Skip to content

Latest commit

 

History

History
40 lines (40 loc) · 3.89 KB

cc74.md

File metadata and controls

40 lines (40 loc) · 3.89 KB

SOC2 - CC7.4

The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate

Assigns Roles and Responsibilities

Roles and responsibilities for the design, implementation, maintenance, and execution of the incident response program are assigned, including the use of external resources when necessary

Contains Security Incidents

Procedures are in place to contain security incidents that actively threaten entity objectives

Mitigates Ongoing Security Incidents

Procedures are in place to mitigate the effects of ongoing security incidents

Ends Threats Posed by Security Incidents

Procedures are in place to end the threats posed by security incidents through closure of the vulnerability, removal of unauthorized access, and other remediation actions

Restores Operations

Procedures are in place to restore data and business operations to an interim state that permits the achievement of entity objectives

Develops and Implements Communication Protocols for Security Incidents

Protocols for communicating security incidents and actions taken to affected parties are developed and implemented to meet the entity's objectives

Obtains Understanding of Nature of Incident and Determines Containment Strategy

An understanding of the nature (for example, the method by which the incident occurred and the affected system resources) and severity of the security incident is obtained to determine the appropriate containment strategy, including (1) a determination of the appropriate response time frame, and (2) the determination and execution of the containment approach

Remediates Identified Vulnerabilities

Identified vulnerabilities are remediated through the development and execution of remediation activities

Communicates Remediation Activities

Remediation activities are documented and communicated in accordance with the incident response program

Evaluates the Effectiveness of Incident Response

The design of incident response activities is evaluated for effectiveness on a periodic basis

Periodically Evaluates Incidents

Periodically, management reviews incidents related to security, availability, processing integrity, confidentiality, and privacy and identifies the need for system changes based on incident patterns and root causes

Communicates Unauthorized Use and Disclosure

Events that resulted in unauthorized use or disclosure of personal information are communicated to the data subjects, legal and regulatory authorities, and others as required

Application of Sanctions

The conduct of individuals and organizations operating under the authority of the entity and involved in the unauthorized use or disclosure of personal information is evaluated and, if appropriate, sanctioned in accordance with entity policies and legal and regulatory requirements.

Mapped SCF controls