Remove 2014 Remove Activation Remove Gap Analysis
article thumbnail

Audit Checklist for SOC 2

Reciprocity

Before 2014, cloud storage providers only had to meet SOC 1 (previously known as Statement on Standards for Attestation Engagements no. Monitoring activities. Control activities – which are further broken out by: Logical and physical access. Perform a SOC 2 Gap Analysis. Control environment. Risk assessment.

Audit 52
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Introduced in 2014 and later updated to Version 1.1 Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Recover: Identify activities to restore any capabilities or services impaired due to a cybersecurity incident. in 2018, NIST CSF has undergone significant evolution. is anticipated.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Introduced in 2014 and later updated to Version 1.1 Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Recover: Identify activities to restore any capabilities or services impaired due to a cybersecurity incident. in 2018, NIST CSF has undergone significant evolution. is anticipated.