⭐ Repository → 💼 SOC 2 → 💼 CC6 Logical and Physical Access Controls
💼 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.
- ID:
/frameworks/soc-2/cc6/01
Description
Empty...
Similar
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 CC6.1-1 Identifies and Manages the Inventory of Information Assets | 1 | no data | |||
💼 CC6.1-2 Assesses New Architectures | no data | ||||
💼 CC6.1-3 Restricts Logical Access | 1 | 21 | no data | ||
💼 CC6.1-4 Identifies and Authenticates Users | 4 | 6 | no data | ||
💼 CC6.1-5 Considers Network Segmentation | 1 | 1 | no data | ||
💼 CC6.1-6 Manages Points of Access | 5 | 7 | no data | ||
💼 CC6.1-7 Restricts Access to Information Assets | 13 | 26 | no data | ||
💼 CC6.1-8 Manages Identification and Authentication | 18 | 24 | no data | ||
💼 CC6.1-9 Manages Credentials for Infrastructure and Software | 3 | 4 | no data | ||
💼 CC6.1-10 Uses Encryption to Protect Data | 6 | 11 | no data | ||
💼 CC6.1-11 Protects Encryption Keys | 6 | 9 | no data | ||
💼 CC6.1-12 Restricts Access to and Use of Confidential Information for Identified Purposes | no data | ||||
💼 CC6.1-13 Restricts Access to and the Use of Personal Information | no data |