Skip to content

Latest commit

 

History

History
20 lines (20 loc) · 1.9 KB

cc68.md

File metadata and controls

20 lines (20 loc) · 1.9 KB

SOC2 - CC6.8

The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives

Restricts Application and Software Installation

The ability to install applications and software is restricted to authorized individuals

Detects Unauthorized Changes to Software and Configuration Parameters

Processes are in place to detect changes to software and configuration parameters that may be indicative of unauthorized or malicious software

Uses a Defined Change Control Process

A management-defined change control process is used for the implementation of software

Uses Antivirus and Anti-Malware Software

Antivirus and anti-malware software is implemented and maintained to provide for the interception or detection and remediation of malware

Scans Information Assets from Outside the Entity for Malware and Other Unauthorized Software

Procedures are in place to scan information assets that have been transferred or returned to the entity’s custody for malware and other unauthorized software and to remove any items detected prior to its implementation on the network.

Mapped SCF controls