Explore the distinctions between user entity controls and subservice organization controls in SOC reporting, learn their complementary roles, review real-world examples, and master techniques for effective coordination.
In many Service Organization Control (SOC) engagements, one of the most crucial areas to comprehend is how controls are divided between users of the service (user entities), the primary service organization itself, and any subservice organizations engaged in delivering part of the overall service. These divisions of responsibilities and controls directly influence the scope of a SOC examination, the reliability of the control environment, and how users of the resulting SOC reports should interpret and apply the findings.
This chapter section offers a detailed examination of complementary user entity controls and subservice organization controls, shedding light on their purposes, differences, and interrelationships. We will explore real-world examples, discuss disclaimers in reporting, highlight the carve-out and inclusive approaches, and walk through best practices and potential pitfalls. By building a robust understanding of these control domains, CPAs and other stakeholders can effectively design, assess, and rely upon SOC reports.
User entity controls (often referred to as “complementary user entity controls” or CUECs) are the policies, procedures, and corresponding control activities that the client organization (i.e., the user entity) must implement for the service organization’s controls to operate effectively. A user entity’s in-house processes, resources, and oversight mechanisms typically support the controls at the service organization by:
• Ensuring the integrity of user-access management (e.g., providing accurate lists of authorized personnel).
• Performing periodic reconciliations of data processed or hosted by the service organization.
• Reviewing and responding to exception reports generated by the service provider’s systems.
• Implementing adequate information security training for employees who interact with the service.
• Retaining final responsibility for data that is handed over to the service organization.
The term “complementary” underscores that, without these properly designed and implemented controls at the user entity level, the service organization’s controls alone may not meet control objectives or mitigate relevant risks. When a service organization issues a SOC report—whether it is a SOC 1®, SOC 2®, or another variant—this document commonly highlights a list of assumptions about user entity responsibilities. These assumptions effectively serve as prerequisites for the service’s internal controls to prove successful in minimizing risks or errors.
A subservice organization is engaged by the primary service organization to fulfill part of the latter’s commitments to user entities. This might include a data center provider hosting the service organization’s servers, a cloud-based backup provider storing encrypted offsite data, or a payroll processing engine that the main service organization relies upon to process transactions. In each scenario, the subservice organization contributes its own controls that may be integral to achieving the overall control objectives.
• A payroll outsourcing firm (the service organization) uses a specialized background-check provider (the subservice organization) to screen new employees being onboarded on behalf of user entities.
• A software-as-a-service (SaaS) platform (the service organization) contracts a data center provider (the subservice organization) for physical security, environmental controls, and redundancy.
• A healthcare claim processing service (the service organization) engages a third-party cloud hosting environment (the subservice organization) for near real-time scalability and system availability.
When preparing a SOC report, service organizations may handle subservice organizations using either:
• The Carve-Out Method, or
• The Inclusive Method
Under the carve-out method, the service organization’s SOC report excludes the design and operating effectiveness of the subservice organization’s controls from the scope of the examination. The service organization typically states assumptions about what those subservice organization controls are meant to accomplish, disclaiming direct responsibility for them. However, the service auditor still assesses whether the subservice organization’s activities could significantly impact control objectives and whether management at the service organization monitors subservice performance.
In the inclusive method, the subservice organization’s controls are included directly in the scope of the SOC examination. The service auditor evaluates these controls in conjunction with those of the service organization. The subservice organization’s control environment, testing procedures, and results are integrated into the final SOC report. This approach often demands a higher level of coordination among all parties and typically entails more comprehensive disclosures about how the subservice organization interacts with the service organization.
• Extended Chain of Accountability: By engaging a subservice organization, the service organization is effectively extending its risk environment. It must ensure that the subservice organization’s controls remain robust and address relevant operational, compliance, or financial statement risks.
• Potential Gaps and Overlaps: Without proper oversight of subservice organizations, there may be blind spots or duplicated efforts. Clear documentation and representation of who is responsible for which control activities help eliminate ineffective or overlooked controls.
• Transparency for Users: Having insight into subservice organization controls (especially under an inclusive method) can significantly enhance a user entity’s trust and reduce due diligence burdens.
Even though both user entity controls and subservice organization controls lie outside the direct purview of the primary service organization’s day-to-day operations, their interplay is instrumental to the overall control environment’s success. The figure below provides a conceptual view of how these different control sets fit together within a typical SOC engagement.
flowchart LR A["User Entity <br/>Controls"] --> B["Service Organization <br/>Controls"] B["Service Organization <br/>Controls"] --> C["Subservice Organization <br/>Controls"]
In this diagram:
• A represents the user entity controls. These are often documented as “complementary user entity controls” in a SOC report.
• B is the service organization’s own controls, under the direct scope of the SOC engagement.
• C represents the subservice organization’s controls, which may or may not be included in the scope of the SOC report, depending on whether the carve-out or inclusive method is used.
• Ownership: User entity controls are owned and operated by the client organization (i.e., the user), while subservice organization controls are managed by external third parties engaged by the service organization.
• Scope of SOC Examination: Whether subservice organization controls are fully evaluated in the SOC report depends on the chosen methodology (carve-out vs. inclusive). User entity controls are generally referenced but not tested by the service auditor, as these remain under the purview of the client’s own audit.
• Risk Dependencies: If user entity controls fail, the effectiveness of the service organization’s controls on data accuracy or confidentiality may be compromised. If subservice organization controls fail, this can similarly undermine the service organization’s controls in fulfilling contract obligations or meeting internal control objectives.
Complementary user entity controls are integral to achieving intended control objectives; if not properly designed or performed, the service organization’s overall control environment may prove ineffective. Examples of CUECs might include:
• Providing accurate and authorized data to the service organization.
• Terminating access rights for employees who leave the user entity.
• Reconciling user entity’s internal records with reports received from the service organization.
• Engaging in a timely review of exceptions or flagged transactions.
Service organizations customarily include a section in their SOC reports detailing the relevant CUECs. These disclosures specify the responsibilities of the user entity so that prospective and existing clients understand the additional internal controls they must maintain.
A healthcare claims processing company (service organization) states in its SOC 2® that user entities must implement robust verification and validation controls for the insurance claim data they submit. If the user entities’ staff fail to enter the correct patient or policy information, the processing system’s automated integrity checks can only do so much. In other words, if the raw data is wrong, accurate outputs will not be achievable, no matter how well the service organization’s system is designed.
• Carve-Out Method
• Inclusive Method
A payroll outsourcing firm (acting as the service organization) uses two subservice organizations:
• A call center to handle inquiries from user entities’ employees about benefits and payroll issues.
• A third-party vendor to print and mail paychecks for employees who have not opted for direct deposit.
If the carve-out method is used, these subservice controls are not tested; the SOC report merely states “XYZ call center and ABC printing vendor are subservice providers not included in this examination.” If the inclusive method is used, the description of the system includes how the call center’s scripts, staff training, quality assurance checks, and the printing vendor’s security, data integrity, and production controls are tested and form part of the overall SOC report.
Below is a simplified comparison table to illustrate the distinctions:
Aspect | User Entity Controls (CUECs) | Subservice Organization Controls |
---|---|---|
Ownership | Owned and operated by the user entity | Owned and operated by the subservice organization |
Focus | Ensuring accuracy, completeness, and appropriate use of service | Delivering specific service components (e.g., data center ops, payroll) |
Scope in SOC Report | Referenced as complementary controls, typically not tested | May be carved out or included (inclusive method) |
Responsibility | User entity remains accountable for implementing these controls | Subservice organization must maintain controls that meet service org’s standards |
Impact if Inadequate | Data or transaction errors, security breaches, or unauthorized access may go undetected or unaddressed | Service organization may fail to meet objectives, user’s data may be compromised |
Audit Testing | Audited by the user entity’s auditor or included in user’s internal control environment reviews | Tested directly (if inclusive) or excluded (if carve-out) in the service org’s SOC examination |
Clear Documentation
– Service organizations should clearly outline expected user entity controls in the SOC description to minimize ambiguity.
– Detailed agreements between the service organization and any subservice organizations should specify control obligations.
Ongoing Communication
– Periodic check-ins can help user entities and service organizations verify that complementary controls are functioning.
– The service organization should monitor subservice organizations through regular performance reviews or compliance attestations.
Comprehensive Risk Analysis
– Map all associated risks thoroughly. If a subservice organization is deemed critical, an inclusive SOC engagement may reduce uncertainty for user entities.
– Conduct robust internal risk assessments to determine the reliance on user entity controls and what testing might be required externally.
Verification and Assurance
– User entities can request subservice organizations’ SOC reports directly or rely on the inclusive method in the service organization’s SOC report.
– Service organizations should perform vendor reviews of subservice organizations, akin to a supplier audit in a manufacturing context.
Contingency Planning
– If subservice organizations fail to deliver, the service organization should have backups or alternative providers in place.
– User entities should have plans for partial or full insourcing of critical controls if the external arrangement breaks down.
Imagine a multinational retailer (user entity) that utilizes a third-party logistics provider (service organization) to manage its supply chain and delivery processes. The third-party logistics provider, in turn, outsources its warehouse security to a specialized security firm (subservice organization).
• User entity (the retailer) is responsible for verifying that shipment data sent to the third-party logistics provider is correct and up to date. This includes ensuring that addresses, product SKU numbers, and package dimensions are accurate.
• Service organization (the logistics provider) processes the shipment data, coordinates carriers, and updates status information in real-time.
• Subservice organization (the security firm) enforces access controls to the warehouse, ensures that only authorized individuals enter, and handles 24/7 surveillance.
If the retailer does not maintain correct shipment data (failing to implement user entity controls) or if the security firm operates inefficiently (subservice organization controls), the entire supply chain process could break down—even if the logistics provider itself is functioning properly.
User entity controls and subservice organization controls are both essential building blocks in the broader mosaic of effective system and organization controls. They provide complementary layers of assurance and work together to mitigate risks, safeguard data, and advance organizational objectives. By distinguishing clearly between these two categories of controls and understanding the carve-out or inclusive approach, CPAs, auditors, and stakeholders can better interpret SOC reports, pinpoint risks, and fulfill regulatory obligations.
For readers preparing for the CPA exam or involved in IT audits, knowledge of these distinctions clarifies how an organization’s control environment is structured, tested, and reported upon. Likewise, practitioners who understand how to evaluate and communicate these control relationships will be well-equipped to advise clients or employers on managing outsourced operations in a manner that is both robust and transparent.
Information Systems and Controls (ISC) CPA Mocks: 6 Full (1,500 Qs), Harder Than Real! In-Depth & Clear. Crush With Confidence!
Disclaimer: This course is not endorsed by or affiliated with the AICPA, NASBA, or any official CPA Examination authority. All content is for educational and preparatory purposes only.