Compliance / Assurance Standard
DETAIL

AICPA TSC 2017 (with 2022 revised POF)

SmartSuite provides the system for managing controls, evidence, mappings, assessments, and reporting.
Framework text may require a separate license unless explicitly provided.

Overview

AICPA TSC 2017(with 2022 revised Points of Focus) is a control criteria frameworkthat supports organizations in establishing, evaluating, andreporting on controls related to security, availability, processingintegrity, confidentiality, and privacy. It sets the foundationalcriteria for assessing the effectiveness of internal controls overinformation systems, critical for data protection and riskmanagement.

Developed andmaintained by the American Institute of Certified Public Accountants(AICPA), the Trust Services Criteria are primarily applied by serviceorganizations, independent auditors, and compliance teams within SOC2 and SOC 3 engagements. The framework outlines control objectivesand Points of Focus, guiding organizations in implementingcybersecurity controls, privacy governance, operational resilience,and compliance oversight in line with recognized assurance standards.

Organizationsoperationalize the AICPA TSC by mapping existing policies andcontrols to the criteria, addressing gaps, and producingdocumentation for audit readiness. The framework is frequentlyintegrated with broader compliance, cybersecurity, and riskmanagement programs—enabling organizations to support third-partydue diligence, maintain regulatory compliance, and build trust withinSOC reporting and similar assurance ecosystems.

Why it Matters

The AICPA TrustServices Criteria provide a comprehensive foundation for evaluatingand enhancing controls that safeguard critical systems and sensitivedata.

Key benefits include:

  • Strengthen cybersecurity governance

Establish clearcriteria and controls to ensure continuous oversight andaccountability for information security practic

  • Enhance audit readiness

Enable robustdocumentation and evidence-gathering to streamline external auditprocesses and support SOC attestation requirements

  • Increase regulatory alignment

Supportcompliance with multiple assurance standards and regulations throughconsistent control objectives and recognized Points of Focus

  • Promote operational resilience

Identify andaddress control gaps that could impact system availability,reliability, and business continuity across organizationalenvironment

  • Protect sensitive and confidential data

Reduce the riskof unauthorized access and disclosure by implementing controlstailored to privacy and confidentiality requirements.

How it Works

The AICPA TrustServices Criteria (TSC) 2017, with the 2022 revised Points of Focus(POF), organizes cybersecurity into defined criteria and controlfamilies—security, availability, processing integrity,confidentiality, and privacy. Each criterion is accompanied by Pointsof Focus that outline considerations and expected behaviors, enablinga control catalog approach that ties to risk management processes andgovernance domains.

Organizationsimplement the TSC by conducting risk assessments, selecting andimplementing security controls mapped to the criteria, andestablishing policies and monitoring to demonstrate compliance.Typical activities include control design and testing, evidencecollection for assessments, continuous monitoring of securitypractices, incident response integration, and mapping controls toregulatory requirements and audit programs.

WithinSmartSuite, teams can operationalize the AICPA TSC by buildingcontrol libraries mapped to the POF, maintaining a risk register,governing policies, and collecting evidence against control tests.SmartSuite supports compliance tracking, remediation workflows, auditreadiness, and dashboards for monitoring control effectiveness andreporting to governance stakeholders.

Key Elements

  • Security, Availability, and Confidentiality Criteria

Specifiesstructural categories for controls protecting systems againstunauthorized access, disruptions, and data disclosure risks.

  • Processing Integrity Controls

Describescriteria ensuring accurate, timely, and authorized processing ofinformation in core business systems.

  • Privacy Requirements

Outlines datagovernance and programmatic controls for managing personalinformation collection, use, retention, and disposal

  • Points of Focus Guidance

Establishesspecific considerations within each criterion to clarify intent andassist in consistent application.

  • Risk and Governance Structure

Definesmechanisms for oversight, accountability, and management of risksassociated with information systems and data handling.

  • Control Objective Organization

Groupsmeasurable statements that underpin the design, implementation, andoperation of effective internal controls.

Framework Scope

AICPA TSC 2017 (with 2022 revised Points of Focus) is adopted by serviceorganizations, technology providers, and entities overseeing customerdata or outsourced information systems. It guides the establishmentand evaluation of controls over security, availability, processingintegrity, confidentiality, and privacy, often when preparing for SOCattestations or demonstrating control effectiveness in assuranceengagements.

Framework Objectives

AICPA TrustServices Criteria 2017 (with 2022 revised Points of Focus) provides acomprehensive foundation for evaluating and enhancing organizationalsecurity, privacy, and compliance programs

  • Safeguard sensitive data through robust security controls and risk management practices
  • Strengthen cybersecurity governance to promote accountability and oversight
  • Enable ongoing compliance with regulatory, contractual, and assurance requirements
  • Enhance operational resilience to minimize disruption from cyber threats
  • Support effective privacy governance and responsible data protection
  • Demonstrate audit readiness and transparency in internal control environments

The AICPA Trust Services Criteria (TSC) 2017 with the 2022 revised. Point of Focus for cybersecurity aligns with and is commonly mapped to NIST CSF, ISO/IEC 27001, and NIST SP 800-53. Organizations implement it for SOC reporting, third party assurance, regulatory compliance, and to formalize security governance and operational controls.

Common Framework Mappings

AICPA TSC 2017is commonly mapped to other cybersecurity and privacy frameworks tostreamline audit processes, demonstrate compliance, and ensurecomprehensive risk management across diverse security and regulatoryenvironments.

Mappedframeworks include:

CIS CriticalSecurity Controls

ISO/IEC 27001

ISO/IEC 27002

ISO/IEC 27018

ISO/IEC 27701

MITRE ATT&CK

NISTCybersecurity Framework

NIST SP 800-53

At a Glance
AICPA TSC 2017 – POF 2022
  • checklist
    Classicifation
    Category
    info
    Compliance / Assurance Standard
    Domain
    info
    Cybersecurity
    Framework Family
    info
    SOC Frameworks
  • info
    Regulatory Context
    Type
    info
    Standard
    Legal Instrument
    info
    Standard
    Sector
    info
    Cross-Sector
    Industry
    info
    Cross-Industry
  • arrow_upload_ready
    Region / Publisher
    Region
    info
    Europe
    Region Detail
    info
    United States
    Publisher
    info
    American Institute of Certified Public Accountants (AICPA)
  • published_with_changes
    Versioning
    Version
    info
    2017 (with 2022 revised Points of Focus)
    Effective Date
    info
    2017
    Issue Date
    info
    2022
  • graph_3
    Adoption
    Adoption Model
    info
    Certification
    Implementation Complexity
    info
    High
  • captive_portal
    Official Reference
License Information

License included / downloadable: No

The AICPA Trust Services Criteria require purchase or licensed access and are not publicly available. License not included with platform

Official Resources
AICPA Trust Services Criteria
Describes the framework for evaluating and reporting on system controls.
chevron_forward
Guide to SOC 2 Reporting on Controls
Provides guidance on SOC 2 reporting according to the Trust Services Criteria.
chevron_forward
AICPA Privacy Management Framework
Outlines principles and criteria for managing privacy risks within the Trust Services Criteria.
chevron_forward
SMARTSUITE

How SmartSuite Supports AICPA TSC 2017 (with 2022 revised POF)

Centralize controls, evidence, and audit workflows to stay continuously SOC 2–ready.

Trust Services Criteria Control Library

Pre-built structure for Security, Availability, Confidentiality, Processing Integrity, and Privacy controls.

Ownership, Cadence, and Accountability

Assign control owners, set review schedules, and ensure controls run on time—every time.

Evidence Collection and Audit Trail

Capture evidence in one place with clear links to controls, timestamps, and reviewers.

Control Testing and Operating Effectiveness

Plan tests, document results, and track exceptions to prove controls work over the audit period.

Risk and Vendor Alignment

Connect risks and third parties to the criteria they impact to simplify vendor and scope management.

Audit-Ready Reporting

Generate status views for auditors and leadership across criteria, controls, and open issues.

Related frameworks

CIS Controls v8.1

CIS Controls v8.1 provides prioritized, practical security actions to help organizations mitigate common cyber threats and strengthen defenses.

Learn More
arrow_forward
ISO 27001:2022

ISO/IEC 27001:2022 is an international ISMS standard that helps organizations manage information security risks and protect data.

Learn More
arrow_forward
ISO 27002:2022

ISO/IEC 27002:2022 provides best-practice information security controls to help organizations select, implement, and manage protections for information assets.

Learn More
arrow_forward
ISO 27018

ISO/IEC 27018 provides guidelines for protecting personally identifiable information processed in public cloud services.

Learn More
arrow_forward
ISO 27701

ISO/IEC 27701 extends ISO/IEC 27001 to help organizations manage privacy and protect personally identifiable information.

Learn More
arrow_forward
MITRE ATT&CK

MITRE ATT&CK is a knowledge framework documenting adversary tactics and techniques to help organizations detect, analyze, and respond to attacks.

Learn More
arrow_forward
NIST CSF 2.0

NIST Cybersecurity Framework (CSF) v2.0 is a risk-based framework that helps organizations manage and reduce cybersecurity risks.

Learn More
arrow_forward
NIST 800-53 Rev.5

NIST SP 800-53 Rev. 5 provides a catalog of security and privacy controls to manage risks to information systems.

Learn More
arrow_forward
ONBOARDING FAQS

Frequently Asked Questions For AICPA TSC 2017 (Trust Services Criteria)

What is the AICPA TSC 2017 used for?

The AICPA Trust Services Criteria (TSC) 2017 provides a framework for evaluating the effectiveness of controls related to security, availability, processing integrity, confidentiality, and privacy. It is primarily used in SOC 2 and SOC 3 engagements to support third-party assurance, risk management, and data protection requirements.

Is compliance with AICPA TSC 2017 mandatory or certifiable?

Adherence to the AICPA TSC 2017 is not legally mandatory, nor is there a formal certification. Instead, organizations demonstrate compliance through third-party attestation engagements—such as SOC 2 or SOC 3—where an independent auditor assesses conformity with the relevant criteria.

Who does the AICPA TSC 2017 apply to?

The AICPA TSC 2017 is applicable to service organizations that deliver or support IT-driven services and require independent assurance over their internal controls for clients, regulators, or stakeholders. It is relevant for businesses handling sensitive or regulated data, particularly those providing cloud, SaaS, or third-party data processing services.

What are the main components or artifacts required by the AICPA TSC 2017?

Organizations must address control criteria across the five categories (security, availability, processing integrity, confidentiality, privacy) and demonstrate alignment with the revised Points of Focus (POF). Required artifacts often include documented policies, risk assessments, control evidence, and monitoring records that support SOC reporting.

How does an organization implement the AICPA TSC 2017 framework?

Implementation typically involves mapping existing controls and policies to the TSC criteria, performing gap analyses, formalizing control design, and establishing ongoing monitoring mechanisms. Evidence collection, periodic risk assessments, and regular control testing are necessary to demonstrate compliance during an audit.

How does the AICPA TSC 2017 relate to other cybersecurity and compliance frameworks?

The AICPA TSC 2017 may be mapped to other frameworks such as ISO 27001, NIST CSF, or GDPR, to enable integrated risk and compliance programs. Its criteria are designed to be compatible with broader regulatory and industry standards, facilitating comprehensive control environments and reducing audit overlap.

How would SmartSuite support AICPA TSC 2017?

SmartSuite enables organizations to manage AICPA TSC 2017 compliance by providing control libraries mapped to Points of Focus, a risk register to track risks, and tools for policy governance and evidence collection. The platform supports audit readiness through automated workflows, control testing, remediation tracking, and dashboards for real-time compliance reporting to stakeholders.

NEXT STEP

Put CRI Profile into action with SmartSuite

Map controls, collect evidence, run assessments, manage remediation, and report readiness - all from a single connected system.

Explore in SmartSuite
chevron_forward
View all Frameworks
chevron_forward