Data is the underlying reason for your decision to embark on a loyalty strategy. It’s the data that unlocks all the opportunities and, ultimately, the experiences you can deliver. Keeping this data secure needs to be your top priority.
One way to really kick the tires on your loyalty provider is to understand if they’ve gone through and completed IS27001 and SOC 2 security compliance. ISO27001 and SOC 2 standards evaluate the vendor's effectiveness against specific security principles and related data security criteria. The loyalty vendor's compliance to SOC security standards establishes the fact that the vendor fully meets the established security criteria and is competent to prevent unauthorized access to data.
Let's dig into the SOC 2 Type 2 evaluation.
ISO/IEC 27001 is an international standard for how to manage information security.The standard was originally published jointly by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) in 2005, then revised in 2013. It details requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS)—the aim of which is to help organizations make the information assets they hold more secure.
Most organizations have a number of information security controls.However, without an information security management system (ISMS), controls tend to be somewhat disorganized and disjointed, having been implemented often as point solutions to specific situations or simply as a matter of convention. Security controls in operation typically address certain aspects of information technology (IT) or data security specifically; leaving non-IT information assets (such as paperwork and proprietary knowledge) less protected on the whole. Moreover, business continuity planning and physical security may be managed independently of IT or information security, while Human Resources practices may make little reference to the need to define and assign information security roles and responsibilities throughout the organization.
Note that ISO/IEC 27001 is designed to cover much more than just the IT department.
What controls will be tested as part of certification to ISO/IEC 27001 is dependent on the certification auditor. This can include any controls that the organization has deemed to be within the scope of the ISMS and this testing can be to any depth or extent as assessed by the auditor as needed to test that the control has been implemented and is operating effectively.
The controls reflect changes to technology affecting many organizations—for instance, cloud computing solutions.
Let’s dig into the SOC evaluation. It’s a multi-level evaluation across multiple principles.
The SOC 2 Type 2 audit is based on criteria used to evaluate controls relevant to the security, processing integrity, availability, confidentiality, and privacy of any system. The SOC 2 Type 2 report includes audit details of the service organization controls outlined by the Trust Services Criteria (TSC) set by AICPA.
IT system software and application programs
All manual and automated procedures
Personnel using the system
Physical, IT, and related hardware
Files, tables, data bases, transmission streams, and output processed by a system