Skip to main content

๐Ÿ’ผ CC6 Logical and Physical Access Controls

  • Contextual name: ๐Ÿ’ผ CC6 Logical and Physical Access Controls
  • ID: /frameworks/soc-2/cc6
  • Located in: ๐Ÿ’ผ SOC 2

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-181e6e92

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.13
ย ย ย ย ๐Ÿ’ผ CC6.1-1 Identifies and Manages the Inventory of Information Assets1
ย ย ย ย ๐Ÿ’ผ CC6.1-2 Assesses New Architectures
ย ย ย ย ๐Ÿ’ผ CC6.1-3 Restricts Logical Access121
ย ย ย ย ๐Ÿ’ผ CC6.1-4 Identifies and Authenticates Users46
ย ย ย ย ๐Ÿ’ผ CC6.1-5 Considers Network Segmentation11
ย ย ย ย ๐Ÿ’ผ CC6.1-6 Manages Points of Access57
ย ย ย ย ๐Ÿ’ผ CC6.1-7 Restricts Access to Information Assets1225
ย ย ย ย ๐Ÿ’ผ CC6.1-8 Manages Identification and Authentication1824
ย ย ย ย ๐Ÿ’ผ CC6.1-9 Manages Credentials for Infrastructure and Software34
ย ย ย ย ๐Ÿ’ผ CC6.1-10 Uses Encryption to Protect Data611
ย ย ย ย ๐Ÿ’ผ CC6.1-11 Protects Encryption Keys69
ย ย ย ย ๐Ÿ’ผ CC6.1-12 Restricts Access to and Use of Confidential Information for Identified Purposes
ย ย ย ย ๐Ÿ’ผ CC6.1-13 Restricts Access to and the Use of Personal Information
๐Ÿ’ผ CC6.2 Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is administered by the entity.3
ย ย ย ย ๐Ÿ’ผ CC6.2-1 Creates Access Credentials to Protected Information Assets
ย ย ย ย ๐Ÿ’ผ CC6.2-2 Reviews Appropriateness of Access Credentials
ย ย ย ย ๐Ÿ’ผ CC6.2-3 Prevents the Use of Credentials When No Longer Valid
๐Ÿ’ผ CC6.3 The entity authorizes, modifies, or removes access to data, software, functions, and other protected information assets based on roles, responsibilities, or the system design and changes, giving consideration to the concepts of least privilege and segregation of duties, to meet the entity's objectives.4
ย ย ย ย ๐Ÿ’ผ CC6.3-1 Creates or Modifies Access to Protected Information Assets3
ย ย ย ย ๐Ÿ’ผ CC6.3-2 Removes Access to Protected Information Assets3
ย ย ย ย ๐Ÿ’ผ CC6.3-3 Uses Access Control Structures14
ย ย ย ย ๐Ÿ’ผ CC6.3-4 Reviews Access Roles and Rules
๐Ÿ’ผ CC6.4 The entity restricts physical access to facilities and protected information assets (for example, data center facilities, backup media storage, and other sensitive locations) to authorized personnel to meet the entity's objectives.4
ย ย ย ย ๐Ÿ’ผ CC6.4-1 Creates or Modifies Physical Access
ย ย ย ย ๐Ÿ’ผ CC6.4-2 Removes Physical Access
ย ย ย ย ๐Ÿ’ผ CC6.4-3 Recovers Physical Devices
ย ย ย ย ๐Ÿ’ผ CC6.4-4 Reviews Physical Access
๐Ÿ’ผ CC6.5 The entity discontinues logical and physical protections over physical assets only after the ability to read or recover data and software from those assets has been diminished and is no longer required to meet the entity's objectives.1
ย ย ย ย ๐Ÿ’ผ CC6.5-1 Removes Data and Software From Entity Control
๐Ÿ’ผ CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.4
ย ย ย ย ๐Ÿ’ผ CC6.6-1 Restricts Access1519
ย ย ย ย ๐Ÿ’ผ CC6.6-2 Protects Identification and Authentication Credentials
ย ย ย ย ๐Ÿ’ผ CC6.6-3 Requires Additional Authentication or Credentials46
ย ย ย ย ๐Ÿ’ผ CC6.6-4 Implements Boundary Protection Systems4
๐Ÿ’ผ CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity's objectives.4
ย ย ย ย ๐Ÿ’ผ CC6.7-1 Restricts the Ability to Perform Transmission
ย ย ย ย ๐Ÿ’ผ CC6.7-2 Uses Encryption Technologies or Secure Communication Channels to Protect Data35
ย ย ย ย ๐Ÿ’ผ CC6.7-3 Protects Removal Media
ย ย ย ย ๐Ÿ’ผ CC6.7-4 Protects Endpoint Devices
๐Ÿ’ผ CC6.8 The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity's objectives.5
ย ย ย ย ๐Ÿ’ผ CC6.8-1 Restricts Installation and Modification of Application and Software
ย ย ย ย ๐Ÿ’ผ CC6.8-2 Detects Unauthorized Changes to Software and Configuration Parameters
ย ย ย ย ๐Ÿ’ผ CC6.8-3 Uses a Defined Change Control Process
ย ย ย ย ๐Ÿ’ผ CC6.8-4 Uses Antivirus and Anti-Malware Software
ย ย ย ย ๐Ÿ’ผ CC6.8-5 Scans Information Assets from Outside the Entity for Malware and Other Unauthorized Software