SOC 2_PI1.5

SOC 2

Process Integrity Additional Criteria for Processing Integrity

PI1.5

The entity implements policies and procedures to store inputs items in processing and outputs completely accurately and timely in accordance with system specifications to meet the entity?s objectives.

Protects Stored Items—Stored items are protected to prevent theft corruption destruction or deterioration that would prevent output from meeting specifications.Archives and Protects System Records—System records are archived and archives are protected against theft corruption destruction or deterioration that would prevent them from being used. Stores Data Completely and Accurately—Procedures are in place to provide for the complete accurate and timely storage of data. Creates and Maintains Records of System Storage Activities—Records of system storage activities are created and maintained completely and accurately in a timely manner.

 

Click here to Start your FREE trial today!

Explainer video

 

What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video