Explore essential SOC 2 Type II compliance concepts, including evidence types, access controls, and security processes. Perfect for understanding basic terminology and requirements in security compliance audits.
What does the term 'control frequency' refer to in a SOC 2 Type II audit?
Explanation: Control frequency specifies how often a control activity is required to occur. The other options are incorrect: department ownership, risk severity, and approval count do not define frequency but relate to other aspects of control design or management.
What does 'point-in-time evidence' mean, and why is it not sufficient for SOC 2 Type II compliance?
Explanation: Point-in-time evidence is only from a single date and is insufficient for SOC 2 Type II, which requires ongoing proof through the full audit period. The other choices either misrepresent the concept or ignore the time-based requirement central to Type II.
Which of the following is an example of evidence for a periodic 'user access review'?
Explanation: Access review records demonstrating who performed the review and any resulting changes directly prove that reviews occurred. Onboarding checklists, login page screenshots, and uptime logs do not confirm periodic user access reviews.
What does the security term 'least privilege' mean?
Explanation: The principle of least privilege restricts user access to just what is necessary. Allowing blanket access, revoking access only on termination, or using seniority as a basis contradicts the concept's intent.
Which is an example of an appropriate Type II evidence set for 'MFA enforcement'?
Explanation: To demonstrate ongoing MFA enforcement for Type II, you need both system settings and user lists showing MFA was enabled over the period. A policy document, training resources, or a single screenshot do not prove actual enforcement.
What does 'log retention' mean and why is it important for SOC 2 compliance?
Explanation: Log retention involves storing logs for a specified period, which enables audits and helps investigate incidents. The other options either don't define retention policy or only address specific or incorrect log types.
What is meant by 'incident triage' in the context of security operations?
Explanation: Incident triage is about sorting and prioritizing incidents for a timely response. The other choices misunderstand triage or limit it to unrelated activities (external reporting or hardware repair).
What is 'root cause analysis (RCA)' in relation to incident management?
Explanation: RCA is the process of identifying why an incident happened and how to prevent recurrence. Backups, server isolation, or blanket user notifications are other responses, not root cause analysis.
Why is 'backup restore testing' performed in SOC 2 compliance programs?
Explanation: Backup restore testing ensures backup data can be recovered in practice, a core reliability requirement. The other options do not relate to the validation of backup restores.
Which is an example of evidence for 'security awareness training' during an audit period?
Explanation: Completion records with dates directly show who received security awareness training. Welcome emails, news articles, or generic platform screenshots do not reliably document training status.