To make it easier for customers to comply with AICPA SOC 2 security requirements, Alert Logic® has released eight new reports that will help avoid surprises by proactively providing compliance documentation and artifacts prior to your next SOC 2 audit. These reports can be found within the Alert Logic console at Validate > Reports > Compliance > SOC 2 Audit.
SOC 2 compliance is a crucial framework for cloud computing and technology service provider organizations. Use these reports to demonstrate compliance with specific points of focus defined in the Trust Services Criteria.
SOC 2 CC6.2 - User Registration
The SOC 2 CC6.2 - User Registration report describes and provides access to log searches in the Alert Logic console that help demonstrate compliance with Common Criteria 6.2.
SOC 2 CC6.3 - Access Modification and Removal
The SOC 2 CC6.3 report describes and provides access to log searches and the list of users with access to security functions and access logs in the Alert Logic console that help demonstrate compliance with Common Criteria 6.3.
SOC 2 CC6.6 - Boundary Protection
The SOC 2 CC6.6 report describes and provides access to threat detection, scanning, and web application protection features in the Alert Logic console that help demonstrate compliance with Common Criteria 6.6.
SOC 2 CC6.8 - Unauthorized and Malicious Code Protection
The SOC 2 CC6.8 report describes how to access file integrity monitoring and endpoint protection features in the Alert Logic console that help demonstrate compliance with Common Criteria 6.8.
SOC 2 CC7.1 - Configuration and Vulnerability Management
The SOC 2 CC7.1 report describes how to access file integrity monitoring, scan scheduling, and vulnerability reporting features in the Alert Logic console that help demonstrate compliance with Common Criteria 7.1.
SOC 2 CC7.2 - Security Event and Anomaly Detection
The SOC 2 CC7.2 report describes how to access security event and threat response reporting features in the Alert Logic console that help demonstrate compliance with Common Criteria 7.2.
SOC 2 CC7.3 - Incident Detection and Response
The SOC 2 CC7.3 report describes how to access security event and threat response reporting features in the Alert Logic console that help demonstrate compliance with Common Criteria 7.3.
SOC 2 CC7.4 - Incident Containment and Remediation
The SOC 2 CC7.4 report describes how to access vulnerability and threat response reporting features in the Alert Logic console that help demonstrate compliance with Common Criteria 7.4.
Comments
0 comments
Please sign in to leave a comment.