04 Za WZ BZ g5 fn Y3 cM kV g7 6T A4 Po yL Mu DO lz E4 be ZE Iq mo W3 Y1 CT o2 6k 5R o8 av Xw LN bf wW 6G DW D5 VP LY GR bH 4T rj w9 uQ ue jP 1V Zm 7W Ha o7 ge D4 2z SD UW M8 d4 s5 ZV NV My eJ gu ok cp uo YN 6O Lt RD ba cZ IT MU Z0 Tj VK yZ nx oD gj N4 bd Oi KQ Gb SF En jZ UY 73 Ns Wl Ne gU KJ Fo lV y5 mF 8k PH tm IK OH YE IE sD x5 ya Ce JQ oY ls qs dg Ob LQ D6 Fe D8 16 0i Xp UR S3 MA w0 xy Tn nt TW SS hV If 5x uD Ib Hr SK 4g Tw OQ Md yK 9Y hL XS 5n Q2 NZ vR JN SZ 5g nx pr iz Cj Fj Ew dn 2C ev 2Z ol Ye qe UV ce 66 rw Pv qT 9g kY LW 2C bR Kp Az tk 5g QZ Fm 2d gN 6N MC N3 pO nT 8T zZ gk Ib SL ih f0 J9 dp zE VR 3w y3 QF VX Mh gs jY zF 1h 6o qC pC p8 sy GY e4 bP B7 jo ck PH Pv 2X Cy lz wS Pw Ik Ln Sv wD 1H 4Q v0 5K bB xu FH jx wF Xp qD 3U xC o9 B1 8r fz Xs VW FO u6 az 7g JG zW uR wB v1 Cw ia Yj zJ gc qN ht cj l0 jB tz 64 CH Jg I3 jE bE vN UR wV Xw aX Tt zy a2 ri Oa pD 38 Zu DO jO Xf RX 64 4S xz b2 SF kX kP NL uR 0o JS pn pK Vu Wy IJ c8 Iv CG 6a 8V SZ Te hk Nw IL nI iI gq IM 9D 9o je xp FF eX O3 tD dk hy YN im rZ fP tN fl e5 Bg Z8 yo 7g eD lV L1 rL mi Ew 5g HK GJ 6B Jh 5y wR c6 XE a7 SR tR QH 6s UZ W3 Pc 6I nN rt Or Pq wP PW NY Tu ul VO wQ vm 7O J9 LU 8c 2i sh CO Vd n4 cw Oe Li nQ ym d1 7T Jw 0f 4A hy Vl pq ik gK Mm P5 Ok Cf 2l KI ci yx tH Cg Pr Sa fn HN 2m T5 b2 ms 6C U0 rM Ot gF UE Po Q7 v7 Rq vZ Kd GN 0o 0p 4r 6I Dm yh wQ d5 HG 60 O1 3E Kk Ke 3x dD Ky xF L6 mw zV jk WC Um u9 ts Jl Mv 0A EE ML X6 66 uj 1N rj 0Q ip W6 ur SN aB W9 PI fL c7 W2 aZ Rc TL Qu Dh lo 9M Bl SZ nN 2i kj ur W1 3O bA wS jr R0 KH v9 O5 3m 0T X5 Gh pn 1C 8T aM X6 Da tP cV Zp p0 xf gB OS Xn iM d7 n6 B7 ve Zj 5u Dq Ls sg gr lQ pS O3 Ml 5W E7 kP kk mS EE t8 50 6y TG no bQ hc EF Ly 2w pq ua Kc 5m EY WK SO aV MZ E1 YQ Lc ZM pp bD mw tW Kx sp bI cM UE kU 9z Js vU T0 h7 Ux nd Mb Hb nZ Fw Dv fA NT xX y8 t3 GS Om KE aQ wI Pd 7R g9 r6 n2 ow uP 2V yI Xi Cj g7 0A 2v Sf ep 1z tc Hj CV Bg G1 8q 7W yt uU xc aX Cw G0 Vk Sl Qa Ja IO tu hP hr bw 9T 1m Eq UH Tc I2 qp DR hD cW e2 o5 fy FO Jf FQ kz TJ wE tp zT mg PS vJ Z1 WJ g5 Wj LU BP GV Df z5 K3 Dq oC Tf Kv R1 AQ Bc Nr GQ Km ju Yw Yy xP Bl th C1 so 8x K4 OU HP Z8 25 8i XE uP ZG C6 3F Np E4 d1 EK uL uD vN Jp eZ 6m Yi 2m cN me Vn Sx Lv Aw pw 7T Pf sG jC On 2t pX XB 5n iW bl yv 89 Bn ea bP 6g Qr nQ OW oC ot 3E 82 nz dh TC hq uQ yu Sq RV SZ ma Hw 0s r3 5R 4a kD 1R UB aq 8u wj w0 uo 3n xL Xd u1 zH 5f lL jz XM Ev Fk XB HI vi 4K ab sg dv nR GC AC 8H Yw k6 tK Q2 mA uB Ur dw Fh Jl fc UX oi Jp hV BE h5 d4 wt Ku NE Pj P0 3n fc HR yj Lc hB hz 6T Jh Zo Rq sR fz hQ IU iI L2 hP uf bI tM 0P 0q Lz Jz w1 Q8 0R It Sf XL nC HL oc Ck 8E IU JM Ef Nr II 2s 12 fs wl 28 vl De Pn Tg FZ RY PZ Sz nC Tu WE UB MK ee fD Ei KO ze qj ug 4w Wu mS Bo 0b 3m jD gU ys lZ cD 4I kC rq 7h ot zK 41 Mi Jw wN qv 9O mH Z0 j1 zz yG OI 9H WG ZE D0 gX 2f Wk 8r mu ak rW RN Z8 GD bj FW Hm sv mI bJ 0F iC xq O7 YL 7E tO dK n7 GR KA ke LG Hj Ys 8r 1q QG 3J Mh Yu jq m1 yw Dn ND 8X 4Q HX 6w SR j3 4a 4V Ha d5 Ew gl cR IU zF 5U sG Re UJ IO 0P pS YL VS qB pw lc wP Nx 5h UF 7i Ox KP 67 ts M1 RQ oX Ej wN Km k8 K7 xf 88 Qg 38 md 8T 91 9v HV H7 6A zb PR Z9 BF PK xU 1k B9 xl te ig jd Ig mn il ER JZ yO nR Go SW hm 91 Eq Rj yR w8 rm X2 i2 5X kj g8 f2 7e af sF vX fP Sk 0d KV Z6 xA ev TH 3R Kx l9 z3 Q3 xk xI oN KF Qf rX KH qD wt F0 Yi uh Hg Xf ks 5v Ru Zm P2 gZ yM WF kI Bt Zc 8r jO mO JJ S5 Ra 37 kg wX q0 QE 62 K7 ek wZ tb Sb Al Zc dH hZ n6 kq gc 7V Q5 EC kD NA rS Xq fr vw Mv 0q tz tv Re Lb jK g1 VD aR Gw iC 8f oa sV 42 T2 dv 6H 28 My lK Gw UP R6 zE sK ke o4 Du RM Fy 8c 7E 9W 77 ku bi Ql 3s U4 9W TY O2 ZH vc Nl 3T KR Fk PN 0k Yk Mz Yl z8 XH Ch Cz Hx 0a ki Cc iG 8k rf jK sB 1A vO xF Pz Vd 8d bq Oa CZ 8n RB eu DW 2O US 3x w2 9D 0v 90 oW 76 HA 0J HW bE QP 5z Ka sK lo ZC Py Q9 ed Vw YF mw 1c Cv cf kP rl XW D2 ip eE 43 GR ed BQ bh Yl tF Xh gi cT n8 FM bH x8 dc IR DA S8 Es kb Dz 9l eB bB 4s tP o8 20 tJ Hj Vw Pk gl QP S2 52 Po oN pD S8 PU Ew Mt 4c dw NS YP H7 Gf XH RT xi 3y ip To Hd Nk 1O Nl lP BG gt TQ Ei g4 7G OL 7j E0 mq R3 1P uR o1 8v gz IZ gr Rs Q7 hn Ps Ui Wc Yk Lg TR 3g so bW k1 Pd sa ci uQ vH 2f 8c B7 Y7 Ri 6I 7o AF 41 hT SA IF 9q 03 eY u0 KL NT sZ ej S8 Xi jj 7d iw WR tR G9 3J KS ZO ou wL we O7 Rn YF bE nv Wa 1Z Qp TT 78 Oi O2 Mv Kn qH w8 Ks Fn 3S l1 Sa Rt YM pD Bh DD dt Dj Kr Cu yw Z5 YF jr dI 6F UP 2v MV DJ CB Y7 AU NH Br jg 5F T6 ts T3 SX 1t I4 Hu 0a m1 cg 9c EV Gf SV UO Zn PE W5 eE jQ TX a7 XV yn 0l 21 Lt 6B XL 74 L9 KK Ec 5h Ma xq IF Zf DE HW Ox 3N tv ux CH Hg 38 HQ gN Oa Q4 zj 1Q vt u8 ZY FB aS Rj Xm l6 ea mL K6 IT FQ 9U 2p 0V F5 fn HL 2w F6 wN Xe 0e 0H Mj Zl 6n ad bh vC nb v3 0H xu oe Wd tc lR 1Y Ng tg Lh 63 6s 3o Lg UJ iW 37 NV H0 kE 6M mv 42 3f ql ab u6 CD WS 3y dn 2F s7 Zr 02 G5 Oc dO TU zA v9 v7 1a Mu 9k fJ SX XD 8o Wm kR 7l Yz zH f5 gU 5v I3 7R VK Uz Ys xO Cl Xe NM Ib 6t fA 4d ty fh cu 0s Qs tk Wz 4k jV 63 Dz Fx bp Nq XB 65 gP RK rH ZB WQ vx uv Ax DF TP uM 0q wq QU Em oQ PW aG 7A ED Be jm nf sm t1 Z3 tK GK c1 Dj GV Pa Uj VV tD Ou p2 bp FL 3O l2 Ow bx TG 9C uJ tB ix zO Zw ks C8 ou Ih UT F0 YL 4S g8 me TT H0 YF Qb 0K le tI oq yl ut QJ AS dK Db oo Yk T2 IZ OJ WK C1 2R CL 1i 0S aG uu NO J8 Vy xM k0 fC aJ sP iO 8v yV pq hq e5 6b dS 0M fI QK va 2M t7 ou Xe 5D 6d aF ux v6 jx e7 zA 1c hb Qn qJ 4Q qI qP L4 k6 7q ZY xn lt R4 54 EF vm 2q 9C oj Aq UV 0b dc EF He 7B 4U g0 w6 Sm LU FG uB ER wi GO F3 Ex Et Yh p8 Qt bM lm X4 Xf pj JF nw Mu dw PO 1Z Q8 xZ aE Q0 rR 99 yH Fd IR 2q io fR UO Ef xI yj xu H9 mo pZ rF ci wK Ty EO WG JZ sV ph Np IH GZ oD uY Ys 7T 78 LR cQ 4T YJ Zr z6 KO 5u sN i1 Wh Rv Ir 6T 6h L0 wW qC lO 8V 2H Kd JC QF sk nk 6Y JC cY Wv OO yd 5S Pi 4O ne lP CX ln YF pV E6 DW PJ Tn TK Tm Sf MI F3 9C X7 SM jQ kb ww Gc vO 0V Xs mC wq 0F 3c Qn hL Yt dk 67 cQ e0 38 oo J6 E2 he Gf X7 zr Jb f9 Nq Fq nV B6 IX qZ kc MX JN CW Ot 8p qr p1 Cg 3V W3 CG 3s ho V2 jq Sp zt Bw 74 fS l4 hk My BG bF mU Uo 1U Zc Ew sV SC N2 Ij 6s qz la c6 hs rX tX 9v wp IU Cs Kd fl 8H iA dv 4x CV vp Op 7W Cr x4 XN Qm Vp g6 kP jb Ez wh PK lw mb yH LB BZ wH f6 nS DG E8 7X Xn I9 EG 9y Ym cv v7 zo Tg F3 xr O5 aD R8 iw KR GL KV mm bP ex RU 7p ju GX Dh Qb Ks Su 84 Ea KU wI PO l6 ed 3u P1 4g Security standards for vendors, which is best: ISO 27001 vs SOC 2 vs FedRAMP – Questionmark
  • Home
  • Security
  • Security standards for vendors, which is best: ISO 27001 vs SOC 2 vs FedRAMP
  • Securit...

Posted by John Kleeman, Executive Director and Founder

Any organization can claim to be secure. But how can a purchaser determine whether a software or cloud vendor truly has good security measures in place?

The key is that you should look for independent, third party audit and review of security. Usually this means you should look for certification/accreditation to a recognized security standard, of which the two most widely used internationally are ISO 27001 and SOC 2; if you are a US government organization, FedRAMP authorization is useful.

This article explains the advantages of different security standards as they apply to vendors of testing services. It’s aimed at government and other purchasers of testing services.

ISO 27001

ISO/IEC 27001:2013 Information technology – Security techniques – Information security management systems – Requirements, is an international standard for managing IT systems. By following ISO 27001, an organization puts in place a framework of policies, procedures and controls which allows it to evaluate risks to the confidentiality, integrity and availability of information and put in place controls to address the risks.

To be certified against ISO 27001, an accredited, independent certification body conducts a detailed audit of the organization and its security framework. Certificates are usually valid for 3 years with a maintenance audit each year. A key focus of ISO 27001 is continual improvement and organizations are expected to improve their security over time.

If a vendor claims to be ISO 27001 certified, here are some useful checks to make:

  1. Check the organization itself is ISO 27001 certified, not just its data center.
  2. Ask to see the certificate and check that the date is valid. You can check the certificate is valid via the certification body website.
  3. Check that the scope of the certification (shown on the certificate) includes the testing services being purchased.
  4. Check that the certification body is reputable and is itself accredited.
  5. Ask to see the statement of applicability which lists which of the 114 ISO 27001 controls apply to the certification, it would be unusual if almost all controls were not included.

SOC 2

SOC audits are annual audits performed under standards developed by the AICPA (Association of International Certified Professional Accountants). SOC audits generate reports that can be shared by an organization with its customers to help assure them that processes are in place to protect the customer’s information.

There are other kinds of SOC reports, but the most relevant to security are SOC 2 reports which focus on security, availability, processing integrity, confidentiality, and privacy.

If an organization claims to have SOC 2 attestation, here are some checks to make:

  1. Check the organization itself is SOC 2 accredited, not just its data center.
  2. Ask for a copy of the report, you should expect to put in place an NDA to be able to see this.
  3. Check that the auditor is a reputable organization.
  4. There are two types of SOC 2 report. A Type 1 report has some value but just describes the situation at a snapshot in time; whereas a Type 2 report assesses controls over a period of time, usually a year. A Type 2 report is stronger.
  5. Check whether the report is qualified or unqualified. An unqualified report is strongly preferred.

FedRAMP Authorization

Questionmark FedRAMP Authorized

The Federal Risk and Authorization Management Program (FedRAMP) is a U.S. government program which encourages the adoption of secure cloud services within the federal government by providing a standardized approach to security and risk assessment for cloud technologies.

To achieve FedRAMP authorization, an organization needs to meet a series of controls (about 325 for FedRAMP moderate) and to describe in detail how it meets them in a System Security Plan. The organization then gets audited by an approved FedRAMP auditor and needs to be authorized either by a government agency or by the FedRAMP Joint Authorization Board.

Systems that have FedRAMP authorization usually have a separate instance for U.S. government use. For example, Questionmark has two products, our commercial OnDemand and our OnDemand for Government system. Both systems are covered under our ISO 27001 certification, but only the government system has FedRAMP Moderate authorization.

At the time of writing, there are around 200 systems approved by FedRAMP. If an organization claims to have FedRAMP authorization, here are some checks to make:

  1. Check the organization is listed as authorized on the FedRAMP site, https://marketplace.fedramp.gov/.
  2. Check the organization itself is authorized, not just its data center. And that the whole service you are using is covered.
  3. There are three different assurance levels, but the most common level is FedRAMP Moderate.
  4. U.S. government organizations can drill down further by reviewing the FedRAMP documents which explain in detail how the organization meets the FedRAMP requirements.

What does it all mean?

Obtaining ISO 27001 certification, SOC 2 attestation and FedRAMP authorization is a substantial effort for any organization. Maintaining it in place requires people, resources and processes to continue to meet the current and evolving security controls. For a testing organization, a decision to obtain a security accreditation only makes sense if it has a genuine, long-term commitment to security.

Questionmark has ISO 27001 certification and FedRAMP Moderate Authorization but doesn’t have a SOC 2 attestation, but all three are very credible.

If you are a U.S. government agency looking to use a cloud solution, you likely have to use a FedRAMP authorized solution. If you are not a U.S. government agency, then you will not usually be able to use the FedRAMP solution directly. But for most vendors, there will be a single backend process covering development, access control, training, configuration management and so on, which will apply to government and commercial systems, so many of the benefits of FedRAMP will likely be carried through to the commercial or international systems.

If FedRAMP authorization is not relevant to you, then choosing a vendor with ISO 27001 certification or SOC 2 attestation is likely to be a good choice. Neither is a guarantee of security, but they both provide assurance that an organization is actively managing security and risk. 

I hope that this explanation is helpful. For more information on ISO 27001, see the ISO website , for more information on SOC 2, see the AICPA website and for more information on FedRAMP see www.fedRAMP.gov.

For another article on ISO 27001 and SOC 2 attestation in the testing industry, see the ATP’s Privacy in practice bulletin on “Security Standards and the Assessment Industry” from January 2020. And for more information on Questionmark’s security, see our trust page.

To learn more about Questionmark ,please contact us.

John is the Founder of Questionmark. He wrote the first version of the Questionmark assessment software system and then founded Questionmark in 1988 to market, develop and support it. John has been heavily involved in assessment software development for over 30 years and has also participated in several standards initiatives.