GS 007
  • GDPR
  • ESG
  • CSA STAR
  • CPS 230
  • CDR
  • CCPA/CPRA
  • About AssuranceLab
Search

    Post

    Search

    The TL;DR of SOC 2

    In 2024, the importance of SOC 2 compliance has reached new heights as businesses increasingly rely on third-party service providers to handle...

    Share Post
    Share Post
    Share Link
    3 min Read

    The acai bowl of compliance

    A fresh take on frameworks. Get your baskets ready, because we’re heading to the fruit market of compliance to see how common frameworks compare to the...

    Share Post
    Share Post
    Share Link
    4 min Read

    The #1 regret startups have about compliance

    Insights from Eden Data’s survey of high-growth organizations.

    Share Post
    Share Post
    Share Link
    2 min Read

    Everything we knew about SOC 2 was wrong

    After 15 years of working with SOC 2 for clients around the world, we needed to issue our own SOC 2 reports for AssuranceLab. It was brutal. And it...

    Share Post
    Share Post
    Share Link
    3 min Read

    Essential Steps and Requirements for SOC 2 Compliance

    SOC 2 reports are independent assessments conducted by certified public accounting firms or other qualified auditors. These reports provide a level of...

    Share Post
    Share Post
    Share Link
    2 min Read

    The timeline, steps, and what’s involved for SOC 2 and other attestations

    Audit requirements, steps involved and associated timelines are steps that go hand in hand. We often hear claims in the market that it will take you...

    Share Post
    Share Post
    Share Link
    3 min Read

    Comparing SOC 2 and ISO 27001 in practice

    The two most common globally recognised, cross-industry, information security standards, are SOC 2 and ISO 27001. Despite about 80% overlap in what...

    Share Post
    Share Post
    Share Link
    4 min Read

    SOC 2 + Options

    SOC 2 + is growing in popularity to combine a commonly accepted information security standard with other specific requirements.

    Share Post
    Share Post
    Share Link
    3 min Read

    Straight to SOC 2 Type 2

    While we recommend a Type 1 prior to Type 2, we've conceded straight to Type 2 is a growing preference. Our focus has shifted to how we can enable it!

    Share Post
    Share Post
    Share Link
    4 min Read

    How to Align Your SOC 2 to the CDR

    The SOC 2 Plus CDR approach to accreditation requires a few tweaks from the standard SOC 2 reporting approach.

    Share Post
    Share Post
    Share Link
    3 min Read

    Why SOC 2 for CDR Accreditation?

    There are three (3) major benefits to achieving accreditation through the more established SOC 2 reporting standard.

    Share Post
    Share Post
    Share Link
    2 min Read

    'Process-Light' SOC 2

    As the leading provider of SOC 2 reports to small-mid size cloud services businesses in Asia-Pacific, we get a lot of questions about how to achieve...

    Share Post
    Share Post
    Share Link
    4 min Read

    SOC 2: The 5 Trust Services Categories

    The SOC 2 audit, which can help demonstrate an organisation's commitment to protecting customer data, provides a level of flexibility that is unique...

    Share Post
    Share Post
    Share Link
    2 min Read

    SOC 2: Solving compliance with one standard

    There’s a reason we almost always recommend SOC 2 as the solution to your compliance requirements.

    Share Post
    Share Post
    Share Link
    3 min Read

    SOC 1, SOC 2, or ASAE 3150 for CDR Accreditation?

    The CDR accreditation requires an independently audited SOC report to demonstrate the minimum set of information security controls.

    Share Post
    Share Post
    Share Link
    4 min Read

    7 Tips for Using Your SOC 2 Report

    You've done the hard work achieving SOC 2. It's time to get value from your investment. How do you communicate this achievement?

    Share Post
    Share Post
    Share Link
    3 min Read

    Automating SOC 2

    It's amazing how many products "automate SOC 2". Many of these solutions are highly effective. None of them "automate SOC 2". Here's why.

    Share Post
    Share Post
    Share Link
    2 min Read

    A Successful SOC 2 Engagement

    We see a lot of variation in the timeline and success of our clients SOC 2 projects. Workvivo set a new benchmark and we explore why.

    Share Post
    Share Post
    Share Link
    1 min Read

    Six Reasons to do SOC Type 1 Reports First

    There's five reasons to obtain a Type 1 report prior to Type 2 report, when it comes to SOC 1 or SOC 2 reporting.

    Share Post
    Share Post
    Share Link
    4 min Read

    SOC 2: Cybersecurity by Accountants

    Why is a security standard is issued and maintained by an accountancy body? What does the AICPA know about cybersecurity?

    Share Post
    Share Post
    Share Link
    2 min Read

    The 7 Steps to SOC 2

    Reach new business opportunities and close deals faster, with 7 steps to achieve SOC 2!

    Share Post
    Share Post
    Share Link
    3 min Read

    SOC 2 Timeline

    What's the timeline for achieving SOC 2?What are the milestones and activities?What should you tell your customers about the timeline?

    Share Post
    Share Post
    Share Link
    1 min Read

    The SOC "Levels"

    SOC 1, SOC 2, Type 1, Type 2 - It's easy to get confused between these terms. What do they mean? What's the difference?

    Share Post
    Share Post
    Share Link
    2 min Read

    How to Pass Your SOC Audit

    Everyone wants the silver bullet for SOC 2. We don't have that, but our tips can ensure you are well set up for success!

    Share Post
    Share Post
    Share Link
    2 min Read

    SOC 2: Introduction

    Have you been asked for a SOC 2 and left wondering what that means?You're not alone, we get that question all the time. Let us explain.

    Share Post
    Share Post
    Share Link
    6 min Read

    SOC 2 Scope: How It’s Defined

    Have you been asked what your SOC 2 scope is? Our clients are often confused by this question. We explore what it means and how it works.

    Share Post
    Share Post
    Share Link
    3 min Read

    What does a SOC 2 Cost?

    How much should you be paying for your SOC 2 report(s)? What are the drivers of the cost?

    Share Post
    Share Post
    Share Link
    3 min Read

    SOC 2 Frequently Asked Questions

    We get all sorts of weird and wonderful questions about SOC 2. We explore the common ones in this FAQ.

    Share Post
    Share Post
    Share Link
    5 min Read

    Myth-busting SOC 2 Reports

    We hear some wacky misconceptions about SOC 2, even from SOC 2 service auditors and consultants. We're out to set the record straight!

    Share Post
    Share Post
    Share Link
    5 min Read
    All posts
  • All Posts
  • We earn trust, to help our clients earn trust.

    CPA-firm-logo

    AICPA Accredited Firm

    CA-ANZ-logo

    Certified Public Practice

    CPA-firm-logo-1

    Certified CSA STAR Auditor

    AWS-partner-logo

    AWS Partner Network

    GCP-partner-logo

    Google Cloud Partner

    B-Corp-logo

    Certified by B-Lab

    CPA-firm-logo

    SOC 2 Type II Achieved

    SOC-1

    GDPR Compliant

    IAS_Mgt_Sys_Cert_V_CMYK

    IAS Accredited ISO 27001 (MSCB-379)

    assurance lab logo
    Our mission is to elevate trust, business growth, and better practice, with audits.
     
    Our Office Locations
    APAC: Level 3/11 York Street, Sydney
    NSW 2000
    US: 1400 Lavaca Street, Suite 700, Austin, Texas 78702 
    EMEA: Block 2 Charlemont St, Charlemont Row, Saint Kevin's, Dublin, D02 F6X6
     

    Follow us

    linkedin logo facebook logo

    Company

      • About
      • Careers
      • Partners
      • Case Studies
      • Trust Centre

    Products

      • Pillar
      • PolicyTree
      • ISO 27001 Launchpad
      • AI-Audits

    Audits

      • SOC 1
      • SOC 2
      • ISO 27001
        ISO 42001
      • CSA STAR
      • Privacy Compliance
      • Consumer Data Right
      • HIPAA
      • Asset Management
      • ESG Reporting
      • Certificate Directory

    Resources

      • Blog
      • Knowledge Base
      • Partner Referrals

    Liability limited by a scheme approved under Professional Standards Legislation.

    Terms & Conditions

    Privacy Policy