
The National Institute of Standards and Technology (NIST) defines assurance as, "grounds for justified confidence that a [security or privacy] claim has been or will be achieved." Assurance is a measure of confidence.

Assurance is the output of security, compliance and resilience practices. There are several levels of assurance:
The more robust the rigor of an assessment, the more reasonable it is to demonstrate higher assurance. Low rigor is low assurance at best, unless scoping or evidence has been gamed and then it is No Assurance. Therefore, the concept of obtaining a "SOC 2 audit in 2 weeks for $5,000 " that is presented as something to be trusted is simply marketing dishonesty and is intellectually reprehensible. In their race to the bottom, the audit/certification mills promoting this nonsense do not sell trust or security. In reality, they just tarnish the concept of third-party audits/assessments and should be ashamed of passing off a minimally-scoped and low rigor assessment as a genuine assurance process that is worthy of trust.
If that sounds harsh, let's look at an authoritative source for guidance on the meaning of these key terms. The NIST Glossary is a great place to start:
The idea of trust as being something that can be relied upon is crucial. Stakeholders being presented with a SOC 2 audit report that is the result of gaming the scope of applicable controls or the evidence relied upon to demonstrate conformity with those controls is not trust. That SOC 2 audit report provides essentially no value and is the antithesis of trust since it does not accurately belay the actual security practices that exist within the organization. At best, it is security theater and at worst it is fraud.
We want GRC processes to be awesome and that means organizations need to implement security, compliance and resilience practices that can provide assurance to both internal and external stakeholders. That is how you build trust. Weakly scoped certifications that mean nothing are just a parasite feeding on the cybersecurity industry.
Fundamentally, assurance establishes a reasonable level of confidence that a stakeholder can trust security, compliance and/or resilience objectives will be achieved. This takes into consideration the risks associated with non-conformity (e.g., non-compliance) and the anticipated costs necessary to demonstrate conformity with the specified controls.
Assurance is more than just the control set, but the level of rigor that controls are evaluated. Either through internal resources or third-parties, the level of rigor performed in assessing an organization's controls impacts assurance, since defects in those controls affect the underlying confidence in the ability of those controls to operate as intended to produce the stated results.
When done right, assurance should address three key areas of stakeholder concern:
Yes. When organizations go through some form of certification process, it undergoes a conformity assessment (e.g., ISO 27001, CMMC, SCF CAP, SOC 2, PCI DSS, RMF, etc.). Conformity assessments are designed to assure that a particular product, service, or system meets a given level of quality or safety. Instead of a 100% pass criteria, conformity assessments rely on the concept of assurance to establish a risk-based threshold to determine if the intent of the objective(s) has been achieved.
The degree of assurance a stakeholder gains from a third-party cybersecurity certification is limited by:
This means some audits/certifications are not worth the paper they are written on, while others can provide a reasonable degree of assurance.