article thumbnail

Audit Checklist for SOC 2

Reciprocity

Risk assessment. Monitoring activities. Control activities – which are further broken out by: Logical and physical access. Risk mitigation. Perform a SOC 2 Gap Analysis. Once you’ve completed your audit preparation, you should perform a gap analysis. Control environment.

Audit 52
article thumbnail

ISO 27001 Certification Requirements & Standards

Reciprocity

They include: ISO 27005: Information security risk management these standard guides companies that are maturing their ISMS and controls programs. Rather than implementing controls as a checkbox activity, risk-driven organizations proactively choose controls that best mitigate their risks. Perform a Gap Analysis.

Audit 52