When vendors access your organization’s or customers’ data, it’s critical to ensure they have adequate controls in place to protect that data.
A vendor’s SOC report provides details on the vendor’s controls and addresses whether those controls are designed appropriately and operated effectively during the audit period. In some instances, the vendor needs the client (you) to implement certain controls in order for the provider’s controls to operate as designed. Those controls are called complementary user entity controls (CUECs) or user entity controls (UECs).
Let’s review some of the basics of CUECs and look at what you need to do with them.
The CUECs are a control guide provided by your vendor to let you know that your organization has certain responsibilities to ensure your vendor’s products and services can meet service level agreements (SLAs) and terms related to areas like quality, integrity, availability, security, and privacy.
Your controls in response to those CUECS must be suitably designed and operate effectively in combination with the vendor’s controls.
The vendor makes that determination, generally at the service level. In some instances, the vendor determines that CUECs aren't necessary. Having no UECs or many UECs is neither positive nor negative. The number of CUECs for different vendors or services can vary from less than five to as many as 30 or more.
In SOC 2 reports, CUECs support and are mapped to the applicable Trust Services Criteria of security, availability, processing integrity, confidentiality, and/or privacy. The vendor selects which Trust Services Criteria and defines the scope they’re examined against, in addition to the security criteria, which is required for all SOC 2 audits.
Common criteria controls are common to all five of the trust service categories. Controls can address common criteria or individual Trust Services Criteria.
Note: SOC 1 reports do not address Trust Services Criteria. Instead, the vendor is tested on their defined internal controls and objectives that they have selected as being relevant to or impacting the financial operations of clients or customers.
Related: Understanding the Differences Between a Vendor SOC 1, 2, 3
The auditor’s opinion, near the beginning of the SOC audit report, will let you know whether CUECs are required for the vendor to meet control objectives. You can usually find CUECs in the section of the SOC report that’s directly before the testing section.
In some instances, the CUECs are integrated into the control testing section near the control objective that is related to the specific CUEC.
Now that you have found the CUECs, here’s how to review them:
Related: When to Request a Vendor SOC 1 vs SOC 2 Report
There’s no one-size fits all on how to document your response to CUECs. This should be determined by what works best for your organization. However, here’s some tips you can use for mapping and completing vendor CUECs:
CUECs are critical to implement to ensure your vendor’s control objectives are met. This protects your organization from some preventable vendor risks and gives your organization confidence that your vendor relationship is based upon mutual trust and communication.
Struggling to make sense of SOC reports and CUECs? Take a look at Venminder’s Sample Vendor Control Assessments to see how we help simplify reviews and surface what matters most.