The AICPA Trust Services Principles and Criteria (TSP) are essentially control criteria established by the Assurance Services Executive Committee (ASEC), and consist of Security, Availability, Processing Integrity, Confidentiality, and Privacy. Furthermore, such control criteria are used for attestation or consulting engagements for evaluating and reporting on controls over the security, availability, processing integrity, confidentiality, or privacy over information and systems (a) across an entire entity; (b) at a subsidiary, division, or operating unit level; (c) within a function relevant to the entity's operational, reporting, or compliance objectives; or (d) for a particular type of information used by the entity.

There are Five Trust Services Criteria (TSP)

As to the actual Trust Services Principles and Criteria (TSP), they comprise of the following:

So, what is a “System” for Purposes of the Trust Service Principles and Criteria?

SECURITY Trust Services Principles & Criteria

SECURITY: Information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems that could compromise the availability, integrity, confidentiality, and privacy of information or systems and affect the entity's ability to meet its objectives. It’s important to note that the SECURTY TSP essentially refers to the protection of information during its collection or creation, use, processing, transmission, and storage.

Key to the SECURITY TSP is ensuring unauthorized access – logical or physical – to systems and facilities, thus the following “Common Criteria” relating to logical and physical access controls would apply when assessing the SECURTY TSP.

Please note that the above listing of common criteria is merely a sample that are used for assessing the SECURITY TSP.

AVAILABILITY Trust Services Principles & Criteria

AVAILABILITY: Information and systems are available for operation and use to meet the entity's objectives. As for the AVAILABILTY TSP, it essentially refers to the accessibility of information used by the entity's systems, as well as the products or services provided to its customers.

Examples of the AVAILABILITY TSP being assessed during a SOC 2 audit would include the following:

Please note that the above listing of common criteria is merely a sample that are used for assessing the AVAILABILITY TSP.

PROCESSING INTEGRITY Trust Services Principles & Criteria

PROCESSING INTEGRITY: System processing is complete, valid, accurate, timely, and authorized to meet the entity's objectives. The PROCESSING INTEGRIGY TSP refers to the completeness, validity, accuracy, timeliness, and authorization of system processing.

Examples of the PROCESSING INTEGRITY TSP being assessed during a SOC 2 audit would include the following:

Please note that the above listing of common criteria is merely a sample that are used for assessing the PROCESSING INTEGRITY TSP.

CONFIDENTIALITY Trust Services Principles & Criteria

CONFIDENTIALITY: Information designated as confidential is protected to meet the entity's objectives. The CONFIDENTIALITY TSP refers to the entity's ability to protect information designated as confidential from its collection or creation through its final disposition and removal from the entity's control in accordance with management's objectives.

Examples of the CONFIDENTIALITY TSP being assessed during a SOC 2 audit would include the following:

Please note that the above listing of common criteria is merely a sample that are used for assessing the CONFIDENTIALITY TSP.

PRIVACY: Personal information is collected, used, retained, disclosed, and disposed to meet the entity's objectives. The privacy criteria consist of the following:

NDNB. North America’s Leading Providers of SOC 2 Audits

NDNB has been a recognized leader in the field of regulatory compliance. We’ve issued hundreds of SAS 70, SSAE 16, SSAE 18, SOC 2 and SOC 3 reports since 2006. We offer fixed-fees, superior service, and a high-degree of audit efficiency.

Hosting in Amazon AWS and Need a SOC 1 or SOC 2 Audit? Let's Talk.

aws logo

Additionally, we’re experts when it comes to SOC 2 compliance, having a deep understanding of how to apply the actual TSP to all applicable industries and sectors. From managed security services to SaaS platforms – and more – we truly understand how the SOC 2 framework should be applied.

To learn more about SOC 2 and TSP, please contact Christopher Nickell, CPA, at This email address is being protected from spambots. You need JavaScript enabled to view it., or at 1-800-277-5415, ext. 706 today. With literally hundreds of SOC 2 audit reports issued over the past decade, we are the firm to turn to when it comes to audit knowledge, expertise, efficiency, and pricing.