From the course: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Exploring CC6.6 - Strengthening logical access security: Safeguarding against external threats

Exploring CC6.6 - Strengthening logical access security: Safeguarding against external threats

From the course: Advanced SOC 2 Auditing: Proven Strategies for Auditing the Security, Availability and Confidentiality TSCs

Exploring CC6.6 - Strengthening logical access security: Safeguarding against external threats

- [Instructor] This session on CC6.6 will dive into the strategic implementation of logical access security measures that organizations employ to defend against external digital threats. The cornerstone of CC6.6 is the establishment of a strong network security barrier, such as firewalls and security groups, particularly within cloud services like AWS or Azure, to protect system boundaries from external threats. A few points of focus in the COSO framework to consider? Utilizing tools like AWS or Azure security groups and network firewalls to delineate and defend the system's boundary. Organizations should implement security monitoring applications and SIEM systems to detect and alert on security events in real time. Deploying intrusion detection and intrusion prevention systems to block unauthorized access attempts and safeguard the network's integrity. Organizations are expected to show a variety of evidence, including effective configuration and management of network boundaries. The…

Contents