Try 10 focused Certified Public Accountant Information Systems and Controls (CPA ISC) questions on SOC engagement scope, criteria, complementary controls, report types, and user-entity reliance.
CPA means Certified Public Accountant. ISC means Information Systems and Controls. Use this focused page when your CPA ISC misses are about SOC engagement scope, report type, criteria, complementary controls, subservice organizations, or user-entity reliance. Drill this topic before returning to mixed practice.
| Field | Detail |
|---|---|
| Exam route | CPA ISC |
| Issuer | American Institute of Certified Public Accountants (AICPA) |
| Topic area | Considerations for System and Organization Controls Engagements |
| Blueprint weight | 20% |
| Page purpose | SOC-reporting practice for report types, criteria, complementary controls, subservice organizations, and user reliance |
This topic tests whether you understand how system and organization controls engagements are scoped, reported, and used. Strong answers identify the service organization, user entity, complementary user-entity controls, report type, criteria, period covered, and intended use.
First decide who will rely on the report and why. Then identify the report type, subject matter, criteria, period, and controls covered. If an answer overstates what the report supports, it is usually wrong.
Use this page to isolate Considerations for System and Organization Controls Engagements for CPA ISC. Work through the 10 questions first, then review the explanations and return to mixed practice in Mastery Exam Prep.
| Pass | What to do | What to record |
|---|---|---|
| First attempt | Answer without checking the explanation first. | The fact, rule, calculation, or judgment point that controlled your answer. |
| Review | Read the explanation even when you were correct. | Why the best answer is stronger than the closest distractor. |
| Repair | Repeat only missed or uncertain items after a short break. | The pattern behind misses, not the answer letter. |
| Transfer | Return to mixed practice once the topic feels stable. | Whether the same skill holds up when the topic is no longer obvious. |
Blueprint context: 20% of the practice outline. A focused topic score can overstate readiness if you recognize the pattern too quickly, so use it as repair work before timed mixed sets.
These questions are original Mastery Exam Prep practice items aligned to this topic area. They are designed for self-assessment and are not official exam questions.
Topic: Considerations for System and Organization Controls Engagements
A cloud-based document management provider wants an attestation report to share with current and prospective business customers that need detailed information about controls supporting the provider’s security and confidentiality commitments. Which characterization is most appropriate?
Best answer: A
What this tests: Considerations for System and Organization Controls Engagements
Explanation: The best characterization is a SOC 2 report for management, user entities, and specified parties needing detailed information about controls tied to service commitments and the Trust Services Criteria. SOC 2 is restricted-use, unlike SOC 3, which is designed for general use and gives less detail.
SOC 2 reports address controls at a service organization that are relevant to one or more Trust Services Criteria, such as security, availability, processing integrity, confidentiality, and privacy. Their purpose is to provide detailed information about whether controls are suitably designed and, in a type 2 report, operated effectively to meet the service organization’s service commitments and system requirements. Because that detail can be misunderstood without context, SOC 2 reports are intended for management, user entities, and specified parties that have sufficient knowledge and understanding of the system. They are not general-use reports for the public.
SOC 2 is a restricted-use report that provides detailed information about controls relevant to meeting service commitments and the Trust Services Criteria.
Topic: Considerations for System and Organization Controls Engagements
A payroll processing company calculates employee pay, withholds taxes, remits payroll taxes, and sends clients a file used to post payroll expense and payroll liabilities to the general ledger. The company’s customers have asked for an independent report that their financial statement auditors can use. The auditors want assurance about management’s description of the system and about the suitability of design and operating effectiveness of the controls from January 1 through December 31, 20X5.
How should this report be characterized?
Best answer: A
What this tests: Considerations for System and Organization Controls Engagements
Explanation: The payroll processor’s controls affect clients’ financial statement amounts, so the appropriate framework is SOC 1, not SOC 2 or SOC 3. Because the users want assurance on operating effectiveness throughout the year, the report must be Type 2 rather than Type 1.
SOC 1 reports address controls at a service organization that are relevant to user entities’ internal control over financial reporting. Here, the payroll company processes transactions and produces files used to record payroll expense and liabilities, so the controls are directly relevant to customers’ financial reporting. A Type 1 report covers the fairness of the system description and the suitability of design as of a specified date only. A Type 2 report adds an opinion on whether controls operated effectively throughout a specified period. Because the request is for user auditors and concerns ICFR over January 1 through December 31, 20X5, the correct characterization is a restricted-use SOC 1 Type 2 report.
The service affects customers’ financial reporting, and the request covers operating effectiveness throughout a period, which is the hallmark of a restricted-use SOC 1 Type 2 report.
Topic: Considerations for System and Organization Controls Engagements
A service auditor is completing a SOC 2 Type 2 examination for the period January 1-December 31, 20X5. The planned report date is February 20, 20X6.
On February 10, 20X6, the service organization discovers unauthorized access to a production server. Management’s investigation shows that, because of a configuration change made on November 18, 20X5, multi-factor authentication was disabled for privileged administrator accounts from November 18, 20X5, through February 10, 20X6. One control tested for the report states that all privileged administrator access requires multi-factor authentication throughout the period.
What should the service auditor do next?
Best answer: D
What this tests: Considerations for System and Organization Controls Engagements
Explanation: The correct next step is to determine whether the event identified before the report date relates to conditions that existed during the period under examination. Here, MFA was disabled beginning in November, so the event may affect control design or operating effectiveness for the current SOC 2 Type 2 report.
In a SOC 1 or SOC 2 engagement, the service auditor considers subsequent events up to the report date to determine whether they could significantly affect the report. The key question is whether the event provides evidence about conditions that existed during the period covered by the report or instead arose only afterward. In this scenario, the unauthorized access was discovered after period end, but the underlying control failure began on November 18 and continued through year-end. That means the matter may affect current-period testing results and the service auditor’s conclusion. The service auditor should perform additional procedures, evaluate the effect on the control and report, and require changes to the description or opinion if necessary.
Because the control failure existed during the covered period and was identified before the report date, it may affect the current SOC 2 conclusions and requires further evaluation.
Topic: Considerations for System and Organization Controls Engagements
A SaaS payroll processor is scoping a SOC 2 examination. Management defines the system boundary to include the payroll application, customer SFTP upload portal, production database, and backup environment. The examination will cover Security, Availability, and Confidentiality.
Relevant facts:
Which statement is the best interpretation of relevance to the SOC 2 subject matter?
Best answer: D
What this tests: Considerations for System and Organization Controls Engagements
Explanation: Relevance in a SOC 2 engagement depends on the defined system boundary and the trust services categories included in scope. A contractual uptime promise clearly relates to Availability for the payroll system, so it is relevant subject matter for this engagement.
In SOC 2, relevant commitments and system requirements are evaluated in relation to the defined system and the trust services categories management chooses to cover. Here, the system boundary includes the payroll application and related infrastructure, and the engagement includes Availability. A contractual promise of 99.9% uptime is therefore directly relevant because it expresses how available the system must be for customers.
The confidentiality commitment is also relevant in this scenario, but the statement claiming it is not relevant is incorrect because Confidentiality is separately in scope and is not replaced by Security. The recruiting website’s resume-deletion promise is not automatically relevant because that website is outside the defined system boundary and Privacy is not in scope. Processing Integrity is a separate optional category; it does not become part of the subject matter merely because the system processes data or lacks a specific accuracy commitment.
An uptime commitment directly relates to the Availability subject matter for the defined system and is therefore relevant to the SOC 2 engagement.
Topic: Considerations for System and Organization Controls Engagements
An outsourced payroll processor tells user entities’ external auditors that the processor’s SOC 3 report should be used to evaluate controls over payroll processing that affect the user entities’ financial statements. What is the best correction to this reporting approach?
Best answer: B
What this tests: Considerations for System and Organization Controls Engagements
Explanation: The issue is that the wrong SOC report is being used for a financial-reporting purpose. When a service organization’s controls are relevant to user entities’ financial reporting, the appropriate report is SOC 1, intended for management of the service organization, user entities, and user auditors rather than the general public.
SOC 1 reports are used when a service organization’s controls may affect a user entity’s internal control over financial reporting. Typical intended users are management of the service organization, user entities, and user auditors, so the report is not designed for unrestricted public distribution. In this scenario, payroll processing affects amounts and disclosures in user entities’ financial statements, so a SOC 1 report is the appropriate report. A SOC 2 report addresses controls relevant to trust services criteria such as security, availability, processing integrity, confidentiality, or privacy, not specifically controls relevant to user entities’ financial reporting. A SOC 3 report is a general-use summary of a SOC 2 examination and is not the right report for user auditors evaluating financial-reporting effects.
SOC 1 is the report designed for service-organization controls relevant to user entities’ financial reporting and is intended for management, user entities, and user auditors.
Topic: Considerations for System and Organization Controls Engagements
ArborHR is preparing a SOC 2 report for its hosted HR records platform.
Draft scope and facts:
Draft “relevant commitment and system requirement”:
What is the best correction to the draft?
Best answer: B
What this tests: Considerations for System and Organization Controls Engagements
Explanation: The best correction is to remove the consent requirement from the relevant SOC 2 subject matter unless Privacy is added to scope. This report covers only Security and Confidentiality, and the facts say customers—not the service organization—are responsible for obtaining consent.
In a SOC 2 engagement, management should identify only those commitments, system requirements, and criteria that are relevant to the subject matter being reported on. Security and Confidentiality focus on protecting systems and information from unauthorized access, use, or disclosure. Privacy is different: it addresses commitments and system requirements related to the collection, use, retention, disclosure, and disposal of personal information. Here, the draft statement is about obtaining employee consent before collecting and using personal information, which is a Privacy matter. The facts also say that customers, not ArborHR, have that responsibility. Therefore, the statement should not be presented as a relevant commitment or system requirement for this Security-and-Confidentiality-only SOC 2 unless management chooses to include Privacy in scope.
Consent for collecting, using, and disclosing personal information is a Privacy subject-matter commitment, not automatically relevant to a SOC 2 limited to Security and Confidentiality.
Topic: Considerations for System and Organization Controls Engagements
A CPA is helping a SaaS payroll provider prepare for a SOC 2 examination. Management wants the report to cover the trust services categories of security and availability only, not privacy. A staff associate says the control matrix should exclude the common criteria because those apply only to security. Which response is correct?
Best answer: B
What this tests: Considerations for System and Organization Controls Engagements
Explanation: The correct response is to use the common criteria plus the availability-specific supplemental criteria. The common criteria are organized around COSO concepts and serve as the foundation across scoped trust services categories, while availability adds its own criteria when that category is included.
The Trust Services Criteria provide the benchmark for evaluating whether controls address the trust services categories included in a SOC 2 engagement. The common criteria are the foundational set and are organized in alignment with COSO components and principles, so they are not limited to security alone. When additional categories such as availability, confidentiality, or processing integrity are in scope, their category-specific supplemental criteria are added to the common criteria. Privacy is also a separate category with its own additional criteria, but it is included only when privacy is part of the engagement scope. In this scenario, because the report covers security and availability only, the control matrix should include the common criteria and the availability-specific criteria, but not privacy-specific criteria.
Common criteria are the COSO-aligned foundation for scoped categories, and availability adds supplemental criteria rather than replacing them.
Topic: Considerations for System and Organization Controls Engagements
A CPA is evaluating a SOC 1 Type 2 report for a payroll processor. The CPA concludes that the complementary user entity controls identified by service organization management in the system description are intended to tell user entities which controls they must perform because the payroll processor’s controls assume those controls are in place. Which source best supports that conclusion?
Best answer: C
What this tests: Considerations for System and Organization Controls Engagements
Explanation: The system description excerpt is best because it explicitly ties user-entity actions to the achievement of the service organization’s control objectives. That is the purpose of complementary user entity controls: to communicate assumed customer responsibilities that must work with the service organization’s controls.
Complementary user entity controls are not controls performed by the service organization. They are controls that management expects user entities to have in place so the service organization’s controls can operate effectively and the stated control objectives can be achieved. Therefore, the best supporting source is one that explicitly identifies responsibilities at the user entity level and links them to the service organization’s objectives, such as approving master-file changes, limiting access, or reviewing exception reports. Internal evidence about the service organization’s own access, software changes, or vulnerability status may support other conclusions about security or operations, but it does not explain why CUECs appear in the system description.
This source directly identifies controls to be performed by user entities and shows that the service organization’s control objectives depend on those controls.
Topic: Considerations for System and Organization Controls Engagements
A service organization is preparing for a SOC 2 examination covering security, availability, and confidentiality. Management asks why some Trust Services Criteria are called common criteria and others are called additional criteria. Which statement best explains the distinction?
Best answer: C
What this tests: Considerations for System and Organization Controls Engagements
Explanation: The best distinction is that common criteria are the baseline criteria used across the categories in scope, and additional criteria are added only when reporting on subject matters such as availability or confidentiality. They work together rather than replacing one another.
In a SOC 2 engagement, the common criteria are the cross-cutting Trust Services Criteria that support the security category and are also relevant when other categories are included. If the engagement also covers availability, processing integrity, confidentiality, or privacy, the practitioner evaluates the common criteria plus the additional criteria for those specific categories. The key distinction is therefore scope: common criteria are broadly applicable, while additional criteria are subject-matter-specific supplements. They are not optional choices made after testing, and they do not replace the common criteria when another category is added.
Common criteria are cross-cutting criteria used across categories, and additional criteria are added only for the specific subject matters included beyond the common criteria.
Topic: Considerations for System and Organization Controls Engagements
A user entity’s external financial statement auditor is assessing a payroll processor. The auditor wants source material that best supports this conclusion:
“The report is relevant to controls affecting user entities’ internal control over financial reporting, is intended for user auditors rather than the general public, identifies an exception in the service organization’s quarterly user-access review control, and does not cover the cloud hosting provider’s controls because that subservice organization was carved out.”
Which excerpt best supports that conclusion?
Best answer: B
What this tests: Considerations for System and Organization Controls Engagements
Explanation: The best support is the SOC 1 Type 2 excerpt with restricted use, a carve-out subservice organization, and a documented access-review deviation. Those facts directly support the conclusion about ICFR relevance, intended user, the control exception, and exclusion of the hosting provider’s controls.
For a user entity’s financial statement auditor, the relevant report is SOC 1 because it addresses controls that may affect user entities’ internal control over financial reporting. Type 2 is necessary when the conclusion depends on operating effectiveness over a period and on an identified control deviation, because Type 1 covers design at a point in time only. The carve-out method means the subservice organization’s controls are excluded from the scope of the service auditor’s testing, so the cloud hosting provider’s controls are not covered by the report. Restricted-use language also matters: SOC 1 reports are intended for management of the service organization, user entities, and user auditors, not for the general public.
This excerpt matches ICFR relevance, restricted intended users, a reported control exception, and carve-out treatment of the subservice organization.
Use the CPA ISC Practice Test page for the full practice route, mixed-topic practice, timed mock exams, and explanations.
Read the CPA ISC guide on CPAExamsMastery.com, then return to Mastery Exam Prep for timed practice.