Remove 2014 Remove Activation Remove Change Management
article thumbnail

Audit Checklist for SOC 2

Reciprocity

Before 2014, cloud storage providers only had to meet SOC 1 (previously known as Statement on Standards for Attestation Engagements no. The scope of your SOC 2 audit typically addresses infrastructure, software, data, risk management, procedures, and people. Monitoring activities. Change management.

Audit 52
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Introduced in 2014 and later updated to Version 1.1 Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Recover: Identify activities to restore any capabilities or services impaired due to a cybersecurity incident. NIST vs. ISO: What’s the difference? Although a draft Version 2.0

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Introduced in 2014 and later updated to Version 1.1 Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Recover: Identify activities to restore any capabilities or services impaired due to a cybersecurity incident. NIST vs. ISO: What’s the difference? Although a draft Version 2.0