Skip to main content

💼 CC6.8-5 Scans Information Assets from Outside the Entity for Malware and Other Unauthorized Software

  • ID: /frameworks/soc-2/cc6/08/05

Description​

Procedures are in place to scan information assets that have been transferred or returned to the entity's custody for malware and other unauthorized software and to remove any items detected prior to its implementation on the network.

Similar​

  • Internal
    • ID: dec-c-d8b0b160

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance