← Frameworks / ISAE 3402 / Coverage Analysis

ISAE 3402 Assurance Reports on Controls at a Service Organisation — SP 800-53 Coverage

How well do NIST SP 800-53 Rev 5 controls address each ISAE 3402 requirement? This analysis maps from framework clauses back to SP 800-53, with expert coverage weightings and gap identification.

Coverage Distribution
Full (85-100%): 0 Substantial (65-84%): 1 Partial (40-64%): 4 Weak (1-39%): 5

Clause-by-Clause Analysis

Sorted by clause
Clause 1 Scope and Objectives

Rationale

PL-01/PL-02 security planning policy and system security plans define scope boundaries for information systems, partially analogous to engagement scope definition. PM-01 information security program plan and PM-05 system inventory help define the system environment under assessment. PM-09 risk management strategy and PM-11 mission/business process definition provide context for understanding what is in scope. CA-01 assessment policy and CA-06 authorisation establish evaluation frameworks. RA-01/RA-02/RA-03 risk assessment methodology, security categorisation, and risk assessment provide the analytical foundation for understanding system boundaries and risks — concepts that parallel ISAE 3402 scope determination.

Gaps

ISAE 3402 Clause 1 defines the engagement scope from an assurance perspective — the service auditor's terms of engagement, the period under examination, the system description boundaries, and the distinction between reasonable vs limited assurance. SP 800-53 addresses system boundary definition and security planning but does not cover assurance engagement terms, auditor independence requirements, materiality thresholds for engagement scoping, or the formal agreement between service organisation management and the service auditor on what constitutes the system under examination.

Clause 2 Management Assertion

Rationale

PL-02 system security plan documents the system description that management must assert upon. PL-04 rules of behaviour establishes management expectations. PM-01 security program plan and PM-09 risk management strategy reflect management's commitment to controls. CA-02 control assessments and CA-07 continuous monitoring provide evidence that management evaluates controls. CA-05 plan of action and milestones tracks known deficiencies. CA-06 authorisation represents management's formal acceptance of risk — the closest SP 800-53 analogue to management assertion.

Gaps

ISAE 3402 management assertion is a formal written statement by service organisation management attesting that: (a) the system description fairly presents the system as designed and implemented, (b) control objectives were suitably designed, and (c) for Type II, controls operated effectively throughout the period. SP 800-53 does not require management to make formal written assertions about system descriptions, does not address the concept of 'fair presentation' of a system, and does not require management to formally attest to design suitability or operating effectiveness in a format suitable for external assurance consumption.

Clause 3 Control Objectives

Rationale

PM-01 security program plan defines security objectives. PM-09 risk management strategy establishes risk tolerance that shapes control objectives. PM-11 mission/business process definition connects controls to business requirements relevant to financial reporting. PL-02 system security plan documents control requirements. CA-01 assessment policy, CA-02 control assessments, and CA-06 authorisation evaluate whether controls meet their objectives. RA-01/RA-02/RA-03 risk assessment methodology and security categorisation help define what control objectives are needed. RA-09 criticality analysis identifies which objectives are most important. These controls collectively support defining and evaluating control objectives, which is central to ISAE 3402.

Gaps

ISAE 3402 control objectives are specifically tied to financial reporting relevance — they define what the controls at the service organisation must achieve to provide reasonable assurance that user entities' financial statements are not materially misstated. SP 800-53 defines security control objectives broadly but does not frame them in terms of financial reporting assertions (completeness, accuracy, validity, restricted access, cut-off), does not require control objectives to be linked to user entities' financial reporting risks, and does not address the completeness of control objective coverage across all relevant financial processing activities.

Clause 4 Control Activities

Rationale

This is the strongest mapping area. ISAE 3402 control activities — logical access controls, change management, IT operations, and physical security — align directly with SP 800-53 control families. AC family (AC-01 through AC-06, AC-17) covers logical access comprehensively. CM family (CM-01 through CM-07) addresses change management. AU family (AU-01/AU-02/AU-03/AU-06/AU-12) covers monitoring and logging. IA family (IA-01/IA-02/IA-04/IA-05) addresses authentication. PE family (PE-01 through PE-14) covers physical security. CP family (CP-01/CP-02/CP-09/CP-10) addresses backup and recovery operations. SA family (SA-03/SA-10/SA-11) covers system development lifecycle. SC family (SC-07/SC-08/SC-12/SC-13/SC-28) addresses communications and data protection. SI family (SI-02/SI-03/SI-04/SI-07/SI-10/SI-12) covers system integrity and malware protection.

Gaps

While SP 800-53 provides excellent coverage of IT general controls that typically form the control activities in an ISAE 3402 report, the standard does not prescribe how these controls should be documented for external assurance purposes, does not define the level of granularity required for control descriptions in a service organisation report, and does not address application-level controls specific to financial transaction processing (e.g., three-way matching, automated reconciliation, or transaction authorisation workflows) that are commonly included in ISAE 3402 control activity descriptions.

Clause 5 Type I vs Type II Reports

Rationale

CA-02 control assessments evaluate control design and operational effectiveness, partially analogous to the distinction between Type I (design at a point in time) and Type II (design plus operating effectiveness over a period). CA-07 continuous monitoring provides ongoing evidence of control operation over time, which supports the Type II concept of testing over a period. CA-05 plan of action and milestones tracks remediation of identified deficiencies. PM-06 measures of performance provides metrics. PM-14 testing, training, and monitoring addresses periodic evaluation that parallels the concept of testing controls over time.

Gaps

ISAE 3402 distinguishes fundamentally between Type I reports (opinion on design suitability at a point in time) and Type II reports (opinion on design suitability AND operating effectiveness over a specified period, typically 6-12 months). SP 800-53 does not distinguish between point-in-time and period-of-time assessments in this way, does not define testing procedures that must be performed for each report type, does not address the service auditor's obligation to test a representative sample of control instances across the entire examination period, and does not cover bridge letters or the gap between the examination period end date and the user entity's financial year-end.

Clause 6 Service Auditor Responsibilities

Rationale

CA-02 control assessments address evaluation methodology. CA-04 security certification provides a framework for independent assessment. CA-07 continuous monitoring supports ongoing evidence gathering. CA-08 penetration testing addresses independent testing methodology. AU-06 audit record review and analysis covers evidence review. AU-16 cross-organisational auditing touches on audit across boundaries. PM-06 measures of performance supports quantitative assessment. These controls address aspects of assessment but from an internal security perspective, not an external audit perspective.

Gaps

ISAE 3402 service auditor responsibilities are fundamentally about external audit methodology — planning the engagement, assessing risks of material misstatement, determining materiality, designing and performing tests of controls (inquiry, observation, inspection, re-performance), evaluating the sufficiency and appropriateness of evidence, forming an opinion, and communicating results. SP 800-53 does not address auditor independence requirements (ISQM 1, ISA 220), professional scepticism, audit sampling methodologies (statistical vs non-statistical), walkthrough procedures, the distinction between inquiry alone vs corroborative evidence, or the auditor's obligation to evaluate whether the system description is fairly presented.

Clause 7 Subservice Organisation Management

Rationale

SA-04 acquisition process and SA-09 external system services address third-party service provider management. SR-01 supply chain risk management policy, SR-02 supply chain risk assessment, SR-03 supply chain controls and processes, SR-05 acquisition strategies, and SR-06 supplier assessments provide supply chain governance. CA-03 information exchange covers cross-organisational agreements. PM-30 supply chain risk management strategy provides strategic oversight. AC-20 use of external systems addresses external service use. These collectively address monitoring and governance of subservice organisations, though not in the specific ISAE 3402 context.

Gaps

ISAE 3402 subservice organisation management specifically addresses the carve-out method (subservice organisation excluded from scope, with complementary subservice organisation controls identified) vs the inclusive method (subservice organisation included in scope, requiring the service auditor to assess those controls directly or use another auditor's report). SP 800-53 addresses supply chain risk management broadly but does not cover the formal carve-out vs inclusive method distinction, does not address how to present subservice organisation controls in the system description, and does not define the monitoring responsibilities that the service organisation must exercise over carved-out subservice organisations to satisfy user entity auditor requirements.

Clause 8 Complementary User Entity Controls (CUECs)

Rationale

PL-02 system security plan documents shared responsibility boundaries. SA-09 external system services defines expectations for external entities. CA-03 information exchange establishes cross-boundary agreements. AC-20 use of external systems and AC-21 information sharing address the interface between organisations. PM-09 risk management strategy includes consideration of shared risk. SR-01 supply chain policy and SR-07 supply chain operations security address inter-organisational responsibilities. These controls partially address the concept of shared responsibilities between service and user organisations.

Gaps

ISAE 3402 CUECs are specific controls that the service organisation's controls assume the user entity has implemented for the overall control objectives to be met (e.g., user entity must perform reconciliation of outputs, maintain access control over credentials, review exception reports). SP 800-53 addresses interconnection agreements and shared responsibilities at a high level but does not define the concept of complementary controls that must be assumed to exist at a customer organisation, does not require documentation of these assumed controls in a format suitable for user entity auditors, and does not address the service organisation's obligation to identify and communicate all necessary CUECs in its system description.

Clause 9 Description Criteria

Rationale

PL-02 system security plan documents the system including boundaries, environment, and interconnections — closely analogous to the ISAE 3402 system description. PL-08 security and privacy architectures describes system architecture. PM-05 information system inventory and CM-08 system component inventory identify infrastructure and software. PM-07 enterprise architecture addresses technology context. CM-02 baseline configuration, CM-12 information location, and CM-13 data action mapping document system components, data flows, and processing. SA-05 system documentation and SA-17 developer security architecture provide technical documentation. PS-01/PS-02 personnel security addresses the people element of the system description (roles, responsibilities, qualifications).

Gaps

ISAE 3402 description criteria require a comprehensive system description covering: (a) the types of services provided, (b) the principal service commitments and system requirements, (c) the components of the system (infrastructure, software, people, procedures, data), (d) the boundaries of the system, (e) how the system captures and addresses significant events and conditions, and (f) the process used to prepare the system description. SP 800-53 provides strong system documentation controls but does not require documentation formatted according to description criteria (DC1-DC9), does not address the concept of 'fair presentation' of a system for external assurance purposes, and does not require documentation of how significant events and conditions (incidents, changes, exceptions) are captured and addressed across the complete service delivery lifecycle.

Clause 10 Reporting and Communication

Rationale

CA-02 control assessments produce assessment reports. CA-05 plan of action and milestones communicates deficiencies and remediation status. CA-07 continuous monitoring generates ongoing status information. AU-06/AU-07 audit review and report generation support evidence-based reporting. PM-06 measures of performance provides metrics. IR-06 incident reporting and IR-07 incident response assistance address communication of security events. These controls support aspects of reporting and communication, though from an internal security management perspective rather than external audit reporting.

Gaps

ISAE 3402 reporting requirements are highly prescriptive — the service auditor's report must include: (a) a title indicating it is an independent service auditor's assurance report, (b) the addressee, (c) identification of the system description, (d) identification of the assertion, (e) the applicable criteria, (f) respective responsibilities of management and the service auditor, (g) a summary of work performed, (h) limitations of controls, (i) the service auditor's opinion (unmodified, qualified, adverse, or disclaimer), and (j) signature, date, and place. SP 800-53 does not address external audit report structure, opinion types, modified opinions, emphasis of matter paragraphs, other information sections, or the formal communication requirements between the service auditor, service organisation management, and those charged with governance.

Methodology and Disclaimer

This coverage analysis maps from ISAE 3402 clauses/requirements back to NIST SP 800-53 Rev 5 controls, assessing how well the SP 800-53 control set addresses each framework requirement.

Coverage weighting represents an informed estimate based on control-objective alignment, not a definitive compliance determination. Weightings consider whether SP 800-53 controls address the intent of each framework requirement, even where terminology and structure differ.

This analysis should be validated by qualified assessors for use in compliance or audit activities. The authoritative source for any compliance determination is always the framework itself.