⭐ Repository → 💼 SOC 2 → 💼 CC7 System Operations
💼 CC7.1 To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities.
- ID:
/frameworks/soc-2/cc7/01
Description
Empty...
Similar
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|---|---|---|---|---|
💼 CC7.1-1 Uses Defined Configuration Standards | 4 | 5 | no data | ||
💼 CC7.1-2 Monitors Infrastructure and Software | 8 | 11 | no data | ||
💼 CC7.1-3 Implements Change-Detection Mechanisms | 3 | no data | |||
💼 CC7.1-4 Detects Unknown or Unauthorized Components | 3 | no data | |||
💼 CC7.1-5 Conducts Vulnerability Scans | no data |