Remove Change Management Remove Document Remove Gap Analysis
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Special Publications’ take a deeper dive into specific areas Beyond the core framework, NIST has published over 200 special documents addressing various facets of cybersecurity risk management, ranging from identity access control and protective technology management to incident response and artificial intelligence applications.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Special Publications’ take a deeper dive into specific areas Beyond the core framework, NIST has published over 200 special documents addressing various facets of cybersecurity risk management, ranging from identity access control and protective technology management to incident response and artificial intelligence applications.

article thumbnail

Audit Checklist for SOC 2

Reciprocity

A SOC 2 Type 1 report attests to the design and documentation of a service organization’s internal controls and procedures as of a specific date. Change management. Perform a SOC 2 Gap Analysis. Once you’ve completed your audit preparation, you should perform a gap analysis.

Audit 52