{"id":464,"date":"2025-01-22T12:47:18","date_gmt":"2025-01-22T12:47:18","guid":{"rendered":"https:\/\/www.assentinternational.com\/us\/?page_id=464"},"modified":"2025-01-22T13:19:54","modified_gmt":"2025-01-22T13:19:54","slug":"soc-2-consultants","status":"publish","type":"page","link":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/","title":{"rendered":"SOC 2 Consultants"},"content":{"rendered":"\n<div class=\"wp-block-stackable-hero alignfull stk-block-hero stk-has-bottom-separator stk-block stk-08a909b stk-block-background stk--has-background-overlay\" data-v=\"2\" data-block-id=\"08a909b\"><style>.stk-08a909b {background-color:#000000 !important;background-image:url(https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-scaled.jpeg) !important;background-attachment:fixed !important;min-height:900px !important;align-items:center !important;display:flex !important;}.stk-08a909b:before{background-color:#000000 !important;opacity:0.5 !important;}.stk-08a909b .stk-block-hero__content{min-height:500px !important;align-items:center !important;display:flex !important;}<\/style><div class=\"stk-block-hero__content stk-content-align stk-08a909b-column alignwide stk-container stk-08a909b-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks has-text-align-center stk-08a909b-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-c15fb3c\" id=\"soc-2-consultants\" data-block-id=\"c15fb3c\"><style>.stk-c15fb3c .stk-block-heading__text{font-size:64px !important;color:#FFFFFF !important;font-weight:300 !important;font-family:\"IBM Plex Sans\", Sans-serif !important;}@media screen and (max-width:999px){.stk-c15fb3c .stk-block-heading__text{font-size:50px !important;}}<\/style><h1 class=\"stk-block-heading__text has-text-color has-white-color\">SOC 2 Consultants<\/h1><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-cb47353\" data-block-id=\"cb47353\"><style>.stk-cb47353 .stk-block-text__text{color:#FFFFFF !important;}<\/style><p class=\"stk-block-text__text has-text-color has-white-color\">Our SOC 2 consultants can help you become SOC 2 compliant by assessing your current controls, identifying gaps, and providing recommendations for improvement. They can also assist with the development and implementation of policies, procedures, and controls to meet the<strong> Trust Services Criteria<\/strong> and prepare your organization for a SOC 2 audit.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-89d9702\" data-block-id=\"89d9702\"><style>.stk-89d9702 .stk-button-group{flex-direction:row !important;}@media screen and (max-width:999px){.stk-89d9702 .stk-button-group{flex-direction:row !important;}}@media screen and (max-width:689px){.stk-89d9702 .stk-button-group{flex-direction:row !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button stk-block stk-1a15986\" data-block-id=\"1a15986\"><style>.stk-1a15986 .stk-button{padding-right:32px !important;padding-left:32px !important;background:var(--theme-palette-color-1, #ff0000) !important;border-top-left-radius:50px !important;border-top-right-radius:50px !important;border-bottom-right-radius:50px !important;border-bottom-left-radius:50px !important;}.stk-1a15986 .stk-button__inner-text{font-family:\"IBM Plex Sans\", Sans-serif !important;}<\/style><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/www.assentinternational.com\/us\/contact\/\"><span class=\"stk-button__inner-text\">Contact us<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div><div class=\"stk-separator stk-separator__bottom\"><div class=\"stk-separator__wrapper\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1600 200\" class=\"stk-separator__layer-1\" preserveAspectRatio=\"none\" aria-hidden=\"true\"><path class=\"slant-2_svg__st1\" d=\"M1610 39.2V209H-10V39.2l810 118.9 810-118.9z\"><\/path><\/svg><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p>By undergoing a SOC 2 audit, service organizations can demonstrate their commitment to the security, availability, processing integrity, confidentiality, and privacy of their customers&#8217; data<\/p><cite>&#8211; American Institute of Certified Public Accountants (AICPA)<\/cite><\/blockquote><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What is SOC 2?<\/h2>\n\n\n\n<p>SOC 2 is a set of auditing standards developed by the American Institute of CPAs (AICPA). SOC 2 audits are designed to assess the controls in place at a service organization that are relevant to the security, availability, processing integrity, confidentiality, and privacy of customer data.<\/p>\n\n\n\n<p>SOC 2 audits are conducted by <strong>independent auditors<\/strong> who evaluate whether the service organization&#8217;s controls are suitably designed and operating effectively. SOC 2 compliance is important for service organizations that process sensitive customer data, such as financial information, personal data, and intellectual property.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why is SOC 2 important in the UK?<\/h2>\n\n\n\n<p>While SOC 2 originates from America, many UK organizations find they need to be SOC 2 compliant due to client requests. SOC 2 can also work together with <a href=\"https:\/\/www.assentinternational.com\/us\/iso-27001\/\">ISO 27001<\/a>, the standard for Information Security, to give you a comprehensive international compliance regime.<\/p>\n\n\n\n<p>SOC 2 compliance is important for several reasons:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Compliance with industry standards:<\/strong> SOC 2 compliance demonstrates that your organization meets the standards set by the AICPA for security, availability, processing integrity, confidentiality, and privacy.<\/li>\n\n\n\n<li><strong>Competitive advantage: <\/strong>SOC 2 compliance can give you a competitive advantage by demonstrating to customers and partners that you take security and privacy seriously.<\/li>\n\n\n\n<li><strong>Risk managemen<\/strong>t: SOC 2 compliance can help you identify and manage risks associated with data security and privacy.<\/li>\n\n\n\n<li><strong>Regulatory compliance: <\/strong>SOC 2 compliance can help you meet regulatory requirements, such as those set by HIPAA, GLBA, and GDPR.<\/li>\n<\/ol>\n\n\n\n<div class=\"wp-block-stackable-columns alignwide stk-block-columns stk-block stk-14818bf\" data-block-id=\"14818bf\"><style>.stk-14818bf {margin-bottom:23px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-14818bf-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-bafc9db\" data-v=\"4\" data-block-id=\"bafc9db\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-bafc9db-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-bafc9db-inner-blocks\">\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-5529ff8\" data-block-id=\"5529ff8\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-5529ff8-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-c42b3fa\" data-v=\"4\" data-block-id=\"c42b3fa\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-c42b3fa-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-c42b3fa-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-6df894d is-style-default\" data-v=\"2\" data-block-id=\"6df894d\"><div class=\"stk--no-padding stk-container stk-6df894d-container stk-hover-parent\"><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-6df894d-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-c99bcf8\" id=\"soc-2-and-outsourcing\" data-block-id=\"c99bcf8\"><style>.stk-c99bcf8 .stk-block-heading__text{font-size:32px !important;}@media screen and (max-width:999px){.stk-c99bcf8 .stk-block-heading__text{font-size:32px !important;}}<\/style><h2 class=\"stk-block-heading__text\">SOC 2 and Outsourcing<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-1376afd\" data-block-id=\"1376afd\"><p class=\"stk-block-text__text\">SOC 2 audits are important for service organizations that process sensitive customer data. Many service organizations outsource some or all of their operations to third-party service providers, such as cloud service providers, payment processors, or data centers. Outsourcing can introduce additional risks to a service organization&#8217;s data security and privacy. When outsourcing, it&#8217;s important for service organizations to choose service providers that have undergone SOC 2 audits and have received SOC 2 reports. SOC 2 reports provide service organizations with assurance that their service providers have adequate controls in place to protect customer data.<\/p><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-2f079e6\" data-v=\"4\" data-block-id=\"2f079e6\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-2f079e6-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-2f079e6-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-55a5b7b is-style-default\" data-v=\"2\" data-block-id=\"55a5b7b\"><div class=\"stk--no-padding stk-container stk-55a5b7b-container stk-hover-parent\"><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-55a5b7b-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-35256d7\" id=\"cloud-services-and-soc-2\" data-block-id=\"35256d7\"><style>.stk-35256d7 .stk-block-heading__text{font-size:32px !important;}@media screen and (max-width:999px){.stk-35256d7 .stk-block-heading__text{font-size:32px !important;}}<\/style><h2 class=\"stk-block-heading__text\">Cloud Services and SOC 2<\/h2><\/div>\n\n\n\n<p>\u200b\u200bCloud services have become increasingly popular among organizations due to their scalability, flexibility, and cost-effectiveness. However, outsourcing data and applications to cloud service providers can introduce additional risks to data security and privacy. Therefore, it&#8217;s important for organizations to ensure that their cloud service providers have adequate controls in place to protect their data.<\/p>\n\n\n\n<p>Many cloud service providers undergo SOC 2 audits to demonstrate that they have adequate controls in place to protect customer data. These audits assess the cloud service provider&#8217;s controls in five trust services categories: security, availability, processing integrity, confidentiality, and privacy.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignwide stk-block-columns stk-block stk-3f4d60a\" data-block-id=\"3f4d60a\"><style>.stk-3f4d60a {margin-bottom:23px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-3f4d60a-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-b9c769c\" data-v=\"4\" data-block-id=\"b9c769c\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-b9c769c-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-b9c769c-inner-blocks\">\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-90c99ac\" data-block-id=\"90c99ac\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-90c99ac-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-24898e4\" data-v=\"4\" data-block-id=\"24898e4\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-24898e4-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-24898e4-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-f57e51d is-style-default\" data-v=\"2\" data-block-id=\"f57e51d\"><div class=\"stk--no-padding stk-container stk-f57e51d-container stk-hover-parent\"><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-f57e51d-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-3ed38f7\" id=\"trust-services-criteria\" data-block-id=\"3ed38f7\"><style>.stk-3ed38f7 .stk-block-heading__text{font-size:32px !important;}@media screen and (max-width:999px){.stk-3ed38f7 .stk-block-heading__text{font-size:32px !important;}}<\/style><h2 class=\"stk-block-heading__text\">Trust Services Criteria <\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-icon-list stk-block-icon-list stk-block stk-bf9687f\" data-block-id=\"bf9687f\"><style>.stk-bf9687f .stk-block-icon-list-item__content{gap:4px !important;align-items:baseline !important;}.stk-bf9687f {--stk-icon-height:17.75px !important;}<\/style><svg style=\"display:none\"><defs><g id=\"stk-icon-list__icon-svg-def-bf9687f\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 190 190\"><polygon points=\"173.8,28.4 60.4,141.8 15.7,97.2 5.1,107.8 60.4,163 184.4,39 173.8,28.4\"\/><\/svg><\/g><\/defs><\/svg><div class=\"stk-block-icon-list__ul stk-block-icon-list--column\"><ul class=\"stk-block-icon-list__group\">\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-3562385\" data-block-id=\"3562385\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"fas\" data-icon=\"key\" class=\"svg-inline--fa fa-key fa-w-16\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" width=\"32\" height=\"32\"><path fill=\"currentColor\" d=\"M512 176.001C512 273.203 433.202 352 336 352c-11.22 0-22.19-1.062-32.827-3.069l-24.012 27.014A23.999 23.999 0 0 1 261.223 384H224v40c0 13.255-10.745 24-24 24h-40v40c0 13.255-10.745 24-24 24H24c-13.255 0-24-10.745-24-24v-78.059c0-6.365 2.529-12.47 7.029-16.971l161.802-161.802C163.108 213.814 160 195.271 160 176 160 78.798 238.797.001 335.999 0 433.488-.001 512 78.511 512 176.001zM336 128c0 26.51 21.49 48 48 48s48-21.49 48-48-21.49-48-48-48-48 21.49-48 48z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Security<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-6acdbc9\" data-block-id=\"6acdbc9\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"fas\" data-icon=\"check\" class=\"svg-inline--fa fa-check fa-w-16\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" width=\"32\" height=\"32\"><path fill=\"currentColor\" d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Availability<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-19b00e6\" data-block-id=\"19b00e6\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"fab\" data-icon=\"ubuntu\" class=\"svg-inline--fa fa-ubuntu fa-w-16\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 496 512\" width=\"32\" height=\"32\"><path fill=\"currentColor\" d=\"M248 8C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm52.7 93c8.8-15.2 28.3-20.5 43.5-11.7 15.3 8.8 20.5 28.3 11.7 43.6-8.8 15.2-28.3 20.5-43.5 11.7-15.3-8.9-20.5-28.4-11.7-43.6zM87.4 287.9c-17.6 0-31.9-14.3-31.9-31.9 0-17.6 14.3-31.9 31.9-31.9 17.6 0 31.9 14.3 31.9 31.9 0 17.6-14.3 31.9-31.9 31.9zm28.1 3.1c22.3-17.9 22.4-51.9 0-69.9 8.6-32.8 29.1-60.7 56.5-79.1l23.7 39.6c-51.5 36.3-51.5 112.5 0 148.8L172 370c-27.4-18.3-47.8-46.3-56.5-79zm228.7 131.7c-15.3 8.8-34.7 3.6-43.5-11.7-8.8-15.3-3.6-34.8 11.7-43.6 15.2-8.8 34.7-3.6 43.5 11.7 8.8 15.3 3.6 34.8-11.7 43.6zm.3-69.5c-26.7-10.3-56.1 6.6-60.5 35-5.2 1.4-48.9 14.3-96.7-9.4l22.5-40.3c57 26.5 123.4-11.7 128.9-74.4l46.1.7c-2.3 34.5-17.3 65.5-40.3 88.4zm-5.9-105.3c-5.4-62-71.3-101.2-128.9-74.4l-22.5-40.3c47.9-23.7 91.5-10.8 96.7-9.4 4.4 28.3 33.8 45.3 60.5 35 23.1 22.9 38 53.9 40.2 88.5l-46 .6z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Processing Integrity<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-0ddd793\" data-block-id=\"0ddd793\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"fas\" data-icon=\"user-shield\" class=\"svg-inline--fa fa-user-shield fa-w-20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 640 512\" width=\"32\" height=\"32\"><path fill=\"currentColor\" d=\"M622.3 271.1l-115.2-45c-4.1-1.6-12.6-3.7-22.2 0l-115.2 45c-10.7 4.2-17.7 14-17.7 24.9 0 111.6 68.7 188.8 132.9 213.9 9.6 3.7 18 1.6 22.2 0C558.4 489.9 640 420.5 640 296c0-10.9-7-20.7-17.7-24.9zM496 462.4V273.3l95.5 37.3c-5.6 87.1-60.9 135.4-95.5 151.8zM224 256c70.7 0 128-57.3 128-128S294.7 0 224 0 96 57.3 96 128s57.3 128 128 128zm96 40c0-2.5.8-4.8 1.1-7.2-2.5-.1-4.9-.8-7.5-.8h-16.7c-22.2 10.2-46.9 16-72.9 16s-50.6-5.8-72.9-16h-16.7C60.2 288 0 348.2 0 422.4V464c0 26.5 21.5 48 48 48h352c6.8 0 13.3-1.5 19.2-4-54-42.9-99.2-116.7-99.2-212z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Confidentiality<\/span><\/div><\/li>\n\n\n\n<li class=\"wp-block-stackable-icon-list-item stk-block-icon-list-item stk-block stk-b7ea00a\" data-block-id=\"b7ea00a\"><div class=\"stk-block-icon-list-item__content\"><span class=\"stk--svg-wrapper\"><div class=\"stk--inner-svg\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"fas\" data-icon=\"lock\" class=\"svg-inline--fa fa-lock fa-w-14\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\" width=\"32\" height=\"32\"><path fill=\"currentColor\" d=\"M400 224h-24v-72C376 68.2 307.8 0 224 0S72 68.2 72 152v72H48c-26.5 0-48 21.5-48 48v192c0 26.5 21.5 48 48 48h352c26.5 0 48-21.5 48-48V272c0-26.5-21.5-48-48-48zm-104 0H152v-72c0-39.7 32.3-72 72-72s72 32.3 72 72v72z\"><\/path><\/svg><\/div><\/span><span class=\"stk-block-icon-list-item__text\">Privacy<\/span><\/div><\/li>\n<\/ul><\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-23b5409\" data-v=\"4\" data-block-id=\"23b5409\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-23b5409-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-23b5409-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-1ec3fed is-style-default\" data-v=\"2\" data-block-id=\"1ec3fed\"><div class=\"stk--no-padding stk-container stk-1ec3fed-container stk-hover-parent\"><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-1ec3fed-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-11b1894\" id=\"soc-2-report\" data-block-id=\"11b1894\"><style>.stk-11b1894 .stk-block-heading__text{font-size:32px !important;}@media screen and (max-width:999px){.stk-11b1894 .stk-block-heading__text{font-size:32px !important;}}<\/style><h2 class=\"stk-block-heading__text\">SOC 2 Report<\/h2><\/div>\n\n\n\n<p>There are five components to a SOC 2 report:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Section 1\u2014Auditor\u2019s Report<\/li>\n\n\n\n<li>Section 2\u2014Management Assertion<\/li>\n\n\n\n<li>Section 3\u2014System Description<\/li>\n\n\n\n<li>Section 4\u2014Description of Criteria<\/li>\n\n\n\n<li>Section 5\u2014Other Information (optional)<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Types of SOC 2 Assessment<\/h2>\n\n\n\n<p>The type of SOC 2 assessment you require will often depend on the requirements of your customer.  Below are the two types.<\/p>\n\n\n\n<div class=\"wp-block-stackable-columns alignwide stk-block-columns stk-block stk-02fabf4\" data-block-id=\"02fabf4\"><style>.stk-02fabf4 {margin-bottom:23px !important;}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-02fabf4-column alignwide\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-762a3aa\" data-v=\"4\" data-block-id=\"762a3aa\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-762a3aa-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-762a3aa-inner-blocks\">\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-086c6bf\" data-block-id=\"086c6bf\"><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-086c6bf-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-e7be892\" data-v=\"4\" data-block-id=\"e7be892\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-e7be892-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-e7be892-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-e5ba906 is-style-default\" data-v=\"2\" data-block-id=\"e5ba906\"><div class=\"stk--no-padding stk-container stk-e5ba906-container stk-hover-parent\"><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-e5ba906-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-75cef59\" id=\"soc-2-type-1\" data-block-id=\"75cef59\"><style>.stk-75cef59 .stk-block-heading__text{font-size:32px !important;}@media screen and (max-width:999px){.stk-75cef59 .stk-block-heading__text{font-size:32px !important;}}<\/style><h2 class=\"stk-block-heading__text\">SOC 2 Type 1<\/h2><\/div>\n\n\n\n<p><strong>Point-in-Time Assessment<\/strong><\/p>\n\n\n\n<p>A SOC 2 Type 1 report evaluates the design and implementation of controls at a specific point in time. It assesses whether the organization&#8217;s systems and processes are designed to meet the relevant trust service criteria.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-f7526c6\" data-v=\"4\" data-block-id=\"f7526c6\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-f7526c6-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-f7526c6-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-855d8e7 is-style-default\" data-v=\"2\" data-block-id=\"855d8e7\"><div class=\"stk--no-padding stk-container stk-855d8e7-container stk-hover-parent\"><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-855d8e7-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-d83cd73\" id=\"soc-2-type-2\" data-block-id=\"d83cd73\"><style>.stk-d83cd73 .stk-block-heading__text{font-size:32px !important;}@media screen and (max-width:999px){.stk-d83cd73 .stk-block-heading__text{font-size:32px !important;}}<\/style><h2 class=\"stk-block-heading__text\">SOC 2 Type 2<\/h2><\/div>\n\n\n\n<p><strong>Assessment Covering a Period of Time<\/strong><\/p>\n\n\n\n<p>A SOC 2 Type 2 report goes beyond the design and implementation of controls. It assesses both the design and operational effectiveness of controls over a period of time, typically covering a minimum of six months. A Type 2 report provides a more comprehensive evaluation of the organization&#8217;s controls.<\/p>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-call-to-action stk-block-call-to-action stk-block stk-1436979 is-style-default\" data-v=\"2\" data-block-id=\"1436979\"><style>.stk-1436979-container{background-color:var(--theme-palette-color-6, #ededed) !important;}.stk-1436979-container:before{background-color:var(--theme-palette-color-6, #ededed) !important;}<\/style><div class=\"stk-block-call-to-action__content stk-content-align stk-1436979-column stk-container stk-1436979-container stk-hover-parent\"><div class=\"has-text-align-center stk-block-content stk-inner-blocks stk-1436979-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-994efd2\" id=\"our-soc-2-consulting-services\" data-block-id=\"994efd2\"><h3 class=\"stk-block-heading__text\">Our SOC 2 Consulting Services<\/h3><\/div>\n\n\n\n<p><strong>We offer a range of SOC 2 consulting services to help your organization achieve and maintain SOC 2 compliance. Our services include<\/strong>:<\/p>\n\n\n\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<p class=\"has-text-align-left\" style=\"margin-top:0;margin-right:var(--wp--preset--spacing--80);margin-bottom:0;margin-left:var(--wp--preset--spacing--80);padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">&#8211; <strong>Readiness assessment: <\/strong>We can assess your organization&#8217;s readiness for a SOC 2 audit and provide recommendations for remediation.<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:0;margin-right:var(--wp--preset--spacing--80);margin-bottom:0;margin-left:var(--wp--preset--spacing--80);padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">&#8211; <strong>Gap analysis: <\/strong>We can conduct a gap analysis to identify areas where your organization does not meet SOC 2 requirements and provide guidance on remediation.<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:0;margin-right:var(--wp--preset--spacing--80);margin-bottom:0;margin-left:var(--wp--preset--spacing--80);padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">&#8211; <strong>Policy and procedure development:<\/strong> We can develop policies and procedures that meet SOC 2 requirements and help you implement them.<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:0;margin-right:var(--wp--preset--spacing--80);margin-bottom:0;margin-left:var(--wp--preset--spacing--80);padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">&#8211; <strong>Internal control testing: <\/strong>We can test your internal controls to ensure that they are operating effectively and meet SOC 2 requirements.<\/p>\n\n\n\n<p class=\"has-text-align-left\" style=\"margin-top:0;margin-right:var(--wp--preset--spacing--80);margin-bottom:0;margin-left:var(--wp--preset--spacing--80);padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">&#8211; <strong>Audit support:<\/strong> We can provide support during your SOC 2 audit, including preparation of audit documentation and assistance with auditor requests.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-3487d81\" data-block-id=\"3487d81\"><style>.stk-3487d81 .stk-button-group{flex-direction:row !important;}@media screen and (max-width:999px){.stk-3487d81 .stk-button-group{flex-direction:row !important;}}@media screen and (max-width:689px){.stk-3487d81 .stk-button-group{flex-direction:row !important;}}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button stk-block stk-dccfee1\" data-block-id=\"dccfee1\"><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/www.assentinternational.com\/us\/contact\/\"><span class=\"stk-button__inner-text\">Contatct Us!<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SOC 2 Consultants Our SOC 2 consultants can help you become SOC 2 compliant by assessing your current controls, identifying gaps, and providing recommendations for improvement. They can also assist with the development and implementation of policies, procedures, and controls to meet the Trust Services Criteria and prepare your organization for a SOC 2 audit. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":467,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-464","page","type-page","status-publish","has-post-thumbnail","hentry"],"blocksy_meta":{"has_hero_section":"disabled","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"featured_image_urls_v2":{"full":["https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-scaled.jpeg",2560,1707,false],"thumbnail":["https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-150x150.jpeg",150,150,true],"medium":["https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-300x200.jpeg",300,200,true],"medium_large":["https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-768x512.jpeg",768,512,true],"large":["https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-1024x683.jpeg",1024,683,true],"1536x1536":["https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-1536x1024.jpeg",1536,1024,true],"2048x2048":["https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-2048x1365.jpeg",2048,1365,true]},"post_excerpt_stackable_v2":"<p>SOC 2 Consultants Our SOC 2 consultants can help you become SOC 2 compliant by assessing your current controls, identifying gaps, and providing recommendations for improvement. They can also assist with the development and implementation of policies, procedures, and controls to meet the Trust Services Criteria and prepare your organization for a SOC 2 audit. Contact us By undergoing a SOC 2 audit, service organizations can demonstrate their commitment to the security, availability, processing integrity, confidentiality, and privacy of their customers&#8217; data&#8211; American Institute of Certified Public Accountants (AICPA) What is SOC 2? SOC 2 is a set of auditing&hellip;<\/p>\n","category_list_v2":"","author_info_v2":{"name":"Hayden Clark","url":"https:\/\/www.assentinternational.com\/us\/author\/hayden-clark\/"},"comments_num_v2":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SOC 2 Consultants - Assent International - United States<\/title>\n<meta name=\"description\" content=\"SOC 2 consultants help you become SOC 2 compliant by assessing your current controls, identifying gaps, and providing recommendations for improvement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SOC 2 Consultants - Assent International - United States\" \/>\n<meta property=\"og:description\" content=\"SOC 2 consultants help you become SOC 2 compliant by assessing your current controls, identifying gaps, and providing recommendations for improvement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/\" \/>\n<meta property=\"og:site_name\" content=\"Assent International - United States\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-22T13:19:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/soc-2-consultants\\\/\",\"url\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/soc-2-consultants\\\/\",\"name\":\"SOC 2 Consultants - Assent International - United States\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/soc-2-consultants\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/soc-2-consultants\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/SOC-2-Consultants-1-scaled.jpeg\",\"datePublished\":\"2025-01-22T12:47:18+00:00\",\"dateModified\":\"2025-01-22T13:19:54+00:00\",\"description\":\"SOC 2 consultants help you become SOC 2 compliant by assessing your current controls, identifying gaps, and providing recommendations for improvement.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/soc-2-consultants\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/soc-2-consultants\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/soc-2-consultants\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/SOC-2-Consultants-1-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/SOC-2-Consultants-1-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"SOC 2 Consultants\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/soc-2-consultants\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SOC 2 Consultants\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/#website\",\"url\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/\",\"name\":\"Assent International - United States\",\"description\":\"ISO Consultants in the US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/#organization\",\"name\":\"Assent International - United States\",\"url\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Assent-Logo-with-Text.png\",\"contentUrl\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/Assent-Logo-with-Text.png\",\"width\":1016,\"height\":300,\"caption\":\"Assent International - United States\"},\"image\":{\"@id\":\"https:\\\/\\\/www.assentinternational.com\\\/us\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SOC 2 Consultants - Assent International - United States","description":"SOC 2 consultants help you become SOC 2 compliant by assessing your current controls, identifying gaps, and providing recommendations for improvement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/","og_locale":"en_US","og_type":"article","og_title":"SOC 2 Consultants - Assent International - United States","og_description":"SOC 2 consultants help you become SOC 2 compliant by assessing your current controls, identifying gaps, and providing recommendations for improvement.","og_url":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/","og_site_name":"Assent International - United States","article_modified_time":"2025-01-22T13:19:54+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-scaled.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/","url":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/","name":"SOC 2 Consultants - Assent International - United States","isPartOf":{"@id":"https:\/\/www.assentinternational.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/#primaryimage"},"image":{"@id":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/#primaryimage"},"thumbnailUrl":"https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-scaled.jpeg","datePublished":"2025-01-22T12:47:18+00:00","dateModified":"2025-01-22T13:19:54+00:00","description":"SOC 2 consultants help you become SOC 2 compliant by assessing your current controls, identifying gaps, and providing recommendations for improvement.","breadcrumb":{"@id":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/#primaryimage","url":"https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-scaled.jpeg","contentUrl":"https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2025\/01\/SOC-2-Consultants-1-scaled.jpeg","width":2560,"height":1707,"caption":"SOC 2 Consultants"},{"@type":"BreadcrumbList","@id":"https:\/\/www.assentinternational.com\/us\/soc-2-consultants\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.assentinternational.com\/us\/"},{"@type":"ListItem","position":2,"name":"SOC 2 Consultants"}]},{"@type":"WebSite","@id":"https:\/\/www.assentinternational.com\/us\/#website","url":"https:\/\/www.assentinternational.com\/us\/","name":"Assent International - United States","description":"ISO Consultants in the US","publisher":{"@id":"https:\/\/www.assentinternational.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.assentinternational.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.assentinternational.com\/us\/#organization","name":"Assent International - United States","url":"https:\/\/www.assentinternational.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.assentinternational.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2021\/09\/Assent-Logo-with-Text.png","contentUrl":"https:\/\/www.assentinternational.com\/us\/wp-content\/uploads\/2021\/09\/Assent-Logo-with-Text.png","width":1016,"height":300,"caption":"Assent International - United States"},"image":{"@id":"https:\/\/www.assentinternational.com\/us\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.assentinternational.com\/us\/wp-json\/wp\/v2\/pages\/464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.assentinternational.com\/us\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.assentinternational.com\/us\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.assentinternational.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.assentinternational.com\/us\/wp-json\/wp\/v2\/comments?post=464"}],"version-history":[{"count":0,"href":"https:\/\/www.assentinternational.com\/us\/wp-json\/wp\/v2\/pages\/464\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.assentinternational.com\/us\/wp-json\/wp\/v2\/media\/467"}],"wp:attachment":[{"href":"https:\/\/www.assentinternational.com\/us\/wp-json\/wp\/v2\/media?parent=464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}