Skip to main content

Repository → 💼 SOC 2

💼 CC6 Logical and Physical Access Controls

  • ID: /frameworks/soc-2/cc6

Description

Empty...

Similar

  • Internal
    • ID: dec-b-181e6e92

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.135076no data
 💼 CC6.1-1 Identifies and Manages the Inventory of Information Assets1no data
 💼 CC6.1-2 Assesses New Architecturesno data
 💼 CC6.1-3 Restricts Logical Access121no data
 💼 CC6.1-4 Identifies and Authenticates Users46no data
 💼 CC6.1-5 Considers Network Segmentation11no data
 💼 CC6.1-6 Manages Points of Access57no data
 💼 CC6.1-7 Restricts Access to Information Assets1326no data
 💼 CC6.1-8 Manages Identification and Authentication1824no data
 💼 CC6.1-9 Manages Credentials for Infrastructure and Software34no data
 💼 CC6.1-10 Uses Encryption to Protect Data611no data
 💼 CC6.1-11 Protects Encryption Keys69no data
 💼 CC6.1-12 Restricts Access to and Use of Confidential Information for Identified Purposesno data
 💼 CC6.1-13 Restricts Access to and the Use of Personal Informationno data
💼 CC6.2 Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is administered by the entity.3no data
 💼 CC6.2-1 Creates Access Credentials to Protected Information Assetsno data
 💼 CC6.2-2 Reviews Appropriateness of Access Credentialsno data
 💼 CC6.2-3 Prevents the Use of Credentials When No Longer Validno data
💼 CC6.3 The entity authorizes, modifies, or removes access to data, software, functions, and other protected information assets based on roles, responsibilities, or the system design and changes, giving consideration to the concepts of least privilege and segregation of duties, to meet the entity's objectives.414no data
 💼 CC6.3-1 Creates or Modifies Access to Protected Information Assets3no data
 💼 CC6.3-2 Removes Access to Protected Information Assets3no data
 💼 CC6.3-3 Uses Access Control Structures14no data
 💼 CC6.3-4 Reviews Access Roles and Rulesno data
💼 CC6.4 The entity restricts physical access to facilities and protected information assets (for example, data center facilities, backup media storage, and other sensitive locations) to authorized personnel to meet the entity's objectives.4no data
 💼 CC6.4-1 Creates or Modifies Physical Accessno data
 💼 CC6.4-2 Removes Physical Accessno data
 💼 CC6.4-3 Recovers Physical Devicesno data
 💼 CC6.4-4 Reviews Physical Accessno data
💼 CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity's objectives.1no data
 💼 CC6.5-1 Removes Data and Software From Entity Controlno data
💼 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.42023no data
 💼 CC6.6-1 Restricts Access1619no data
 💼 CC6.6-2 Protects Identification and Authentication Credentialsno data
 💼 CC6.6-3 Requires Additional Authentication or Credentials46no data
 💼 CC6.6-4 Implements Boundary Protection Systems4no data
💼 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity's objectives.468no data
 💼 CC6.7-1 Restricts the Ability to Perform Transmissionno data
 💼 CC6.7-2 Uses Encryption Technologies or Secure Communication Channels to Protect Data68no data
 💼 CC6.7-3 Protects Removal Mediano data
 💼 CC6.7-4 Protects Endpoint Devicesno data
💼 CC6.8 The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity's objectives.5no data
 💼 CC6.8-1 Restricts Installation and Modification of Application and Softwareno data
 💼 CC6.8-2 Detects Unauthorized Changes to Software and Configuration Parametersno data
 💼 CC6.8-3 Uses a Defined Change Control Processno data
 💼 CC6.8-4 Uses Antivirus and Anti-Malware Softwareno data
 💼 CC6.8-5 Scans Information Assets from Outside the Entity for Malware and Other Unauthorized Softwareno data