Skip to content
Design Compliance and Security, LLC
  • Home
  • Services
    • Compliance Program Management
    • SOC 1 Audits
    • SOC 2 Audits
    • SOC 3 Audits
    • Security Awareness Training
    • eramba
    • Penetration Testing
  • Articles
  • Our Team
  • Community
    • Community Slack Channel
  • Contact Us
  • Portal
  • 1-888-959-6934

SOC 2 Knowledge Hub

SOC 2 CC1: Common Criteria related to the Control Environment

SOC 2 CC1: Common Criteria related to the Control Environment

communication

SOC 2 CC2: Common Criteria related to Communication and Information

Risk Assessment

SOC 2 CC3: Common Criteria related to Risk Assessment

Monitoring

SOC 2 CC4: Common Criteria related to Monitoring Activities

SOC 2 CC5: Common Criteria related to Control Activities

SOC 2 CC5: Common Criteria related to Control Activities

Logical and Physical Access

SOC 2 CC6: Common Criteria related to Logical and Physical Access

SysOps

SOC 2 CC7: Common Criteria related to System Operations

Change Management

SOC 2 CC8: Common Criteria related to Change Management

Risk Mitigation

SOC 2 CC9: Common Criteria related to Risk Mitigation

SOC 2 Availability Criteria

SOC 2 Availability Criteria

Articles that We’ve Written

What is the Hardest Part of Passing Your First Audit?

What is the Hardest Part of Passing Your First Audit?

Third Party Vendor Management: What You Need to Know

Third Party Vendor Management: What You Need to Know

SOC 1 vs. SOC 2: What is the Difference?

SOC 1 vs. SOC 2: What is the Difference?

Explained: Security Incident Response Plan

Explained: Security Incident Response Plan

Bridge Letter

Bridge Letter: Things You Should Know

Explained: Microsoft’s SSPA Program

Explained: Microsoft’s SSPA Program

Copyright © 2025 Design Compliance and Security, LLC
Privacy Policy