| ▲ | fadijob a day ago | |||||||||||||||||||||||||||||||||||||
We analyzed the leaked Delve audit reports and found some wild patterns: - The same auditor license number (PAC-FIRM-LIC-47383) appears in 487 out of 494 reports - Every Type II report has identical page numbers: Section 4 at page 30, tests at page 59, Section 5 at page 82 - 220+ "No exceptions noted" per report, across every single client - The system descriptions were copy-pasted from each company's marketing website We built tools to check this data: - Search by company name to see if they're in the leaked database - Paste any SOC 2 report text to scan for 10 template fingerprints - A swipe game where you try to tell real audit excerpts from the fakes (harder than you'd think) 455 companies indexed, all free, no signup needed. I'm also curious what the HN community thinks about the fingerprint detection approach, are there patterns we're missing? | ||||||||||||||||||||||||||||||||||||||
| ▲ | SkyPuncher 5 hours ago | parent | next [-] | |||||||||||||||||||||||||||||||||||||
Most of this isn't that damning. SOC IIs are already highly templatized, so pages matching up really isn't meaningful. In fact, an overly detailed or overly verbose template is more likely to have matching pages since you'd never have to add additional content to it. System descriptions don't necessarily hold much weight. They're often more about giving a general shape of the system to help orient the reader, rather than providing a technically complete picture. Most of the meat in these is about the controls being tested (which are semi-standardized within an auditor) and the results. Many of these controls are really basic and easy to get "no exceptions noted". That being said, nearly everyone has at least one exception, even if it's minor. The fact that they didn't find any across all of their clients is a strong indicator they're not diving deeply enough. | ||||||||||||||||||||||||||||||||||||||
| ▲ | dpe82 a day ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||
Genuinely curious: if you just need an independent audit report to check a box, do you really care how good a job the auditor did? | ||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||
| ▲ | nemomarx a day ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||
The swipe game idea is new to me - you have internal testers or some team use that to go through it? | ||||||||||||||||||||||||||||||||||||||
| ▲ | mikeocool a day ago | parent | prev | next [-] | |||||||||||||||||||||||||||||||||||||
The no exceptions noted piece is kinda funny. Most SOC2 auditors at least put in the minimal effort of finding one person who didn’t do their cybersecurity training, so the report’s not total boiler plate. | ||||||||||||||||||||||||||||||||||||||
| ▲ | jiveturkey a day ago | parent | prev [-] | |||||||||||||||||||||||||||||||||||||
I'd find this more compelling if you looked at a few thousand Vanta or Drata reports grouped by auditor. You're going to find the same commonalities with only trivial language differences. SOC2 reports are private between you and the auditor (that way if you "fail" you can just find another auditor or have a re-do, and no one is the wiser), and basically always gated behind a sales touchpoint (another hint about what utility they provide). I guess the Delve ones leaked which is why they can all be compared. 220 out of 494 "no exceptions" seems quite high to me. Nobody I've ever dealt with allows an exception to make its way into the report. | ||||||||||||||||||||||||||||||||||||||