Information Security Part 1 (SEC1-3)



Are you familiar with setting up logical and physical controls to meet SOC 2 requirements? This six-part series can help you enable 18 controls. In the first part of the six-part series, you will learn to implement network firewalls to secure your systems, manage elevated access permissions, and restrict administrative privileges to only those who require it.

In the first part of the six-part series, you will learn to implement network firewalls to secure your systems, manage elevated access permissions, and restrict administrative privileges to only those who require it. This paves the way for enabling 18 controls to meet SOC 2's CC6 requirements - Logical and Physical Controls.
Chapter 1 - Implement Network Firewalls and Boundary Protection
Templates - Policy, Firewall Rule Change Request, Firewall Security Incident Notification
Case Study
Chapter 2 - Managing Elevated Access Permissions
Templates - Access Control Policy, Access Request Form, Monitoring Dashboard, Elevated Access Alert Template
Case Study
Chapter 3 - Restrict Administrative Privileges
Templates -Administrative Access Policy, Administrative Access Request Form, Monitoring Dashboard, Administrative Access Revocation Template
Case Study
Chapter 1 - Implement Network Firewalls and Boundary Protection
Templates - Policy, Firewall Rule Change Request, Firewall Security Incident Notification
Case Study
Chapter 2 - Managing Elevated Access Permissions
Templates - Access Control Policy, Access Request Form, Monitoring Dashboard, Elevated Access Alert Template
Case Study
Chapter 3 - Restrict Administrative Privileges
Templates -Administrative Access Policy, Administrative Access Request Form, Monitoring Dashboard, Administrative Access Revocation Template
Case Study
