Information Security Part 1 (SEC1-3)

Time Icon Gray
20
Lessons Icon Gray
Bars Icon Gray
Reviewer for Filearn
Reviewer for Filearn
Reviewer for Filearn
25

Are you familiar with setting up logical and physical controls to meet SOC 2 requirements? This six-part series can help you enable 18 controls. In the first part of the six-part series, you will learn to implement network firewalls to secure your systems, manage elevated access permissions, and restrict administrative privileges to only those who require it.

In the first part of the six-part series, you will learn to implement network firewalls to secure your systems, manage elevated access permissions, and restrict administrative privileges to only those who require it. This paves the way for enabling 18 controls to meet SOC 2's CC6 requirements - Logical and Physical Controls.

Chapter 1 - Implement Network Firewalls and Boundary Protection

Templates - Policy, Firewall Rule Change Request, Firewall Security Incident Notification

Case Study

Chapter 2 - Managing Elevated Access Permissions

Templates - Access Control Policy, Access Request Form, Monitoring Dashboard, Elevated Access Alert Template

Case Study

Chapter 3 - Restrict Administrative Privileges

Templates -Administrative Access Policy, Administrative Access Request Form, Monitoring Dashboard, Administrative Access Revocation Template

Case Study

Chapter 1 - Implement Network Firewalls and Boundary Protection

Templates - Policy, Firewall Rule Change Request, Firewall Security Incident Notification

Case Study

Chapter 2 - Managing Elevated Access Permissions

Templates - Access Control Policy, Access Request Form, Monitoring Dashboard, Elevated Access Alert Template

Case Study

Chapter 3 - Restrict Administrative Privileges

Templates -Administrative Access Policy, Administrative Access Request Form, Monitoring Dashboard, Administrative Access Revocation Template

Case Study

Filearn Customer

Information Security Part 1 (SEC1-3)