bmad-plus 0.4.3 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +48 -0
- package/README.md +4 -3
- package/package.json +5 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +22 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +514 -394
|
@@ -0,0 +1,236 @@
|
|
|
1
|
+
# SOC 2 Audit Evidence Reference
|
|
2
|
+
|
|
3
|
+
## Table of Contents
|
|
4
|
+
1. [Evidence Fundamentals](#evidence-fundamentals)
|
|
5
|
+
2. [Evidence by Criterion](#evidence-by-criterion)
|
|
6
|
+
3. [Evidence Quality Checklist](#evidence-quality-checklist)
|
|
7
|
+
4. [Common Evidence Pitfalls](#common-evidence-pitfalls)
|
|
8
|
+
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
## Evidence Fundamentals
|
|
12
|
+
|
|
13
|
+
### Type 1 vs Type 2 Evidence
|
|
14
|
+
|
|
15
|
+
| | Type 1 | Type 2 |
|
|
16
|
+
|---|---|---|
|
|
17
|
+
| **What's tested** | Control design at a point in time | Control operating effectiveness over a period |
|
|
18
|
+
| **Evidence needed** | Proof control *exists* and is *designed* correctly | Proof control *operated consistently* throughout the period |
|
|
19
|
+
| **Sampling** | Single instance is usually sufficient | Auditor will sample multiple instances across the period |
|
|
20
|
+
| **Typical audit period** | A date (e.g., Dec 31, 2024) | 6–12 months (e.g., Jan 1 – Dec 31, 2024) |
|
|
21
|
+
|
|
22
|
+
For Type 2, auditors typically use **statistical sampling** — for higher-frequency controls (daily logs, weekly scans), they'll pull samples from across the period. For lower-frequency controls (annual risk assessment, quarterly access reviews), they'll test every instance.
|
|
23
|
+
|
|
24
|
+
### Sampling Guidance by Control Frequency
|
|
25
|
+
|
|
26
|
+
| Frequency | Auditor sample size (typical) |
|
|
27
|
+
|---|---|
|
|
28
|
+
| Continuous / daily | 20–30 items from across the period |
|
|
29
|
+
| Weekly | 5–10 weeks sampled |
|
|
30
|
+
| Monthly | 3–6 months sampled |
|
|
31
|
+
| Quarterly | All 4 quarters |
|
|
32
|
+
| Annual | 1 (but must cover the audit period) |
|
|
33
|
+
| Event-driven (e.g., per hire/termination) | 20–30 events or 100% if fewer than 20 |
|
|
34
|
+
|
|
35
|
+
---
|
|
36
|
+
|
|
37
|
+
## Evidence by Criterion
|
|
38
|
+
|
|
39
|
+
### CC1 — Control Environment
|
|
40
|
+
|
|
41
|
+
| Evidence Item | What it proves | Format |
|
|
42
|
+
|---|---|---|
|
|
43
|
+
| Organizational chart (current) | Org structure and reporting lines | PDF / org tool export |
|
|
44
|
+
| Code of Conduct / Ethics policy | Commitment to integrity | Signed policy doc |
|
|
45
|
+
| Security awareness training completion report | CC1.4 — competent personnel | LMS export with timestamps |
|
|
46
|
+
| Board/executive security meeting minutes | Leadership oversight | Meeting minutes PDF |
|
|
47
|
+
| Background check records | CC1.4 — personnel screening | HRIS confirmation (redacted) |
|
|
48
|
+
| Security committee charter | Governance structure | Document |
|
|
49
|
+
|
|
50
|
+
---
|
|
51
|
+
|
|
52
|
+
### CC2 — Communication and Information
|
|
53
|
+
|
|
54
|
+
| Evidence Item | What it proves | Format |
|
|
55
|
+
|---|---|---|
|
|
56
|
+
| Policy distribution records | Policies communicated to employees | Email screenshots, intranet access logs |
|
|
57
|
+
| Employee policy acknowledgment log | Personnel aware of requirements | Signed acknowledgments or LMS completion |
|
|
58
|
+
| Customer-facing security communications (e.g., SLA, security page) | External communication | URL / screenshot with date |
|
|
59
|
+
| Incident notification records (if any occurred) | CC2.3 — external notification process | Email/ticket records |
|
|
60
|
+
|
|
61
|
+
---
|
|
62
|
+
|
|
63
|
+
### CC3 — Risk Assessment
|
|
64
|
+
|
|
65
|
+
| Evidence Item | What it proves | Format |
|
|
66
|
+
|---|---|---|
|
|
67
|
+
| Risk register (dated, with owners) | Risks identified and tracked | Spreadsheet / GRC tool export |
|
|
68
|
+
| Risk assessment report with management sign-off | Formal annual process completed | PDF with signatures and date |
|
|
69
|
+
| Security committee meeting minutes (risk review) | Ongoing risk oversight | Minutes |
|
|
70
|
+
| Risk treatment decisions (accept/mitigate/transfer) | Risks actively managed | Risk register or separate log |
|
|
71
|
+
|
|
72
|
+
---
|
|
73
|
+
|
|
74
|
+
### CC4 — Monitoring Controls
|
|
75
|
+
|
|
76
|
+
| Evidence Item | What it proves | Format |
|
|
77
|
+
|---|---|---|
|
|
78
|
+
| Internal audit reports | Self-evaluation of controls | Audit report PDF |
|
|
79
|
+
| Control deficiency log / tracking | Deficiencies identified and remediated | Spreadsheet or ticket system |
|
|
80
|
+
| Executive/board security reporting | Control performance communicated upward | Dashboard screenshots, board slides |
|
|
81
|
+
|
|
82
|
+
---
|
|
83
|
+
|
|
84
|
+
### CC5 — Control Activities
|
|
85
|
+
|
|
86
|
+
| Evidence Item | What it proves | Format |
|
|
87
|
+
|---|---|---|
|
|
88
|
+
| Controls matrix (policies mapped to risks) | Controls selected to address risks | Spreadsheet |
|
|
89
|
+
| MFA enrollment reports | Technology controls deployed | Okta/Azure AD report |
|
|
90
|
+
| Endpoint protection deployment report | CC5.2 — technology controls | MDM / EDR console export |
|
|
91
|
+
| Firewall rule review records | Network controls reviewed | Firewall config review document |
|
|
92
|
+
|
|
93
|
+
---
|
|
94
|
+
|
|
95
|
+
### CC6 — Logical and Physical Access Controls
|
|
96
|
+
|
|
97
|
+
This criterion typically generates the most evidence requests.
|
|
98
|
+
|
|
99
|
+
| Evidence Item | What it proves | Format |
|
|
100
|
+
|---|---|---|
|
|
101
|
+
| User access list (production systems, AWS, GitHub, SaaS) | Current state of access | Console exports |
|
|
102
|
+
| Access request/approval tickets | CC6.2 — provisioning authorized | JIRA / ServiceNow tickets |
|
|
103
|
+
| Termination access revocation records | CC6.3 — timely de-provisioning | HR ticket + AD/system logs |
|
|
104
|
+
| Access review sign-offs (quarterly/annual) | CC6.5 — reviews performed | Spreadsheet with reviewer signature and date |
|
|
105
|
+
| MFA configuration screenshots | CC6.1 — credentials protected | Admin console screenshots |
|
|
106
|
+
| Privileged access list and reviews | CC6.4, CC6.5 — admin access controlled | Export with review sign-off |
|
|
107
|
+
| Encryption-in-transit configuration | CC6.7 — data protected | SSL cert details, config screenshots |
|
|
108
|
+
| Physical access records (if applicable) | CC6 — physical controls | Keycard logs, visitor logs, office photos |
|
|
109
|
+
|
|
110
|
+
**Access review evidence tips:**
|
|
111
|
+
- Export must be dated and show reviewer name
|
|
112
|
+
- Bulk "no change" reviews are a flag — show evidence of actual review decisions
|
|
113
|
+
- Entitlement changes made as a result of review should be evidenced (tickets)
|
|
114
|
+
|
|
115
|
+
---
|
|
116
|
+
|
|
117
|
+
### CC7 — System Operations
|
|
118
|
+
|
|
119
|
+
| Evidence Item | What it proves | Format |
|
|
120
|
+
|---|---|---|
|
|
121
|
+
| Vulnerability scan reports (quarterly or more frequent) | CC7.1 — vulnerabilities detected | Scan tool export (Qualys, Tenable, etc.) |
|
|
122
|
+
| Penetration test report + remediation tracking | CC7.1 — testing performed | Pentest report PDF + remediation tickets |
|
|
123
|
+
| SIEM alerts / security event dashboard | CC7.2 — monitoring in place | Dashboard screenshot (dated) |
|
|
124
|
+
| Incident tickets (all incidents in period) | CC7.3, CC7.4 — incidents managed | Ticket system export |
|
|
125
|
+
| Incident post-mortems / lessons learned | CC7.4 — resolution documented | Post-mortem documents |
|
|
126
|
+
| Patch management reports (before/after) | CC7.5 — vulnerabilities remediated | Patch report with dates |
|
|
127
|
+
| IR tabletop exercise records | CC7.3 — IR plan tested | Exercise agenda, attendance, findings |
|
|
128
|
+
| Antivirus/EDR status reports | CC7.1 — malware detection | Console export |
|
|
129
|
+
|
|
130
|
+
---
|
|
131
|
+
|
|
132
|
+
### CC8 — Change Management
|
|
133
|
+
|
|
134
|
+
| Evidence Item | What it proves | Format |
|
|
135
|
+
|---|---|---|
|
|
136
|
+
| Change tickets with approvals (sample across period) | Changes authorized before deployment | JIRA / Linear / ServiceNow tickets |
|
|
137
|
+
| PR/merge request approvals in version control | Code review and approval | GitHub/GitLab PR screenshots |
|
|
138
|
+
| Deployment logs | Changes deployed as approved | CI/CD pipeline logs |
|
|
139
|
+
| Change advisory board (CAB) meeting minutes | High-risk changes reviewed | Meeting notes |
|
|
140
|
+
| Emergency change approvals and retroactive sign-offs | Emergency process followed | Ticket records |
|
|
141
|
+
|
|
142
|
+
---
|
|
143
|
+
|
|
144
|
+
### CC9 — Vendor Risk
|
|
145
|
+
|
|
146
|
+
| Evidence Item | What it proves | Format |
|
|
147
|
+
|---|---|---|
|
|
148
|
+
| Vendor inventory (tiered) | All vendors identified | Spreadsheet |
|
|
149
|
+
| Vendor SOC 2 reports (reviewed) | Critical vendors assessed | SOC 2 report copies + review log |
|
|
150
|
+
| Vendor security questionnaire responses | Due diligence performed | Questionnaire responses |
|
|
151
|
+
| Vendor contracts with security clauses / DPA | Contractual controls in place | Contract excerpts |
|
|
152
|
+
| CUEC (Complementary User Entity Controls) tracking | CUECs from vendor SOC 2 reports addressed | Mapping document |
|
|
153
|
+
|
|
154
|
+
---
|
|
155
|
+
|
|
156
|
+
### A1 — Availability
|
|
157
|
+
|
|
158
|
+
| Evidence Item | What it proves | Format |
|
|
159
|
+
|---|---|---|
|
|
160
|
+
| Uptime monitoring dashboards / SLA reports | System availability tracked | Monitoring tool export (e.g., Datadog, Pingdom) |
|
|
161
|
+
| Capacity monitoring alerts | A1.1 — capacity managed | Dashboard screenshots |
|
|
162
|
+
| Backup completion logs (all backups in period) | Backups running as configured | Backup tool reports |
|
|
163
|
+
| Backup restore test records | A1.2 — backups verified | Test procedure + results document |
|
|
164
|
+
| DR test plan and results | A1.3 — recovery tested | DR test report with date and RTO/RPO achieved |
|
|
165
|
+
| Incident tickets for outages | Availability events documented | Ticket records |
|
|
166
|
+
|
|
167
|
+
---
|
|
168
|
+
|
|
169
|
+
### C1 — Confidentiality
|
|
170
|
+
|
|
171
|
+
| Evidence Item | What it proves | Format |
|
|
172
|
+
|---|---|---|
|
|
173
|
+
| Data inventory / data map | Confidential data identified | Data inventory spreadsheet |
|
|
174
|
+
| Data classification labels applied | C1.1 — classification in practice | Screenshots, DLP reports |
|
|
175
|
+
| DLP (Data Loss Prevention) reports | Confidential data protected | DLP console export |
|
|
176
|
+
| Data disposal/destruction records | C1.2 — disposal per policy | Certificate of destruction, deletion logs |
|
|
177
|
+
| NDA log (employees, vendors) | Confidentiality agreements in place | NDA execution records |
|
|
178
|
+
|
|
179
|
+
---
|
|
180
|
+
|
|
181
|
+
### PI1 — Processing Integrity
|
|
182
|
+
|
|
183
|
+
| Evidence Item | What it proves | Format |
|
|
184
|
+
|---|---|---|
|
|
185
|
+
| Input validation test records | PI1.2 — inputs authorized and validated | Test results, code review records |
|
|
186
|
+
| Reconciliation reports | PI1.3 — outputs complete and accurate | Reconciliation logs |
|
|
187
|
+
| Error log reviews | PI1.4 — errors detected | Error monitoring reports |
|
|
188
|
+
| Data integrity monitoring alerts | PI1.5 — stored items protected | Monitoring screenshots |
|
|
189
|
+
| Job/batch processing success logs | PI1.1 — processing complete | Scheduler/job logs |
|
|
190
|
+
|
|
191
|
+
---
|
|
192
|
+
|
|
193
|
+
### P1–P8 — Privacy
|
|
194
|
+
|
|
195
|
+
| Evidence Item | What it proves | Format |
|
|
196
|
+
|---|---|---|
|
|
197
|
+
| Privacy notice (published, dated) | P1 — notice provided | URL / PDF |
|
|
198
|
+
| Consent mechanism screenshots | P2 — consent obtained | UI screenshots, consent logs |
|
|
199
|
+
| Data subject request (DSR) log | P8 — requests handled | DSR ticket log |
|
|
200
|
+
| DSR response records (sample) | P8 — timely response | Ticket records with dates |
|
|
201
|
+
| Data retention schedule | P5 — retention defined | Retention policy + schedule |
|
|
202
|
+
| Data deletion records | P5 — data disposed per policy | Deletion logs |
|
|
203
|
+
| Privacy impact assessments (PIA) | P3, P4 — collection/use reviewed | PIA documents |
|
|
204
|
+
| Third-party data sharing agreements | P6 — sharing authorized | DPA / data sharing contracts |
|
|
205
|
+
|
|
206
|
+
---
|
|
207
|
+
|
|
208
|
+
## Evidence Quality Checklist
|
|
209
|
+
|
|
210
|
+
Before submitting evidence to auditors, verify:
|
|
211
|
+
|
|
212
|
+
- [ ] **Dated** — every screenshot or export clearly shows the date it was captured
|
|
213
|
+
- [ ] **System-identified** — it's clear which system the evidence comes from
|
|
214
|
+
- [ ] **Complete for period** — Type 2 evidence covers the full audit window
|
|
215
|
+
- [ ] **Not reconstructed** — evidence was captured at the time of control operation, not created retroactively
|
|
216
|
+
- [ ] **Reviewer-attributable** — approvals show who approved (not just "admin" or a shared account)
|
|
217
|
+
- [ ] **Named with context** — files are named clearly (e.g., `CC6.5_AccessReview_Q3-2024_Signed.pdf`, not `screenshot1.png`)
|
|
218
|
+
- [ ] **Organized by criterion** — evidence folder mirrors the TSC structure
|
|
219
|
+
|
|
220
|
+
---
|
|
221
|
+
|
|
222
|
+
## Common Evidence Pitfalls
|
|
223
|
+
|
|
224
|
+
1. **Screenshots with no date** — always capture the date/timestamp in the screenshot or use system-generated exports with metadata.
|
|
225
|
+
|
|
226
|
+
2. **"As of today" exports provided after the audit period** — access lists pulled after the fact don't prove controls operated *during* the period. Configure periodic automated exports.
|
|
227
|
+
|
|
228
|
+
3. **Approval from the same person who made the change** — self-approval violates separation of duties. Flag this for remediation before the audit.
|
|
229
|
+
|
|
230
|
+
4. **Shared or service accounts used for approvals** — individual accountability cannot be established. Require personal accounts for all approvals.
|
|
231
|
+
|
|
232
|
+
5. **Training completion reports showing < 100%** — auditors will ask about non-completers. Have a policy and evidence showing follow-up for late completers.
|
|
233
|
+
|
|
234
|
+
6. **Incomplete incident tickets** — tickets must show: detection time, severity classification, responders, containment actions, resolution, and closure. Sparse tickets are a finding.
|
|
235
|
+
|
|
236
|
+
7. **Vendor SOC 2 reports not reviewed** — simply *having* a vendor's SOC 2 report is insufficient. Show evidence it was reviewed (e.g., review memo, CUEC tracking).
|
|
@@ -0,0 +1,254 @@
|
|
|
1
|
+
# SOC 2 Policy Writing Reference
|
|
2
|
+
|
|
3
|
+
## Table of Contents
|
|
4
|
+
1. [Policy Writing Standards](#policy-writing-standards)
|
|
5
|
+
2. [Required Policy Set](#required-policy-set)
|
|
6
|
+
3. [Policy Templates](#policy-templates)
|
|
7
|
+
4. [Common Mistakes to Avoid](#common-mistakes-to-avoid)
|
|
8
|
+
|
|
9
|
+
---
|
|
10
|
+
|
|
11
|
+
## Policy Writing Standards
|
|
12
|
+
|
|
13
|
+
### Universal Policy Header
|
|
14
|
+
|
|
15
|
+
Every policy should start with:
|
|
16
|
+
|
|
17
|
+
```
|
|
18
|
+
Policy Title: [Name]
|
|
19
|
+
Policy ID: [e.g., ISP-001]
|
|
20
|
+
Version: [e.g., 1.2]
|
|
21
|
+
Effective Date: [Date]
|
|
22
|
+
Last Reviewed: [Date]
|
|
23
|
+
Next Review Date: [Date — maximum 12 months from last review]
|
|
24
|
+
Policy Owner: [Role]
|
|
25
|
+
Approved By: [Executive/leadership role + name]
|
|
26
|
+
TSC Criteria: [e.g., CC1.1, CC2.1, CC5.3]
|
|
27
|
+
```
|
|
28
|
+
|
|
29
|
+
### Required Sections (every policy)
|
|
30
|
+
|
|
31
|
+
1. **Purpose** — Why this policy exists; what it protects
|
|
32
|
+
2. **Scope** — Who and what systems it applies to (be explicit)
|
|
33
|
+
3. **Policy Statements** — The actual rules (use "must", not "should")
|
|
34
|
+
4. **Roles and Responsibilities** — Who enforces it, who complies
|
|
35
|
+
5. **Exceptions** — How to request an exception; who approves
|
|
36
|
+
6. **Enforcement** — Consequences of non-compliance
|
|
37
|
+
7. **Related Documents** — Links to procedures, standards, other policies
|
|
38
|
+
8. **Review and Revision History** — Version log
|
|
39
|
+
|
|
40
|
+
### Language Standards
|
|
41
|
+
|
|
42
|
+
| Weak (avoid) | Strong (use) |
|
|
43
|
+
|---|---|
|
|
44
|
+
| should, may, could | must, shall, is required to |
|
|
45
|
+
| as appropriate | [specific action] |
|
|
46
|
+
| where possible | [specific action or explicit exception process] |
|
|
47
|
+
| periodically | [specific frequency: quarterly, annually] |
|
|
48
|
+
| sensitive data | [defined data classification tier] |
|
|
49
|
+
| promptly | within [X] hours/days |
|
|
50
|
+
|
|
51
|
+
---
|
|
52
|
+
|
|
53
|
+
## Required Policy Set
|
|
54
|
+
|
|
55
|
+
### 1. Information Security Policy (ISP)
|
|
56
|
+
**Criteria:** CC1.1, CC1.2, CC2.1, CC5.1, CC5.3
|
|
57
|
+
**Purpose:** Overarching policy establishing management's commitment to security
|
|
58
|
+
**Must include:**
|
|
59
|
+
- Executive statement of commitment
|
|
60
|
+
- Security objectives aligned to business
|
|
61
|
+
- Reference to all subordinate security policies
|
|
62
|
+
- Defined security roles (CISO, security committee, data owners, users)
|
|
63
|
+
- Annual review requirement
|
|
64
|
+
|
|
65
|
+
---
|
|
66
|
+
|
|
67
|
+
### 2. Access Control Policy
|
|
68
|
+
**Criteria:** CC6.1, CC6.2, CC6.3, CC6.4, CC6.5, CC6.6
|
|
69
|
+
**Must include:**
|
|
70
|
+
- Principles: least privilege, need-to-know, separation of duties
|
|
71
|
+
- MFA requirements (which systems require it — be specific)
|
|
72
|
+
- Provisioning process: how access is requested, approved, granted
|
|
73
|
+
- Termination process: timeline for de-provisioning (e.g., within 24 hours)
|
|
74
|
+
- Privileged access: how admin/root access is controlled and reviewed
|
|
75
|
+
- Access review cadence (e.g., quarterly for privileged, annual for standard)
|
|
76
|
+
- Password/authentication standards (or reference to auth policy)
|
|
77
|
+
|
|
78
|
+
---
|
|
79
|
+
|
|
80
|
+
### 3. Incident Response Policy
|
|
81
|
+
**Criteria:** CC7.3, CC7.4, CC2.3
|
|
82
|
+
**Must include:**
|
|
83
|
+
- Incident classification levels (with examples: P1–P4 or Critical/High/Medium/Low)
|
|
84
|
+
- Roles: Incident Commander, responders, communications lead
|
|
85
|
+
- Detection and reporting process (how incidents are identified and escalated)
|
|
86
|
+
- Response phases: Identify → Contain → Eradicate → Recover → Lessons Learned
|
|
87
|
+
- Customer notification SLA (e.g., material breaches within 72 hours)
|
|
88
|
+
- Post-incident review requirement
|
|
89
|
+
- Annual IR tabletop exercise requirement
|
|
90
|
+
|
|
91
|
+
**Template snippet:**
|
|
92
|
+
```
|
|
93
|
+
4. Incident Classification
|
|
94
|
+
|
|
95
|
+
Severity 1 (Critical): Confirmed breach of customer data, ransomware, complete
|
|
96
|
+
system outage. Requires immediate escalation to CEO and CISO. Customer
|
|
97
|
+
notification within 72 hours if PII involved.
|
|
98
|
+
|
|
99
|
+
Severity 2 (High): Suspected breach, significant service degradation >30 min,
|
|
100
|
+
compromised admin credentials. Requires CISO notification within 2 hours.
|
|
101
|
+
|
|
102
|
+
Severity 3 (Medium): Isolated malware, failed intrusion attempt, minor outage.
|
|
103
|
+
Requires Security team response within 4 hours.
|
|
104
|
+
|
|
105
|
+
Severity 4 (Low): Security policy violations, phishing attempts (no compromise),
|
|
106
|
+
suspicious activity (unconfirmed). Requires ticket within 24 hours.
|
|
107
|
+
```
|
|
108
|
+
|
|
109
|
+
---
|
|
110
|
+
|
|
111
|
+
### 4. Change Management Policy
|
|
112
|
+
**Criteria:** CC8.1
|
|
113
|
+
**Must include:**
|
|
114
|
+
- Scope: what constitutes a "change" (code, infrastructure, configurations)
|
|
115
|
+
- Change types: standard (pre-approved), normal (requires review), emergency
|
|
116
|
+
- Approval requirements by change type
|
|
117
|
+
- Testing requirements (staging/QA before production)
|
|
118
|
+
- Rollback requirements: every change must have a documented rollback plan
|
|
119
|
+
- Emergency change: allowed with retroactive approval within 24 hours
|
|
120
|
+
- Change freeze periods (optional but common)
|
|
121
|
+
|
|
122
|
+
---
|
|
123
|
+
|
|
124
|
+
### 5. Risk Assessment Policy
|
|
125
|
+
**Criteria:** CC3.1, CC3.2, CC3.3, CC3.4
|
|
126
|
+
**Must include:**
|
|
127
|
+
- Frequency: at minimum annual, plus triggered by significant changes
|
|
128
|
+
- Risk scoring methodology (likelihood × impact matrix)
|
|
129
|
+
- Risk tolerance/appetite statement
|
|
130
|
+
- Risk register: ownership, format, review cadence
|
|
131
|
+
- Treatment options: accept, mitigate, transfer, avoid
|
|
132
|
+
- Escalation: who reviews and approves risk acceptance
|
|
133
|
+
|
|
134
|
+
---
|
|
135
|
+
|
|
136
|
+
### 6. Vendor Management Policy
|
|
137
|
+
**Criteria:** CC9.2
|
|
138
|
+
**Must include:**
|
|
139
|
+
- Vendor tiering criteria (Critical / High / Medium / Low)
|
|
140
|
+
- Due diligence requirements per tier (SOC 2 report, questionnaire, etc.)
|
|
141
|
+
- Contractual requirements: DPA, security addendum, right-to-audit
|
|
142
|
+
- Ongoing monitoring: annual review schedule
|
|
143
|
+
- Offboarding: data deletion requirements, access revocation
|
|
144
|
+
- Subprocessor disclosure for customer-facing vendors
|
|
145
|
+
|
|
146
|
+
---
|
|
147
|
+
|
|
148
|
+
### 7. Business Continuity & Disaster Recovery Policy
|
|
149
|
+
**Criteria:** A1.2, A1.3, CC9.1
|
|
150
|
+
**Must include:**
|
|
151
|
+
- RTO (Recovery Time Objective) and RPO (Recovery Point Objective) per system
|
|
152
|
+
- Backup frequency, retention, and verification requirements
|
|
153
|
+
- DR environment description (hot/warm/cold standby)
|
|
154
|
+
- DR test requirement: at minimum annual tabletop or failover test
|
|
155
|
+
- BCP activation criteria and escalation path
|
|
156
|
+
- Communication plan during an incident
|
|
157
|
+
|
|
158
|
+
---
|
|
159
|
+
|
|
160
|
+
### 8. Data Classification Policy
|
|
161
|
+
**Criteria:** C1.1, P3, CC6.7
|
|
162
|
+
**Must include:**
|
|
163
|
+
- Classification tiers (example: Public / Internal / Confidential / Restricted)
|
|
164
|
+
- Definition of each tier with examples
|
|
165
|
+
- Handling requirements per tier (storage, transmission, sharing, disposal)
|
|
166
|
+
- Labeling requirements
|
|
167
|
+
- Default classification (unclassified data = treated as what tier?)
|
|
168
|
+
|
|
169
|
+
**Template tiers:**
|
|
170
|
+
```
|
|
171
|
+
Restricted: PII, PHI, payment card data, credentials, encryption keys.
|
|
172
|
+
Encrypted at rest and in transit. Access strictly limited.
|
|
173
|
+
Cannot be stored in personal devices or unapproved cloud services.
|
|
174
|
+
|
|
175
|
+
Confidential: Business-sensitive data, source code, audit reports, contracts.
|
|
176
|
+
Encrypted in transit. Access on need-to-know basis. NDA required
|
|
177
|
+
for external sharing.
|
|
178
|
+
|
|
179
|
+
Internal: Internal communications, non-sensitive operational data.
|
|
180
|
+
Not for public distribution. Standard access controls apply.
|
|
181
|
+
|
|
182
|
+
Public: Marketing materials, published docs, press releases.
|
|
183
|
+
No special controls required.
|
|
184
|
+
```
|
|
185
|
+
|
|
186
|
+
---
|
|
187
|
+
|
|
188
|
+
### 9. Acceptable Use Policy
|
|
189
|
+
**Criteria:** CC1.1, CC6.6, CC6.8
|
|
190
|
+
**Must include:**
|
|
191
|
+
- Acceptable use of company systems, networks, and data
|
|
192
|
+
- Prohibited activities (explicit list)
|
|
193
|
+
- Personal device / BYOD rules
|
|
194
|
+
- Monitoring disclosure ("Company may monitor use of systems")
|
|
195
|
+
- Reporting obligations for suspected incidents
|
|
196
|
+
- Acknowledgment requirement (signed annually)
|
|
197
|
+
|
|
198
|
+
---
|
|
199
|
+
|
|
200
|
+
### 10. Privacy Policy / Notice
|
|
201
|
+
**Criteria:** P1, P2, P3, P6, P8
|
|
202
|
+
**Must include (per AICPA GAPP):**
|
|
203
|
+
- What personal information is collected and why
|
|
204
|
+
- Legal basis for processing (if GDPR-applicable)
|
|
205
|
+
- How information is used
|
|
206
|
+
- With whom it is shared (third parties, subprocessors)
|
|
207
|
+
- Retention periods
|
|
208
|
+
- Individual rights (access, correction, deletion, portability)
|
|
209
|
+
- How to submit a data subject request
|
|
210
|
+
- Contact information for privacy inquiries
|
|
211
|
+
- How policy changes are communicated
|
|
212
|
+
|
|
213
|
+
---
|
|
214
|
+
|
|
215
|
+
### 11. Encryption Policy
|
|
216
|
+
**Criteria:** CC6.7, C1.1
|
|
217
|
+
**Must include:**
|
|
218
|
+
- Encryption standards (e.g., AES-256 at rest, TLS 1.2+ in transit)
|
|
219
|
+
- Which systems and data require encryption
|
|
220
|
+
- Key management: generation, rotation, storage, destruction
|
|
221
|
+
- Prohibition on deprecated algorithms (MD5, SHA-1, DES, RC4)
|
|
222
|
+
|
|
223
|
+
---
|
|
224
|
+
|
|
225
|
+
### 12. Vulnerability Management Policy
|
|
226
|
+
**Criteria:** CC7.1, CC7.5
|
|
227
|
+
**Must include:**
|
|
228
|
+
- Scanning frequency (e.g., weekly automated + quarterly penetration test)
|
|
229
|
+
- Severity-based remediation SLAs:
|
|
230
|
+
- Critical: patch within 24–72 hours
|
|
231
|
+
- High: patch within 7–14 days
|
|
232
|
+
- Medium: patch within 30 days
|
|
233
|
+
- Low: patch within 90 days or accepted risk
|
|
234
|
+
- Exception process for systems that can't be patched immediately
|
|
235
|
+
- Penetration testing requirement (annual minimum)
|
|
236
|
+
- Responsible disclosure / bug bounty program (optional)
|
|
237
|
+
|
|
238
|
+
---
|
|
239
|
+
|
|
240
|
+
## Common Mistakes to Avoid
|
|
241
|
+
|
|
242
|
+
1. **Writing policies that describe the ideal, not the actual** — auditors test what you do, not what you aspirationally wrote. Only commit to what you'll consistently do.
|
|
243
|
+
|
|
244
|
+
2. **No approval signatures** — policies must be formally approved by an appropriate executive or the board.
|
|
245
|
+
|
|
246
|
+
3. **Copy-paste from the internet** — boilerplate policies often contain controls you don't have. Every control stated must be evidenced.
|
|
247
|
+
|
|
248
|
+
4. **Missing scope statements** — "this policy applies to all employees" may be incomplete if contractors, vendors, or specific systems need to be called out.
|
|
249
|
+
|
|
250
|
+
5. **Not distributing policies** — policies must be accessible to all in-scope personnel. Distribution evidence is required (e.g., intranet link, email announcement, acknowledgment log).
|
|
251
|
+
|
|
252
|
+
6. **Neglecting annual review** — dated policies are a flag. Every policy must have a documented review with any changes noted.
|
|
253
|
+
|
|
254
|
+
7. **Procedures missing from policies** — policies state *what* and *why*; procedures state *how*. Both are needed. "We will respond to incidents" without a runbook is a gap.
|