SOC2 Controls Notes in SG - Availability, Confidentiality - NETSEC

Latest

Learning, Sharing, Creating

Cybersecurity Memo
Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

Friday, August 2, 2024

SOC2 Controls Notes in SG - Availability, Confidentiality

 SOC2 Controls



SOC2 Availability



    AvailabilitySOC2:2017.A
10

error
Planning, Environmental Safeguards & RecoverySOC2:2017.A.1
10

error
Capacity Planning & ForecastingSOC2:2017.A.1.1
3

error
Measures Current UsageSOC2:2017.A.1.1.1
2

check_circle
Forecasts CapacitySOC2:2017.A.1.1.2
2

check_circle
Makes Changes Based on ForecastsSOC2:2017.A.1.1.3
2

error
Environmental Monitoring & BackupsSOC2:2017.A.1.2
7

check_circle
Identifies Environmental ThreatsSOC2:2017.A.1.2.1
1

check_circle
Designs Detection MeasuresSOC2:2017.A.1.2.2
2

check_circle
Implements and Maintains Environmental Protection MechanismsSOC2:2017.A.1.2.3
2

check_circle
Implements Alerts to Analyze AnomaliesSOC2:2017.A.1.2.4
1

error
Responds to Environmental Threat EventsSOC2:2017.A.1.2.5
2

check_circle
Communicates and Reviews Detected Environmental Threat EventsSOC2:2017.A.1.2.6
1

check_circle
Determines Data Requiring BackupSOC2:2017.A.1.2.7
1

error
Performs Data BackupSOC2:2017.A.1.2.8
2

check_circle
Addresses Offsite StorageSOC2:2017.A.1.2.9
1

error
Implements Alternate Processing InfrastructureSOC2:2017.A.1.2.10
2

error
Recovery TestingSOC2:2017.A.1.3
3

error
Implements Business Continuity Plan TestingSOC2:2017.A.1.3.1
2

check_circle
Tests Integrity and Completeness of Backup DataSOC2:2017.A.1.3.2




SOC 2 Confidentiality



ConfidentialitySOC2:2017.C
6

circle
InformationSOC2:2017.C.1
6

circle
Confidential Information IdentificationSOC2:2017.C.1.1
6

circle
Identifies Confidential InformationSOC2:2017.C.1.1.1
3

circle
Protects Confidential Information From DestructionSOC2:2017.C.1.1.2
3

circle
Confidential Information DisposalSOC2:2017.C.1.2
2

circle
Identifies Confidential Information for DestructionSOC2:2017.C.1.2.1
2

circle
Destroys Confidential InformationSOC2:2017.C.1.2.2








SOC2 Processing Integrity




Processing IntegritySOC2:2017.PI
11

circle
Processing Inputs & OutputsSOC2:2017.PI.1
11

circle
MonitoringSOC2:2017.PI.1.1
4

circle
Identifies Information SpecificationsSOC2:2017.PI.1.1.1
0

circle
Defines Information Necessary to Support the Use of a Good or ProductSOC2:2017.PI.1.1.2
4

circle
Defines Information Necessary to Support the Use of a Good or ProductSOC2:2017.PI.1.1.3
0

circle
AccuracySOC2:2017.PI.1.2
1

circle
Defines Characteristics of Processing InputsSOC2:2017.PI.1.2.1
1

circle
Evaluates Processing InputsSOC2:2017.PI.1.2.2
1

circle
Creates and Maintains Records of System InputsSOC2:2017.PI.1.2.3
1

circle
OperationsSOC2:2017.PI.1.3
2

circle
Defines Processing SpecificationsSOC2:2017.PI.1.3.1
1

circle
Defines Processing ActivitiesSOC2:2017.PI.1.3.2
1

circle
Detects and Corrects Production ErrorsSOC2:2017.PI.1.3.3
2

circle
Records System Processing ActivitiesSOC2:2017.PI.1.3.4
1

circle
Processes InputsSOC2:2017.PI.1.3.5
1

circle
OutputsSOC2:2017.PI.1.4
4

circle
Protects OutputSOC2:2017.PI.1.4.1
2

circle
Distributes Output Only to Intended PartiesSOC2:2017.PI.1.4.2
1

circle
Distributes Output Completely and AccuratelySOC2:2017.PI.1.4.3
1

circle
Creates and Maintains Records of System Output ActivitiesSOC2:2017.PI.1.4.4
0

circle
BackupsSOC2:2017.PI.1.5
2

circle
Protects Stored ItemsSOC2:2017.PI.1.5.1
1

circle
Archives and Protects System RecordsSOC2:2017.PI.1.5.2
1

circle
Stores Data Completely and AccuratelySOC2:2017.PI.1.5.3
1

circle
Creates and Maintains Records of System Storage ActivitiesSOC2:2017.PI.1.5.4








No comments:

Post a Comment