article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

The procedure entails defining which personnel should be responsible for particular activities to provide a uniform and efficient approach for responding to security incidents. Consult with your internal and external audit teams for a checklist template to use with ISO compliance or for basic security control validation.

article thumbnail

Audit Checklist for SOC 2

Reciprocity

Companies that manage, assist, or consult on money or accounting processes. Monitoring activities. Control activities – which are further broken out by: Logical and physical access. Perform a SOC 2 Gap Analysis. Once you’ve completed your audit preparation, you should perform a gap analysis.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 5 Golden Rules of When Business Continuity Software Goes Bad

Plan B Consulting

At PlanB Consulting, we sell Castellan software. Business continuity software usually has additional functionality so that you can model data, see recovery critical paths, do gap analysis against existing application RTOs and RPOs, and compare them against the organisation requested RTOs and RPOs.

article thumbnail

The 5 Golden Rules of When Business Continuity Software Goes Bad

Plan B Consulting

At PlanB Consulting, we sell Castellan software. Business continuity software usually has additional functionality so that you can model data, see recovery critical paths, do gap analysis against existing application RTOs and RPOs, and compare them against the organisation requested RTOs and RPOs.

article thumbnail

The 5 Golden Rules of When Business Continuity Software Goes Bad

Plan B Consulting

At PlanB Consulting, we sell Castellan software. Business continuity software usually has additional functionality so that you can model data, see recovery critical paths, do gap analysis against existing application RTOs and RPOs, and compare them against the organisation requested RTOs and RPOs.