💼 CC6.8-5 Scans Information Assets from Outside the Entity for Malware and Other Unauthorized Software
- ID:
/frameworks/soc-2/cc6/08/05
Description​
Procedures are in place to scan information assets that have been transferred or returned to the entity's custody for malware and other unauthorized software and to remove any items detected prior to its implementation on the network.
Similar​
- Internal
- ID:
dec-c-d8b0b160
- ID:
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|