
SOC 2 Common Criteria (Security) refers to the mandatory security category within the SOC 2 Trust Services Criteria (TSC) framework, which evaluates how an organization protects its systems and data from unauthorized access and disclosure.
The entity demonstrates a commitment to integrity and ethical values.
CC1.1.POF1
CC1.1.POF2
CC1.1.POF3
The board of directors demonstrates independence from management and exercises oversight of the development and performance of internal control.
CC1.2.POF1
CC1.2.POF2
Management establishes; with board oversight; structures; reporting lines; and appropriate authorities and responsibilities in the pursuit of objectives.
CC1.3.POF1
CC1.3.POF2
CC1.3.POF3
The entity demonstrates a commitment to attract; develop; and retain competent individuals in alignment with objectives.
CC1.4.POF1
CC1.4.POF2
The entity holds individuals accountable for their internal control responsibilities in the pursuit of objectives.
CC1.5.POF1
CC1.5.POF2
The entity obtains or generates and uses relevant; quality information to support the functioning of internal control.
CC2.1.POF1
CC2.1.POF2
CC2.1.POF3
The entity internally communicates information; including objectives and responsibilities for internal control; necessary to support the functioning of internal control.
CC2.2.POF1
CC2.2.POF2
The entity communicates with external parties regarding matters affecting the functioning of internal control.
CC2.3.POF1
CC2.3.POF2
The entity specifies objectives with sufficient clarity to enable the identification and assessment of risks relating to objectives.
CC3.1.POF1
CC3.1.POF2
CC3.1.POF3
The entity identifies risks to the achievement of its objectives across the entity and analyzes risks as a basis for determining how the risks should be managed.
CC3.2.POF1
CC3.2.POF2
CC3.2.POF3
The entity considers the potential for fraud in assessing risks to the achievement of objectives.
CC3.3.POF1
CC3.3.POF2
The entity identifies and assesses changes in the internal and external environment that could significantly impact the system of internal control.
CC3.4.POF1
CC3.4.POF2
The entity selects; develops; and performs ongoing and/or separate evaluations to ascertain whether the components of internal control are present and functioning.
CC4.1.POF1
CC4.1.POF2
The entity evaluates and communicates internal control deficiencies in a timely manner to those parties responsible for taking corrective action; including senior management and the board of directors; as appropriate.
CC4.2.POF1
CC4.2.POF2
The entity selects and develops control activities that contribute to the mitigation of risks to the achievement of objectives to acceptable levels.
CC5.1.POF1
CC5.1.POF2
The entity selects and develops general control activities over technology to support the achievement of objectives.
CC5.2.POF1
CC5.2.POF2
The entity deploys control activities through policies that establish what is expected and procedures that put policies into action.
CC5.3.POF1
The entity implements logical access security measures to protect against threats to the system.
CC6.1.POF1
CC6.1.POF2
CC6.1.POF3
The entity restricts physical access to facilities and protected information assets (for example; data center facilities; backup media storage; and other sensitive locations) to authorized personnel to protect against threats to the system.
CC6.2.POF1
CC6.2.POF2
The entity implements controls to protect data from unauthorized access; use; and disclosure during its transmission; storage; and processing.
CC6.3.POF1
CC6.3.POF2
The entity protects information not classified as confidential or restricted from unauthorized alteration.
CC6.4.POF1
CC6.4.POF2
The entity implements controls to classify information assets to determine the appropriate level of protection.
CC6.5.POF1
CC6.5.POF2
The entity implements logical access security measures to protect the transmission of data.
CC6.6.POF1
CC6.6.POF2
CC6.6.POF3
CC6.6.POF4
The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software.
CC6.7.POF1
CC6.7.POF2
The entity restricts logical access to protected information assets to authorized personnel.
CC6.8.POF1
The entity monitors system components and the operation of the system for anomalies that are indicative of malicious acts; natural disasters; and errors affecting the entity's ability to meet its objectives.
CC7.1.POF1
CC7.1.POF2
CC7.1.POF3
The entity detects changes to system components (for example; data; software; and infrastructure) that are not authorized; in accordance with the entity's change management process; to meet its objectives.
CC7.2.POF1
The entity responds to identified security incidents by executing a defined incident response program to understand; contain; remediate; and communicate the security incident.
CC7.3.POF1
CC7.3.POF2
The entity identifies and addresses vulnerabilities in its systems; including those in third-party components; arising from internal and external sources (for example; security researchers; software vendors; or regulators).
CC7.4.POF1
CC7.4.POF2
The entity performs; monitors; and tests backup and recovery procedures for data; software; and infrastructure for impacted systems and takes corrective action.
CC7.5.POF1
The entity authorizes; designs; develops; configures; documents; tests; approves; and implements changes to the system.
CC8.1.POF1
CC8.1.POF2
CC8.1.POF3
CC8.1.POF4
The entity identifies; selects; and develops risk mitigation activities.
CC9.1.POF1
CC9.1.POF2
The entity assesses and manages risks associated with vendors and business partners.
CC9.2.POF1
CC9.2.POF2
CC9.2.POF3