CG-Cybersecurity

CG-CybersecurityCG-CybersecurityCG-Cybersecurity
  • Sign In
  • Create Account

  • Bookings
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Bookings
  • My Account
  • Sign out

  • Home
  • Risk and Compliance
    • CIS 18 Assessment
    • SOC Assessment
    • Cyber Risk Assessment
    • Privacy and protocols
    • Mergers & Acquisitions
    • Security Policies
  • Pen Test
    • Mobile Apps
    • APIs
    • Infrastructure
    • Web Applications
  • Employee Training
    • Organization's Leaders
  • Security Services
    • Vulnerability Scanning
    • Threats Hunting
    • IT Forensic
    • Virtual CISO
  • Ransomware
  • Other Services
    • Digital Transofrmation
  • Cybersecurity frameworks
    • NIST Framework for Banks
    • CIPHER Framework
    • CBEST Framework
  • Contact us
  • More
    • Home
    • Risk and Compliance
      • CIS 18 Assessment
      • SOC Assessment
      • Cyber Risk Assessment
      • Privacy and protocols
      • Mergers & Acquisitions
      • Security Policies
    • Pen Test
      • Mobile Apps
      • APIs
      • Infrastructure
      • Web Applications
    • Employee Training
      • Organization's Leaders
    • Security Services
      • Vulnerability Scanning
      • Threats Hunting
      • IT Forensic
      • Virtual CISO
    • Ransomware
    • Other Services
      • Digital Transofrmation
    • Cybersecurity frameworks
      • NIST Framework for Banks
      • CIPHER Framework
      • CBEST Framework
    • Contact us

CG-Cybersecurity

CG-CybersecurityCG-CybersecurityCG-Cybersecurity

Signed in as:

filler@godaddy.com

  • Home
  • Risk and Compliance
    • CIS 18 Assessment
    • SOC Assessment
    • Cyber Risk Assessment
    • Privacy and protocols
    • Mergers & Acquisitions
    • Security Policies
  • Pen Test
    • Mobile Apps
    • APIs
    • Infrastructure
    • Web Applications
  • Employee Training
    • Organization's Leaders
  • Security Services
    • Vulnerability Scanning
    • Threats Hunting
    • IT Forensic
    • Virtual CISO
  • Ransomware
  • Other Services
    • Digital Transofrmation
  • Cybersecurity frameworks
    • NIST Framework for Banks
    • CIPHER Framework
    • CBEST Framework
  • Contact us

Account


  • Bookings
  • My Account
  • Sign out


  • Sign In
  • Bookings
  • My Account

SOC 2, 3 Assessments

SOC

SOC, or Service Organization Control  is a cybersecurity compliance framework developed by the American Institute of Certified Public Accountants (AICPA). SOC  a final look at your organization's documents, policies, processes, and vulnerabilities before your formal audit takes place. SOC is  a process that allows organizations to identify and evaluate their information system-related risks. 

SOC 1, 2 and 3

  • SOC 1: It is mainly focusing on  business process controls and IT general controls, SOC 1: is essential for organizations needing compliance with SOX (Sarbanes-Oxley Act of 2002) and other regulatory applicable to publicly traded companies 
  • SOC 2:  There are five trust services criteria (TSC) that can be included in a SOC 2 report: security, availability, confidentiality, processing integrity, and privacy.  that is why it is tailored for Services organizations. IT assures your clients your commitment to  SLAs. SOC 2 has two types:
    •  Type 1 (point-in-time evaluation)
    • Type 2 (evaluation over a period), 
  • SOC 3: is similar to SOC 2 but they are general purposes. SOC 3 can be publicly distributed  by your organizations to border audience to gain trust of your service organization. SOC 3 cannot be assessed without going through SOC 2 assessments 


Copyright © 2024 cg-Cybersecurity- All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept