IT Audit & Compliance Blog

The Linford & Company Blog is written by our very own auditors, who are experts in IT audits, information security, and compliance topics. Their auditing experience encompasses a broad spectrum of industries and organizations, and their specialized expertise can help your company or organization make the right decision for your auditing needs. Our specific areas of focus in our IT Audit & Compliance Blog include SOC 1 Audits, SOC 2 Audits, HIPAA Audits, HITRUST Certification, and FedRAMP Assessments, NIST & CMMC, and Penetration Testing.

User access reviews: guidance and best practices

User Access Reviews Best Practices: Fix Permission Risks Before Audits Find Them

Imagine an employee at your organization is terminated, but due to a communication gap or manual off-boarding process, their account isn’t disabled. Weeks later, another employee needs access to restricted data but hasn’t yet received approval for such access. Frustrated with delays, this employee uses the former employee’s still-active credentials to access the restricted data. […]

Guide to understanding audit risk

Audit Risk & the Audit Risk Model (ARM): An Auditor’s Complete Guide

Let’s be honest—when you’re juggling daily priorities and a never-ending to-do list, audit risk probably isn’t the first thing on your mind. And hey, maybe the “out of sight, out of mind” approach feels easier. After all, it doesn’t exactly scream excitement, and there’s always something more urgent to handle. But here’s the thing: while […]

There is no SOC 2 compliance checklist

SOC 2 Compliance Checklist: Why it Doesn’t Exist (And What to Do Instead)

In the past several years, as SOC 2 reports have increased in popularity, one of the first things prospective clients ask when meeting with me is if there is a checklist of things they can have that will help them prepare for the audit and become SOC 2 compliant. There seems to be a common […]

Understanding subservice organizations vs. vendors

Vendor vs Subservice Organizations: Understanding the Difference & How it Affects You

A service organization may have a number of vendors and subservice organizations engaged to assist it in meeting its objectives or achieving the service commitments to its user entities, along with the system requirements necessary to do so. This article will explain the difference between a vendor and a subservice organization and provide some tips […]

Guide to HIPAA cloud compliance

HIPAA Compliance in the Cloud – An Auditor’s Guide

When I audit small to mid-sized SaaS companies in the healthcare space, there’s one assumption I encounter over and over again: “We’re in the cloud, so compliance is handled.” It’s an easy misconception to fall into. After all, AWS, Azure, and Google Cloud talk extensively about HIPAA and HITRUST capabilities. But here’s the quiet truth—moving […]

ISO/IEC 27006-1:2024 Guidance & Updates

What Is ISO/IEC 27006-1:2024 & What Changed in the 2024 (2025 Transition) Edition?

When organizations pursue ISO 27001 certification, most of the focus is on building, maintaining, and auditing an Information Security Management System (ISMS). But who makes sure the auditors themselves are qualified and that the certification process is credible? That’s where ISO/IEC 27006 comes in. This standard governs how certification bodies (CBs) operate when auditing and […]

The GovRAMP journey

A Guide to GovRAMP: An Overview For Your Authorization Journey

What is GovRAMP? In 2011, the Federal Risk and Authorization Management Program (FedRAMP) was introduced, establishing a standardized assessment methodology for federal agencies to manage risk within commercial cloud service provider environments. Acknowledging the “do once, use many” benefits of FedRAMP within the federal sector, the State Risk and Authorization Management Program (StateRAMP) was launched […]

Risk Governance 101

Risk Governance – What Is It & Where Do I Start?

Risk governance, as defined by NIST, is the “process by which risk management evaluation, decisions, and actions are connected to enterprise strategy and objectives. It provides the transparency, responsibility, and accountability that enables managers to acceptably manage risk.” While this concept is seemingly straightforward, a robust risk governance program has a lot of varied components! […]

Guide to the HITRUST certification process

Expert Guide to the HITRUST Certification Process & Assessment Types

Founded in 2007, HITRUST® issues certifications to businesses and organizations that are independently assessed for compliance with its Common Security Framework (CSF®). This guide will walk you through the HITRUST certification process, explain all available assessment types (e1, i1, r2), introduce newer offerings tailored to AI systems, and provide guidance on maintaining certification over time. […]

IT governance (GEIT) and SOC 2

IT Governance (GEIT) & SOC 2: Navigating Today’s Complex Risk Landscape

In a world where digital risk, regulatory expectations, and emerging technologies are accelerating, strong IT Governance remains foundational. SOC 2 compliance continues to be a key mechanism for service organizations to show they have strong controls. Understanding how IT governance and SOC 2 align, and where recent changes affect that alignment, is more critical than […]