Remove Activation Remove Change Management Remove Gap Analysis
article thumbnail

Audit Checklist for SOC 2

Reciprocity

Monitoring activities. Control activities – which are further broken out by: Logical and physical access. Change management. Perform a SOC 2 Gap Analysis. Once you’ve completed your audit preparation, you should perform a gap analysis. Control environment. Risk assessment.

Audit 52
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Recover: Identify activities to restore any capabilities or services impaired due to a cybersecurity incident. Each function is a high-level goal aimed at managing and mitigating cybersecurity risk.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Recover: Identify activities to restore any capabilities or services impaired due to a cybersecurity incident. Each function is a high-level goal aimed at managing and mitigating cybersecurity risk.