Skip to main content

๐Ÿ’ผ CC6 Logical and Physical Access Controls

  • Contextual name: ๐Ÿ’ผ CC6 Logical and Physical Access Controls
  • ID: /frameworks/soc-2/cc6
  • Located in: ๐Ÿ’ผ SOC 2

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-181e6e92

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.13
ย ย ย ย ๐Ÿ’ผ CC6.1-1 Identifies and Manages the Inventory of Information Assets
ย ย ย ย ๐Ÿ’ผ CC6.1-2 Assesses New Architectures
ย ย ย ย ๐Ÿ’ผ CC6.1-3 Restricts Logical Access12
ย ย ย ย ๐Ÿ’ผ CC6.1-4 Identifies and Authenticates Users44
ย ย ย ย ๐Ÿ’ผ CC6.1-5 Considers Network Segmentation11
ย ย ย ย ๐Ÿ’ผ CC6.1-6 Manages Points of Access56
ย ย ย ย ๐Ÿ’ผ CC6.1-7 Restricts Access to Information Assets1212
ย ย ย ย ๐Ÿ’ผ CC6.1-8 Manages Identification and Authentication1821
ย ย ย ย ๐Ÿ’ผ CC6.1-9 Manages Credentials for Infrastructure and Software33
ย ย ย ย ๐Ÿ’ผ CC6.1-10 Uses Encryption to Protect Data66
ย ย ย ย ๐Ÿ’ผ CC6.1-11 Protects Encryption Keys68
ย ย ย ย ๐Ÿ’ผ CC6.1-12 Restricts Access to and Use of Confidential Information for Identified Purposes
ย ย ย ย ๐Ÿ’ผ CC6.1-13 Restricts Access to and the Use of Personal Information
๐Ÿ’ผ CC6.2 Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is administered by the entity.3
ย ย ย ย ๐Ÿ’ผ CC6.2-1 Creates Access Credentials to Protected Information Assets
ย ย ย ย ๐Ÿ’ผ CC6.2-2 Reviews Appropriateness of Access Credentials
ย ย ย ย ๐Ÿ’ผ CC6.2-3 Prevents the Use of Credentials When No Longer Valid
๐Ÿ’ผ CC6.3 The entity authorizes, modifies, or removes access to data, software, functions, and other protected information assets based on roles, responsibilities, or the system design and changes, giving consideration to the concepts of least privilege and segregation of duties, to meet the entity's objectives.4
ย ย ย ย ๐Ÿ’ผ CC6.3-1 Creates or Modifies Access to Protected Information Assets
ย ย ย ย ๐Ÿ’ผ CC6.3-2 Removes Access to Protected Information Assets
ย ย ย ย ๐Ÿ’ผ CC6.3-3 Uses Access Control Structures11
ย ย ย ย ๐Ÿ’ผ CC6.3-4 Reviews Access Roles and Rules
๐Ÿ’ผ CC6.4 The entity restricts physical access to facilities and protected information assets (for example, data center facilities, backup media storage, and other sensitive locations) to authorized personnel to meet the entity's objectives.4
ย ย ย ย ๐Ÿ’ผ CC6.4-1 Creates or Modifies Physical Access
ย ย ย ย ๐Ÿ’ผ CC6.4-2 Removes Physical Access
ย ย ย ย ๐Ÿ’ผ CC6.4-3 Recovers Physical Devices
ย ย ย ย ๐Ÿ’ผ CC6.4-4 Reviews Physical Access
๐Ÿ’ผ CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity's objectives.1
ย ย ย ย ๐Ÿ’ผ CC6.5-1 Removes Data and Software From Entity Control
๐Ÿ’ผ CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.4
ย ย ย ย ๐Ÿ’ผ CC6.6-1 Restricts Access1515
ย ย ย ย ๐Ÿ’ผ CC6.6-2 Protects Identification and Authentication Credentials
ย ย ย ย ๐Ÿ’ผ CC6.6-3 Requires Additional Authentication or Credentials44
ย ย ย ย ๐Ÿ’ผ CC6.6-4 Implements Boundary Protection Systems
๐Ÿ’ผ CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity's objectives.4
ย ย ย ย ๐Ÿ’ผ CC6.7-1 Restricts the Ability to Perform Transmission
ย ย ย ย ๐Ÿ’ผ CC6.7-2 Uses Encryption Technologies or Secure Communication Channels to Protect Data34
ย ย ย ย ๐Ÿ’ผ CC6.7-3 Protects Removal Media
ย ย ย ย ๐Ÿ’ผ CC6.7-4 Protects Endpoint Devices
๐Ÿ’ผ CC6.8 The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity's objectives.5
ย ย ย ย ๐Ÿ’ผ CC6.8-1 Restricts Installation and Modification of Application and Software
ย ย ย ย ๐Ÿ’ผ CC6.8-2 Detects Unauthorized Changes to Software and Configuration Parameters
ย ย ย ย ๐Ÿ’ผ CC6.8-3 Uses a Defined Change Control Process
ย ย ย ย ๐Ÿ’ผ CC6.8-4 Uses Antivirus and Anti-Malware Software
ย ย ย ย ๐Ÿ’ผ CC6.8-5 Scans Information Assets from Outside the Entity for Malware and Other Unauthorized Software