⭐ Repository → 💼 SOC 2 → 💼 CC7 System Operations → 💼 CC7.1 To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities.
💼 CC7.1-4 Detects Unknown or Unauthorized Components
- ID:
/frameworks/soc-2/cc7/01/04
Description
Procedures are in place to detect the introduction of unknown or unauthorized components.
Similar
- Internal
- ID:
dec-c-e51dc98b
- ID:
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|
Policies (3)
Policy | Logic Count | Flags | Compliance |
---|---|---|---|
🛡️ Google Cloud SQL Server Instance 3625 (trace flag) Database Flag is not set to on🟢 | 1 | 🟢 x6 | no data |
🛡️ Google Cloud SQL Server Instance user connections Database Flag is set to a limiting (other than 0) value🟢 | 1 | 🟢 x6 | no data |
🛡️ Google Cloud SQL Server Instance user options Database Flag is configured🟢 | 1 | 🟢 x6 | no data |