Operational Controls and SOC Reports-Reading Between the Lines | Institutional Custody & Compliance | XRP Academy - XRP Academy
3 free lessons remaining this month

Free preview access resets monthly

Upgrade for Unlimited
Skip to main content
advanced55 min

Operational Controls and SOC Reports-Reading Between the Lines

Learning Objectives

Interpret SOC 1 and SOC 2 reports and their limitations

Evaluate proof of reserves attestations critically

Assess security certifications (ISO 27001, CCSS) appropriately

Identify red flags and gaps in audit documentation

Apply control evaluation in custody due diligence

"We have a SOC 2" has become a standard custodian claim. But what does that actually mean? Not all SOC reports are equal. Not all certifications are meaningful. And proof of reserves isn't proof of everything.

This lesson teaches you to read these documents critically—to understand what assurance they provide and what gaps remain.


SOC REPORT OVERVIEW:

SOC 1 (SSAE 18):
Purpose: Financial reporting controls
Focus: Controls relevant to user financials
Users: User auditors, finance teams
Relevance: NAV calculation, financial reporting

SOC 2 (AT 101):
Purpose: Security, availability, processing integrity,
         confidentiality, privacy
Focus: Trust services criteria
Users: Management, due diligence
Relevance: Primary custody evaluation tool

SOC 3:
Purpose: General use report
Focus: Same as SOC 2, less detail
Users: Public/marketing
Relevance: Limited due diligence value

TYPE I VS. TYPE II:

  • Point-in-time assessment

  • Description of controls

  • Design effectiveness only

  • "Controls exist as described"

  • Period assessment (typically 12 months)

  • Operating effectiveness testing

  • Controls worked during period

  • "Controls operated effectively"

FOR CUSTODY EVALUATION:
SOC 2 Type II is the standard expectation
Type I is insufficient for institutional DD
```

SOC 2 REPORT STRUCTURE:

- Auditor's opinion
- Scope of examination
- Management's responsibilities
- Auditor's responsibilities
- Opinion on controls

Key Review Points:
□ Is opinion unqualified?
□ What's the report period?
□ Which trust services criteria?
□ Any scope limitations?

- Management's description
- Management's assertion
- Control objectives

Key Review Points:
□ Does description match services used?
□ Any carve-outs?
□ Subservice organizations?

- Services provided
- Components of system
- Relevant aspects
- Control environment

Key Review Points:
□ Does description match your use?
□ What's in scope?
□ What's NOT in scope?

- Control objectives
- Related controls
- Tests performed
- Results of tests

Key Review Points:
□ Any exceptions noted?
□ Exception materiality?
□ Remediation actions?

- Subservice organizations
- Complementary user entity controls
- Changes during period
SOC REPORT RED FLAGS:

OPINION ISSUES:

🚩 Qualified Opinion:
"Except for..." language
Indicates material deficiency
Requires explanation

🚩 Scope Limitations:
Auditor couldn't test something
May hide problems
Requires investigation

EXCEPTION ISSUES:

🚩 Multiple Exceptions:
More than isolated incidents
Pattern of control failures
Systemic concerns

🚩 Unremediated Exceptions:
Same issues year over year
No corrective action
Management concern

🚩 Material Exceptions:
Significant control failures
Could affect asset security
Critical review needed

SCOPE ISSUES:

🚩 Carve-Outs:
Important functions excluded
Subservice organizations
May exclude critical controls

🚩 Limited Trust Criteria:
Missing relevant criteria
(e.g., no security criteria)

🚩 Short Period:
Less than 12 months
May miss seasonal issues

GOOD INDICATORS:

✅ Unqualified opinion
✅ No exceptions
✅ Full 12-month period
✅ All relevant trust criteria
✅ No material carve-outs
✅ Clear system description
```

COMPLEMENTARY USER ENTITY CONTROLS (CUECs):

WHAT THEY ARE:
Controls that user organizations must implement
for overall system of controls to be effective

COMMON CUECs FOR CUSTODY:

  • User responsible for own credentials

  • Timely termination of access

  • Access review processes

  • Proper authorization procedures

  • Segregation of duties (user side)

  • Approval workflows

  • Review of custodian reports

  • Reconciliation procedures

  • Exception follow-up

WHY THEY MATTER:

  • Custodian controls insufficient alone

  • System as a whole incomplete

  • Residual risk remains

  • Implement required CUECs

  • Document implementation

  • Include in own controls

REVIEW CHECKLIST:
□ What CUECs are listed?
□ Are you implementing them?
□ Can you document implementation?
□ Any gaps to address?


---
PROOF OF RESERVES (POR):

PURPOSE:
Demonstrate assets equal or exceed liabilities

ELEMENTS:

  • Demonstrate control of assets

  • On-chain verification

  • Cryptographic proof

  • Point-in-time or continuous

  • Customer obligations

  • Off-chain data typically

  • Aggregated balances

  • Privacy considerations

METHODS:

  • Merkle tree proofs

  • Zero-knowledge proofs

  • On-chain verification

  • Customer verification possible

  • Auditor/accountant verification

  • Point-in-time assessment

  • Procedures vary

  • Letter or report

  • Real-time verification

  • Automated systems

  • Dashboard access

  • Emerging practice

POR LIMITATIONS:

WHAT POR SHOWS:
✅ Assets exist at point in time
✅ Custodian controls addresses
✅ Assets ≥ liabilities (if proper)

WHAT POR DOESN'T SHOW:
❌ Asset quality/encumbrance
❌ Off-chain liabilities
❌ Related party transactions
❌ Operational controls
❌ Future solvency
❌ Complete picture

SPECIFIC LIMITATIONS:

  • Snapshot only

  • Could window-dress

  • Doesn't show trends

  • Not continuous (usually)

  • Off-chain liabilities?

  • Contingent liabilities?

  • Intercompany obligations?

  • Complete picture uncertain

  • Pledged assets?

  • Collateral obligations?

  • Third-party claims?

  • Clean ownership?

  • Procedures vary

  • Not a full audit

  • Scope may be limited

  • Reliance assumptions

POST-FTX LESSONS:

  • "Proof of reserves" meaningless

  • Assets moved before/after

  • Liabilities understated

  • Complete fraud

  • POR necessary but not sufficient

  • Full audit still needed

  • Continuous monitoring better

  • Skepticism warranted

POR EVALUATION CHECKLIST:

METHODOLOGY:
□ What methodology was used?
□ Cryptographic or attestation?
□ Third-party verification?
□ Procedures described?

SCOPE:
□ What assets covered?
□ What liabilities included?
□ Any exclusions?
□ All customer types?

TIMING:
□ Point-in-time or continuous?
□ How recent?
□ Frequency of updates?
□ Historical availability?

ATTESTOR QUALIFICATIONS:
□ Who performed attestation?
□ What are their qualifications?
□ Independence verified?
□ Reputation/track record?

CUSTOMER VERIFICATION:
□ Can customers verify inclusion?
□ Merkle proof availability?
□ Privacy maintained?
□ Verification process clear?

GOOD INDICATORS:
✅ Reputable third party
✅ Clear methodology
✅ Cryptographic proof
✅ Customer verification possible
✅ Regular/frequent updates

CONCERNS:
⚠️ Self-attestation
⚠️ Vague methodology
⚠️ No third-party involvement
⚠️ Infrequent updates
⚠️ No customer verification

ISO 27001:

WHAT IT IS:
International standard for information security
management systems (ISMS)

- Implement ISMS
- Third-party audit
- Annual surveillance audits
- Three-year recertification

- Security policies
- Organization of security
- Human resources security
- Asset management
- Access control
- Cryptography
- Physical security
- Operations security
- Communications security
- System acquisition/development
- Supplier relationships
- Incident management
- Business continuity
- Compliance

WHAT IT MEANS FOR CUSTODY:

Positive Indicators:
✅ Structured security program
✅ Regular third-party review
✅ Continuous improvement
✅ Broad security coverage

Limitations:
⚠️ Not crypto-specific
⚠️ Scope varies
⚠️ Implementation varies
⚠️ Certification ≠ perfect security

VERIFICATION:
□ Is certificate current?
□ What's the scope?
□ Who certified (accredited body)?
□ Any non-conformities?
```

CRYPTOCURRENCY SECURITY STANDARD:

WHAT IT IS:
Crypto-specific security framework
Developed by CryptoCurrency Certification Consortium

LEVELS:
Level I: Basic security
Level II: Enhanced security
Level III: Advanced security (institutional)

1. Cryptographic Asset Management

1. Operations

1. Security

WHAT IT MEANS FOR CUSTODY:

Positive Indicators:
✅ Crypto-specific assessment
✅ Key management focus
✅ Operational procedures
✅ Level indicates rigor

Limitations:
⚠️ Less widespread than ISO
⚠️ Adoption varies
⚠️ Not universally accepted
⚠️ Newer standard

EVALUATION:
□ What level certified?
□ Who performed assessment?
□ What was scope?
□ Any gaps identified?
```

OTHER RELEVANT CERTIFICATIONS:

PCI DSS:
Relevance: If handling payment cards
Scope: Card data security
Value: Payment processing security

SOC 2 Type II:
Covered earlier, most important for custody

NIST Cybersecurity Framework:
Relevance: Framework alignment
Scope: Comprehensive cybersecurity
Value: Structured approach

CSA STAR:
Relevance: Cloud security
Scope: Cloud controls
Value: If cloud-based custody

CERTIFICATION EVALUATION FRAMEWORK:

  1. Is it current?
  2. What's the scope?
  3. Who issued it?
  4. What does it actually cover?
  5. What are its limitations?
  • Certifications complement each other
  • None are comprehensive alone
  • Combine with other DD elements
  • Ongoing verification needed

COMPREHENSIVE CONTROL EVALUATION:

TIER 1: INDEPENDENT VERIFICATION
□ SOC 2 Type II report
□ ISO 27001 certification
□ CCSS certification (if applicable)
□ Penetration test results
□ Proof of reserves

TIER 2: OPERATIONAL CONTROLS
□ Access management
□ Change management
□ Incident management
□ Business continuity
□ Vendor management

TIER 3: SECURITY CONTROLS
□ Key management
□ Network security
□ Application security
□ Physical security
□ Employee security

TIER 4: COMPLIANCE CONTROLS
□ AML/KYC (covered Lesson 11)
□ Regulatory compliance
□ Privacy controls
□ Audit trails

EVALUATION SCORING:

For Each Control Area:
Strong: Documented, tested, no issues
Adequate: Documented, minor issues
Weak: Gaps, material issues
Absent: No evidence of control
```

DOCUMENTATION REVIEW:

INITIAL REQUEST:
□ SOC 2 Type II (most recent)
□ Penetration test executive summary
□ ISO 27001 certificate
□ CCSS certificate (if applicable)
□ Proof of reserves attestation
□ Insurance certificates

REVIEW PROCESS:

  • All documents within validity

  • No expired certifications

  • Recent audit dates

  • Services used in scope

  • No critical carve-outs

  • Geographic coverage

  • Exceptions in SOC

  • Non-conformities in ISO

  • Gaps in POR

  • Coverage limits in insurance

  • What's not covered?

  • What additional info needed?

  • What requires clarification?

  • Clarify exceptions

  • Understand carve-outs

  • Verify remediation

  • Assess materiality

  • All received documents

  • Review notes

  • Follow-up correspondence

  • Assessment conclusions


SAMPLE SOC ANALYSIS:

Scenario: Reviewing custodian SOC 2 Type II

FINDINGS FROM REVIEW:

Positive:

  • Unqualified opinion
  • Full 12-month period
  • Security and availability criteria
  • No material exceptions
  • 2 access control exceptions noted
  • 1 change management exception
  • Subservice org for cloud infrastructure
  • CUECs listed require implementation

Analysis:

Access Control Exceptions:
"Two instances where terminated employee
access was not removed within 24-hour policy"
Assessment: Minor operational exception
Remediation: Process improvement noted
Risk: Low

Change Management Exception:
"One instance of emergency change without
post-implementation documentation"
Assessment: Procedural gap
Remediation: Training provided
Risk: Low

Subservice Organization:
"AWS provides infrastructure services"
Assessment: Common arrangement
Note: Relies on AWS SOC reports
Action: Request AWS SOC confirmation

Conclusion:
Acceptable SOC report with minor exceptions
Implement required CUECs
Monitor for recurring exceptions
```

CONTROL EVALUATION DECISION:

GREEN LIGHT (Proceed):
✅ SOC 2 Type II, unqualified
✅ No material exceptions
✅ Current certifications
✅ Adequate POR
✅ All major controls covered

YELLOW LIGHT (Proceed with Conditions):
⚠️ Minor exceptions (monitor)
⚠️ Some certifications pending
⚠️ CUECs require attention
⚠️ Limited scope in some areas
→ Proceed with monitoring plan

RED LIGHT (Do Not Proceed):
🚩 Qualified SOC opinion
🚩 Material unresolved exceptions
🚩 No independent verification
🚩 Missing critical certifications
🚩 Major control gaps
→ Requires remediation before proceeding

SOC 2 Type II provides meaningful assurance - Industry standard validation

Independent verification adds value - Third-party assessment important

POR is necessary but not sufficient - Shows assets, not complete picture

Certifications indicate commitment - Investment in security programs

⚠️ Exception materiality judgment - Context determines significance

⚠️ Certification quality variation - Not all certifications equal

⚠️ POR completeness - Off-chain liabilities uncertain

⚠️ Future performance - Past controls don't guarantee future

📌 Accepting certifications at face value - Must verify scope and currency

📌 Ignoring exceptions - May indicate systemic issues

📌 Over-relying on POR - Point-in-time, limited scope

📌 Checkbox approach - Certifications without substance

SOC reports, certifications, and POR provide valuable information—but only if you know how to read them. The details matter: scope, exceptions, methodology, timing. These documents inform judgment; they don't replace it.


Assignment: Analyze provided control documentation and prepare evaluation.

Scenario: You've received SOC 2 Type II, ISO 27001 certificate, and POR attestation from a custody provider. Evaluate the documentation.

  • Part 1: SOC Report Analysis (1.5 pages)
  • Part 2: Certification Evaluation (1 page)
  • Part 3: POR Assessment (1 page)
  • Part 4: Overall Conclusion and Gaps (1.5 pages)

Format: Professional evaluation report, 5 pages maximum

Time Investment: 3-4 hours


1. What is the key difference between SOC 2 Type I and Type II?
Answer: C - Type II tests operating effectiveness over a period; Type I only tests design

2. What are Complementary User Entity Controls (CUECs)?
Answer: B - Controls users must implement for the overall system to be effective

3. What is the primary limitation of proof of reserves?
Answer: A - Point-in-time snapshot that may not reflect complete liabilities

4. What should you do if a SOC report has minor exceptions?
Answer: D - Review materiality, monitor for patterns, assess remediation

5. Why are multiple forms of verification important?
Answer: B - Each has limitations; together they provide comprehensive view


End of Lesson 12

Total Words: ~4,200
Estimated Completion Time: 55 minutes reading + 3-4 hours for deliverable

Key Takeaways

1

SOC 2 Type II is the standard for custody evaluation

- Type I is insufficient

2

Read SOC reports carefully

- Exceptions, scope, carve-outs all matter

3

Proof of reserves has significant limitations

- Not a complete picture

4

Certifications indicate commitment but aren't guarantees

- Verify scope and currency

5

Integrate multiple sources for comprehensive view

- No single document sufficient ---