controls/frameworks/soc2-tsc.json

{"frameworkId":"soc2","label":"SOC 2 Trust Services Criteria","version":"2022","css":"fw-soc2","totalControls":11,"registryKey":"soc2","csvColumn":"Soc2","displayOrder":10,"scoring":{"method":"criteria-coverage","criteria":{"CC5":{"label":"Control Activities","description":"Security policies and procedures are in place and operating effectively"},"CC6.1":{"label":"Logical & Physical Access \u2014 Authentication","description":"Access to systems and data is restricted through authentication mechanisms"},"CC6.2":{"label":"Logical & Physical Access \u2014 Provisioning","description":"Access is granted, modified, and removed in a timely manner"},"CC6.3":{"label":"Logical & Physical Access \u2014 Authorization","description":"Role-based access with least privilege enforcement"},"CC6.5":{"label":"Logical & Physical Access \u2014 Revocation","description":"Access is revoked when no longer appropriate"},"CC6.6":{"label":"System Boundaries \u2014 External Threats","description":"Systems are protected against external threats"},"CC6.7":{"label":"System Boundaries \u2014 Data Protection","description":"Data transmission and storage is restricted and protected"},"CC6.8":{"label":"System Boundaries \u2014 Malware Prevention","description":"Unauthorized and malicious software is prevented or detected"},"CC7.1":{"label":"System Operations \u2014 Monitoring","description":"Security events are monitored and anomalies are detected"},"CC7.2":{"label":"System Operations \u2014 Anomaly Detection","description":"Anomalies are evaluated to determine if they represent security events"},"CC8.1":{"label":"Change Management","description":"Changes to infrastructure and software are authorized and managed"}}},"licensingProfiles":{"E3":{"label":"Microsoft 365 E3","excludeChecks":["ENTRA-PIM-001","ENTRA-IDRISK-001","ENTRA-USERRISK-001"]},"E5":{"label":"Microsoft 365 E5","excludeChecks":[]}},"nonAutomatableCriteria":{"CC1":{"label":"Control Environment","note":"Requires organizational governance documentation"},"CC2":{"label":"Communication & Information","note":"Requires policy documentation review"},"CC3":{"label":"Risk Assessment","note":"Partially automatable via Secure Score (Phase 2)"},"CC4":{"label":"Monitoring Activities","note":"Partially automatable via Compliance Manager"},"CC9":{"label":"Risk Mitigation","note":"Requires vendor management and business continuity review"}},"colors":{"light":{"background":"#eff6ff","color":"#1e3a5f"},"dark":{"background":"#1E3A5F","color":"#60A5FA"}}}