Information Security Part 2 (SEC4-7)



Are you familiar with setting up logical and physical controls to meet SOC 2 requirements? In the second part of the six-part series, you will learn to enable 4 out of 18 controls: review physical access to data centers, establish data retention and disposal policies, implement intrusion detection and prevention systems, and control access to code repositories.

In part 2 of Information Security, you will learn to enable 4 out of 18 controls: review physical access to data centers, establish data retention and disposal policies, implement intrusion detection and prevention systems, and control access to code repositories.
Chapter 4: Reviewing Physical Access to Data Centers
Chapter 5: Establish Data Retention and Disposal Policies
Chapter 6: Implementing Intrusion Detection and Prevention Systems
Chapter 7: Controlling Access to Code Repositories
Chapter 4: Reviewing Physical Access to Data Centers
- SOC 2 Requirements for Physical Access Reviews
- Best Practices
- 4 templates: physical access review, request, termination checklist, and reporting templates
- Case study
Chapter 5: Establish Data Retention and Disposal Policies
- SOC 2 Requirements for Data Retention and Disposal
- Best Practices
- Case Study
- 4 templates: Data Retention and Disposal Policy, Data Retention Schedule, Data Disposal Request Form, Data Retention and Training Outline
Chapter 6: Implementing Intrusion Detection and Prevention Systems (IDPS)
- SOC 2 Requirements for Implementing IDPS
- Best Practices
- Case Study
- 3 templates: IDPS Policy, Alert Triage and Metrics & Reporting
Chapter 7: Controlling Access to Code Repositories
- SOC 2 Requirements for Controlling Access to Code Repositories
- Best Practices
- Case Study
- 4 templates: Code repo access control, access request, access review checklist and security alert templates
