Code | Section | Title |
ISO |
A.12.1.1 |
Documented operating procedures |
ISO |
A.12.1.2 |
Change management |
ISO |
A.12.5.1 |
Installation of software on operational systems |
SOC2 |
CC2.1 |
COSO Principle 13: The entity obtains or generates and uses relevant, quality information to support the functioning of internal control. |
SOC2 |
CC2.2 |
COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control. |
SOC2 |
CC2.2 |
COSO Principle 14: The entity internally communicates information, including objectives and responsibilities for internal control, necessary to support the functioning of internal control. |
SOC2 |
CC3.4 |
COSO Principle 9: The entity identifies and assesses changes that could significantly impact the system of internal control. |
SOC2 |
CC6.8 |
The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives. |
SOC2 |
CC8.1 |
The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. |
SOC2 |
PI1.1 |
The entity obtains or generates, uses, and communicates relevant, quality information regarding the objectives related to processing, including definitions of data processed and product and service specifications, to support the use of products and services. |
SOC2 |
PI1.1 |
The entity obtains or generates, uses, and communicates relevant, quality information regarding the objectives related to processing, including definitions of data processed and product and service specifications, to support the use of products and services. |
Code | Section | Title |
ISO |
A.12.6.1 |
Management of technical vulnerabilities |
ISO |
A.12.7.1 |
Information systems audit controls |
ISO |
A.14.1 |
Security requirements of information systems |
ISO |
A.14.1.1 |
Information security requirements analysis and specification |
ISO |
A.14.1.2 |
Securing application services on public networks |
ISO |
A.14.1.3 |
Protecting application services transactions |
ISO |
A.14.2.1 |
Secure development policy |
ISO |
A.14.2.4 |
Restrictions on changes to software packages |
ISO |
A.14.2.5 |
Secure system engineering principles |
ISO |
A.14.2.6 |
Secure development environment |
Privacy by Design |
|
|
OWASP Security by Design Principles |
|
|
SOC2 |
CC6.7 |
The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives. |
SOC2 |
CC6.8 |
The entity implements controls to prevent or detect and act upon the introduction of unauthorized or malicious software to meet the entity’s objectives. |
SOC2 |
CC7.1 |
To meet its objectives, the entity uses detection and monitoring procedures to identify (1) changes to configurations that result in the introduction of new vulnerabilities, and (2) susceptibilities to newly discovered vulnerabilities. |
SOC2 |
CC8.1 |
The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. |
SOC2 |
CC8.1 |
The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. |
SOC2 |
CC8.1 |
The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. |
Code | Section | Title |
ISO |
A.12.1.3 |
Capacity management |
ISO |
A.17.2.1 |
Availability of information processing facilities |
SOC2 |
A1.1 |
The entity maintains, monitors, and evaluates current processing capacity and use of system components (infrastructure, data, and software) to manage capacity demand and to enable the implementation of additional capacity to help meet its objectives. |
SOC2 |
A1.2 |
The entity authorizes, designs, develops or acquires, implements, operates, approves, maintains, and monitors environmental protections, software, data back-up processes, and recovery infrastructure to meet its objectives. |
Code | Section | Title |
ISO |
A.12.1.4 |
Separation of development, testing and operational environments |
ISO |
A.14.2.3 |
Technical review of applications after operating platform changes |
ISO |
A.14.2.8 |
System security testing |
ISO |
A.14.2.9 |
System acceptance testing |
ISO |
A.14.3 |
Test data |
ISO |
A.14.3.1 |
Protection of test data |
SOC2 |
CC8.1 |
The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. |
SOC2 |
CC8.1 |
The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. |
SOC2 |
CC8.1 |
The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. |
Code | Section | Title |
ISO |
A.9.4.5 |
Access control to program source code |
ISO |
A.12.6 |
Technical vulnerability management |
ISO |
A.17.2 |
Redundancies |
CHI |
SR80 |
Implementing Software and Upgrades in the EHRi |
CHI |
SR81 |
Protecting EHRi Software |
CHI |
SR82 |
Managing Known Vulnerabilities |
SOC 2 |
CC8.1 |
The entity authorizes, designs, develops or acquires, configures, documents, tests, approves, and implements changes to infrastructure, data, software, and procedures to meet its objectives. |