Information Security Part 2 (SEC4-7)

Time Icon Gray
30
Lessons Icon Gray
Bars Icon Gray
Intermediate level
Reviewer for Filearn
Reviewer for Filearn
Reviewer for Filearn
30

Are you familiar with setting up logical and physical controls to meet SOC 2 requirements? In the second part of the six-part series, you will learn to enable 4 out of 18 controls: review physical access to data centers, establish data retention and disposal policies, implement intrusion detection and prevention systems, and control access to code repositories.

In part 2 of Information Security, you will learn to enable 4 out of 18 controls: review physical access to data centers, establish data retention and disposal policies, implement intrusion detection and prevention systems, and control access to code repositories.

Chapter 4: Reviewing Physical Access to Data Centers

Chapter 5: Establish Data Retention and Disposal Policies

Chapter 6: Implementing Intrusion Detection and Prevention Systems

Chapter 7: Controlling Access to Code Repositories

Chapter 4: Reviewing Physical Access to Data Centers

  • SOC 2 Requirements for Physical Access Reviews
  • Best Practices
  • 4 templates: physical access review, request, termination checklist, and reporting templates
  • Case study

Chapter 5: Establish Data Retention and Disposal Policies

  • SOC 2 Requirements for Data Retention and Disposal
  • Best Practices
  • Case Study
  • 4 templates: Data Retention and Disposal Policy, Data Retention Schedule, Data Disposal Request Form, Data Retention and Training Outline

Chapter 6: Implementing Intrusion Detection and Prevention Systems (IDPS)

  • SOC 2 Requirements for Implementing IDPS
  • Best Practices
  • Case Study
  • 3 templates: IDPS Policy, Alert Triage and Metrics & Reporting

Chapter 7: Controlling Access to Code Repositories

  • SOC 2 Requirements for Controlling Access to Code Repositories
  • Best Practices
  • Case Study
  • 4 templates: Code repo access control, access request, access review checklist and security alert templates

Filearn Customer

Information Security Part 2 (SEC4-7)