Remove 2014 Remove Authorization Remove Change Management
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Introduced in 2014 and later updated to Version 1.1 CA – Security Assessment and Authorization: Evaluating the effectiveness of security controls and authorizing system operations. PT – PII Processing and Transparency: Managing personal information with transparency and accountability. Although a draft Version 2.0

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Introduced in 2014 and later updated to Version 1.1 CA – Security Assessment and Authorization: Evaluating the effectiveness of security controls and authorizing system operations. PT – PII Processing and Transparency: Managing personal information with transparency and accountability. Although a draft Version 2.0

article thumbnail

Audit Checklist for SOC 2

Reciprocity

Before 2014, cloud storage providers only had to meet SOC 1 (previously known as Statement on Standards for Attestation Engagements no. The scope of your SOC 2 audit typically addresses infrastructure, software, data, risk management, procedures, and people. Change management. Determine the Scope of Your SOC 2 Audit.

Audit 52