Remove Activation Remove Cloud Computing Remove Gap Analysis
article thumbnail

Audit Checklist for SOC 2

Reciprocity

Monitoring activities. Control activities – which are further broken out by: Logical and physical access. Perform a SOC 2 Gap Analysis. Once you’ve completed your audit preparation, you should perform a gap analysis. These categories above all share a common set of standard criteria.

Audit 52
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Recover: Identify activities to restore any capabilities or services impaired due to a cybersecurity incident. Categories: Within each function, categories provide subdivisions related to cybersecurity outcomes and activities.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Recover: Identify activities to restore any capabilities or services impaired due to a cybersecurity incident. Categories: Within each function, categories provide subdivisions related to cybersecurity outcomes and activities.