Vulnerability scanning and management for SOC 2
Online Scan
SOC 2 Overview
Online Scan
SOC 2 Overview
System and Organization Controls (SOC) is a set of reports for auditing a business. SOC is maintained by the American Institute of Certified Public Accountants (AICPA). SOC 2 is the report for Trust Services Criteria.
Section CC7.1 of the Trust Services Criteria covers detection and monitoring for vulnerabilities.
Here is the full text of section CC7.1:
To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities.
The following points of focus, specifically related to all engagements using the trust services criteria, highlight important characteristics relating to this criterion:
Help protect your business and meet SOC 2 objectives with vulnerability scanning and management from HostedScan.
Comprehensive set of vulnerability scanners for networks, servers, websites, and APIs
Automated recurring scanning on a monthly, weekly, or daily schedule
Email alerts for any new findings
Reports and dashboard for vulnerability management and tracking remediation
HostedScan is 100% read-only, and will never make any modifications to your servers.