General Policies
SourceSource:: https://secureframe.com/hub/soc-2/policies-and-procedures
All SOC 2 examinations involve an auditor review of your organization’s policies.
Policies must be documented, formally reviewed, and accepted by employees.
Each policy supports an element of the overall security and approach to handling customer data.
All Policies Must follow and include details for which an Auditor looks for.
- [OPS] Acceptable Use Policy
:– Definesthe ways in which thenetwork,website or system may be used. Can also define which devicessystem, andtypesdeviceofusage rules, removablemedia can be used,media, password requirements,andissuance/returnhowofdevices will be issued and returned.devices. - [TECH] Access Control Policy
:– Defines who will have access to company systems and how oftenthose accesspermissions will be reviewed. - [TECH] Business Continuity Plan
:– Defines how employees will respond toa disruptiondisruptions to keepthebusinessrunning smoothly.running. - [TECH] Change Management Policy
:– Defines how system changes will be documented andcommunicated across your organization.communicated. - [OPS] Confidentiality Policy
:– Defineshowhandlingyour organization will handleof confidential information about clients, partners, or thecompany itself.company. - [OPS] Code of Conduct Policy
:– Definestheexpectedpoliciesbehaviorbothof employees and employersmust adhere to. This includes how people should interact with one anotherat work. - [TECH] [OPS] Data Classification Policy
:– Defineshowclassificationyou will classifyof sensitive dataaccording to the level ofby riskit poses to your organization.level. - [TECH] Disaster Recovery Policy
:– Defines howyour company willto recover fromadisastersdisastrousandevent.maintainIt also includes the minimum necessary functions your organization needs to continueminimal operations. - [TECH] Encryption Policy
:– Definesthe type ofwhich datayourisorganization will encryptencrypted andhow it’s encrypted.how. - [TECH] Incident Response Plan
:– Defines roles and responsibilitiesin response toduring adatabreachand during the ensuingor investigation. - [TECH] [OPS] Information Security Policy
:– Definesyouroverall approach to information security andwhyreasonsyou’reforputting processes and policies in place.processes. - [TECH] Information, Software, and System Backup Policy
:– Defines howinformation frombusinessapplicationsapplicationwilldatabeis storedtoforensure data recoverability.recovery. - [TECH] Logging and Monitoring Policy
:– Defines which logsyou’llarecollectcollected, monitored, andmonitor. Also covers what’s captured in those logs, and whichhow systemswill beare configured for logging. - [OPS] Physical Security Policy
:– Defines howyou will monitor and securephysical accesstoisyour company’s location. What will you do to prevent unauthorized physical access to data centersmonitored andequipment?secured at company locations. - [TECH] Password Policy –
:Definesthe requirements for usingstrongpasswords,password,password managers,manager, andpasswordexpirationexpirations.requirements. - [TECH] [OPS] Remote Access Policy
:– Defines whois authorized tocan workremotely.remotely,Alsoconnectiondefines what type of connectivity they will usetypes, andhowprotectionthat connection will be protected and monitored.measures. - [TECH] [OPS] Risk Assessment and Risk Mitigation Plan
:– Definessecuritypotential threatsthat could occurandthepreventiveaction plan to prevent those incidents.actions. - [TECH] Software Development Lifecycle Policy –
:Defineshowsecureyoubuild,will ensure your software is built securely, tested regularly,testing, andcompliescompliancewithforregulatory requirements.software. - [TECH] [OPS] Vendor Management Policy
:– Defines vendors that may introducerisk,riskas well asand controlsput in placetominimize those risks.mitigate. - [TECH] [OPS] Workstation Security Policy
:– Defines howyou willto secureyour employees’employee workstationsto reduce the risk of dataagainst loss and unauthorized access.