Remove Cloud Computing Remove Evaluation Remove Gap Analysis
article thumbnail

Audit Checklist for SOC 2

Reciprocity

Perform a SOC 2 Gap Analysis. Once you’ve completed your audit preparation, you should perform a gap analysis. While performing your SOC 2 gap analysis, you must select an audit firm to conduct your SOC 2. Availability. Processing integrity. Confidentiality.

Audit 52
article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

CA – Security Assessment and Authorization: Evaluating the effectiveness of security controls and authorizing system operations. You routinely assess your suppliers and third-party partners using audits, test results, or other evaluations to confirm that they are meeting their contractual obligations.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

CA – Security Assessment and Authorization: Evaluating the effectiveness of security controls and authorizing system operations. You routinely assess your suppliers and third-party partners using audits, test results, or other evaluations to confirm that they are meeting their contractual obligations.