eBooks & Reports

Threat-Stack-Practices-Guide-for-SOC-2-Compliance

Issue link: https://resources.threatstack.com/i/952491

Contents of this Issue

Navigation

Page 0 of 2

Network/applica on firewalls Two-factor authen ca on Intrusion detec on Access control Two-factor authen ca on Encryp on Performance monitoring Disaster recovery Security incident handling Encryp on Access controls Network/applica on firewalls Quality assurance Processing monitoring C O M P L I A N C E G U I D E Security Prac ces Guide for SOC 2 Compliance What is SOC 2? SOC 2 is an audi ng procedure that defines criteria for managing customer data based on five Trust Principles: Security, availability, processing integrity, confiden ality, and privacy of customer data. Unlike other compliance standards, SOC 2 reports are unique to each organiza on. It's up to the organiza on to design its own controls to comply. SOC 2 examina on is issued by outside auditors, who assess the extent to which a vendor is able to comply with up to five of the principles based on the controls they've put in place.

Articles in this issue

view archives of eBooks & Reports - Threat-Stack-Practices-Guide-for-SOC-2-Compliance