• Events and Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
  • Events and Webinars
  • Resources
    • Blog
    • Case Studies
    • News
    • Newsletter
    • Infographics
    • Papers
    • Posters
    • Video
  • Careers
    • Careers at HBS
    • Open Positions
    • Student Opportunities
  • About HBS
    • About Us
    • Leadership
    • Locations
    • Partners
    • Green Initiatives
HBS logo
HBS Logo
  • Infrastructure
    • CLOUD

      • Cloud Solutions
      • Public Cloud
      • Hybrid Cloud
      • Infrastructure as a Service
      • Cloud Security Solutions
      • Backup, Replication and Disaster Recovery
      • HBS Cloud Hosting Services

      DATA CENTER

      • Data Center Solutions
      • Traditional Data Center
      • Hyperconverged
      • Colocation
      • Directory Services
      • Cloud Email and Calendar Solutions

      NETWORK AND ACCESS

      • Network Infrastructure
      • Enterprise Mobility
      • Wireless Solutions
      • SD-WAN
      • Structured Cabling
      • Staff Augmentation
  • Managed Services
    • MANAGED ONE

      • Managed One Overview
      • Managed Backup and Disaster Recovery
      • Managed Email and Collaboration Security
      • Managed Firewall

       

      • Managed HaaS and SaaS
      • Managed IT Help Desk
      • Managed Network and Server Monitoring

      HBS + PARTNER SOLUTIONS

      • HBS Secure with Verkada
      • HBS Collaborate with Webex
      • Managed XDR
      HBS Managed One Megamenu Graphic
  • Modern Workplace
    • MICROSOFT

      • Microsoft Licensing Management
      • Microsoft Modern Workplace
      • Microsoft Copilot
      • Microsoft Fabric
      • Microsoft Funding Opportunities

       

      • Dynamics 365 Business Central
      • Dynamics 365
      • Dynamics GP

      COLLABORATION

      • Audio Visual
      • Unified Communication Solutions
      • HBS Collaborate with Webex
  • Professional Services
    • ADVISORY

      • Virtual CISO
      • Virtual CIO
      • Project Management
      • IT Business Consulting

      ENGINEERING SERVICES

      • Staff Augmentation

      AI & ANALYTICS

      • Artificial Intelligence
      • AI Advance
      • AI Predict
      • AI Assist
      • Data Management and Analytics
      • Microsoft Copilot
      • Microsoft Fabric

      APPLICATION INNOVATION

      • Website Development
      • Application Development

      DOCUMENT MANAGEMENT

      • Document Management Services
      • Document and Check Scanners
  • Security
    • CYBERSECURITY

      • Managed XDR
      • Penetration Testing
      • Vulnerability Scanning
      • Email Security Services
      • Digital Forensics and Incident Response
      • Backup, Replication and Disaster Recovery
      • Firewalls
      • Cloud Security Solutions

       

      • Virtual CISO
      • Virtual Security Team
      • Virtual Security Engineer
      • Cybersecurity Risk Assessment
      • Governance and Compliance
      • SOC 2
      • CMMC
      • Managed Security Awareness Training

      PHYSICAL SECURITY

      • Security Solutions
      • HBS Secure with Verkada
      Cybersecurity Risk Assessment Megamenu Graphic
  • Search
Contact Us
Blog

SOC Reporting Controls of Subservice Organization – Inclusive vs Carve Out Method

  • Written by: Megan Howard
  • May 22, 2017
SOC Reporting Graphic

This article is written for service organizations that are going through or are considering a SOC report. The purpose of this text is to help explain how to handle controls of subservice organizations (1 A service organization used by another service organization to perform some of the services provided to user entities that are likely to be relevant to those user entities' internal control over financial reporting.). There are two methods for handling subservice organizations’ controls: Inclusive and Carve-Out.  

Inclusive Method 

The inclusive method is when the subservice organization’s controls and functions are included in the service organization’s description of the system. These controls and functions will be included in the scope of the report and therefore tested just as the service organization’s controls are tested. A written assertion from management must be signed by the subservice organization to state the accuracy of the controls as they pertain to the subservice organization’s services. The subservice organization must also be involved in the fieldwork, which makes communications and the ability to work together very important.  

Carve-Out Method 

The carve-out method allows an organization to “carve-out” or exclude the controls of the subservice organization from the scope of the engagement and report. However, it is the service organization’s responsibility to have controls in place to monitor the subservice organization to ensure their controls are functioning as intended. The monitoring of these controls will be included in the SOC examination and description of services.  

Which SOC Reporting Controls Method Should Be Used? 

When determining the best method for your organization, start by checking if the subservice organization has a type 1 or type 2 report that covers the outsourced services. The key here is to make sure the exact services you are using are covered in the SOC report. Organizations often have different SOC reports for various aspects of their business. If the subservice organization has a SOC report that covers the correct services, use the carve-out method. 

If the organization does not have a SOC report that covers the services your organization utilizes you will most likely want to use the inclusive method. As stated above, communication and cooperation with this subservice organization will be critical in a successful audit. They have to be willing to have their control environment tested as well as provide a written assertion from management. Most organizations are willing to do this as they don’t want to lose your business. If they aren’t cooperative and don’t have or plan to implement acceptable security controls, it may be time to consider a new subservice provider. 

Although the inclusive method is the preferred method for subservice organizations without a SOC report, the carve-out method can be used in this scenario as well. However, the controls covered by the subservice organization would then have to be excluded from the report and as a result your organization would not have a complete report to provide to customers. The gaps in the report may reduce the value of your SOC report and customers may raise questions regarding the completeness. 

In summary, if you can use the carve-out method, use it. It will save time, money and the hassle of including another organization into the conversations. If you have any uncertainty about which method is best for your organization, please contact us.

What to Expect with SOC 2®
1 http://www.google.com"}https://www.aicpa.org/Research/Standards/AuditAttest/DownloadableDocuments/AT-00801.pdf

Related Content

SOC 2 Report and Locks Graphic

What You Should Expect With SOC 2®

Knowing what to expect from a SOC 2 audit may seem overwhelming, but with the correct readiness process you can have a successful report.

Learn More »
Image of binders with vendor security reports with text that says Where to Begin

Analyzing and Assessing Third-Party Security Reports

Assessing and analyzing third-party vendors should be a top priority. Here are a few things to consider while reviewing a vendor’s security program.

Explore More »
A visual roadmap illustrating a five-step process for IT strategy. The steps include: Identify: Organizational mission and initiatives. Document: Current state. Build: Timeline and milestones. Allocate: Budget and manage risks. Review: Continuously optimize. The roadmap follows a winding path with blue dots marking each step. The blue HBS logo is in the bottom right.

IT Strategy Roadmap: Why Every Business Needs One

Struggling with IT alignment, security, and innovation? An IT strategy roadmap means optimize resources, scalable business growth, and digital transformation.

Read More »
  • Cybersecurity
Blog

Connect:

[email protected]  |  800.236.7914

HBS logo

HQ | 1700 Stephen Street
Little Chute, WI 54140
Locations

HBS Remote Support | Service & Technical Support | E-Bill Portal
Standard Terms & Conditions | Cookie Policy | Privacy Policy | Onboarding Form | End User Agreements | E-Bill FAQ | Site Map
Any purchase is governed by the HBS Standard Terms and Conditions.
©2026 Heartland Business Systems. All rights reserved.

Halo from HBS
This chat may be recorded as described in our Privacy Policy.