SOC2 CC7.1
1 / 5

Detection and Monitoring Procedures

CC7 — System Operations  ·  Not yet reviewed

Status

What this control requires

To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities.

Details

Notes — what's been done, what's missing, any gaps