⭐ Repository → 💼 SOC 2 → 💼 CC6 Logical and Physical Access Controls → 💼 CC6.8 The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity's objectives.
💼 CC6.8-2 Detects Unauthorized Changes to Software and Configuration Parameters
- ID:
/frameworks/soc-2/cc6/08/02
Description
Processes are in place to detect changes to software and configuration parameters that may be indicative of unauthorized or malicious software.
Similar
- Internal
- ID:
dec-c-f2b40232
- ID:
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|