SOC 2 Richtlinien- und Verfahrens-Prompts
Erstellung von SOC 2-konformen Richtlinien
Diese Prompts unterstützen Sie bei der Erstellung von Richtlinien und Verfahren, die den Anforderungen der Trust Services Criteria entsprechen und das von Auditoren erwartete Governance-Fundament bilden.
Laden Sie Ihre bestehenden Richtlinien hoch, bevor Sie neue erstellen. Der ISMS Copilot kann Lücken analysieren und Aktualisierungen vorschlagen, anstatt alles neu zu erstellen.
Kern-Governance-Richtlinien
Informationssicherheitsrichtlinie
Create a comprehensive Information Security Policy for [organization name] that supports our SOC 2 [Security/+other criteria] scope. Include:
- Purpose and scope aligned to Trust Services Criteria
- Roles and responsibilities (CISO, security team, employees)
- Security governance structure
- Risk management approach
- Policy compliance and enforcement
- Review and update procedures
Target audience: [all employees, specific departments]
Organization size: [number of employees]
Industry: [your industry] Zugriffskontrollrichtlinie
Generate an Access Control Policy addressing SOC 2 Common Criteria CC6.1, CC6.2, and CC6.3. Cover:
- User access provisioning and deprovisioning (joiner/mover/leaver)
- Role-based access control (RBAC) principles
- Least privilege and segregation of duties
- Privileged access management
- Access review procedures (frequency: [quarterly/annual])
- Guest and third-party access
- Remote access requirements
Our environment: [describe systems, user count, access technologies] Change-Management-Richtlinie
Draft a Change Management Policy that satisfies SOC 2 CC8.1. Include:
- Change request and approval workflow
- Change categories (standard, normal, emergency)
- Testing and validation requirements
- Rollback procedures
- Communication protocols
- Post-implementation review
Our change environment:
- Systems: [production systems in scope]
- Release frequency: [weekly/monthly/continuous]
- Team structure: [dev, ops, security teams] Betriebliche Verfahren
Verfahren zur Reaktion auf Vorfälle (Incident Response)
Create an Incident Response Procedure aligned with SOC 2 CC7.3 and CC7.4 for [organization name]. Address:
- Incident classification and severity levels
- Detection and reporting mechanisms
- Response team roles (incident commander, communications, technical)
- Investigation and containment steps
- Evidence preservation
- Communication plan (internal, customers, regulators)
- Post-incident review and lessons learned
Incident types we face: [e.g., security breaches, availability incidents, data integrity issues]
Compliance requirements: [breach notification laws if applicable] Backup- und Wiederherstellungsverfahren
Develop a Backup and Recovery Procedure supporting SOC 2 CC9.1 and [Availability A1.2 if applicable]. Cover:
- Systems and data in scope for backup
- Backup frequency and retention: [daily/weekly, retention period]
- Backup types: [full, incremental, differential]
- Backup storage locations: [on-site, off-site, cloud]
- Recovery time objective (RTO): [target]
- Recovery point objective (RPO): [target]
- Testing procedures: [frequency and scope]
- Roles and responsibilities
Our infrastructure: [on-prem/cloud/hybrid, key systems] Verfahren zum Lieferantenmanagement
Create a Vendor Management Procedure for SOC 2 CC9.2. Include:
- Vendor risk assessment criteria
- Due diligence requirements (SOC 2 reports, security questionnaires)
- Contract requirements (SLAs, data protection clauses, audit rights)
- Ongoing monitoring and review (frequency: [annual/quarterly])
- Vendor termination and data return
- Subservice organization considerations
We use vendors for: [list critical third-party services]
Data shared: [types of data sent to vendors] SOC 2-Auditoren achten besonders auf das Lieferantenmanagement. Stellen Sie sicher, dass Ihr Verfahren beschreibt, wie Sie Unterauftragnehmer überwachen und deren SOC 2-Berichte einholen.
Verfügbarkeitsspezifische Verfahren
Kapazitätsmanagement-Verfahren
Generate a Capacity Management Procedure for SOC 2 Availability criterion A1.2. Cover:
- Capacity monitoring metrics: [CPU, memory, storage, network]
- Threshold and alert definitions
- Capacity forecasting methodology
- Capacity planning cycle: [quarterly/annual]
- Scaling procedures (vertical and horizontal)
- Performance testing requirements
Our infrastructure:
- Environment: [cloud provider or on-prem]
- Auto-scaling: [yes/no, which services]
- Growth rate: [expected user/data growth] Verfügbarkeitsüberwachungs-Verfahren
Create an Availability Monitoring and Incident Management Procedure addressing A1.1 and A1.3. Include:
- Availability metrics and targets: [uptime SLA]
- Monitoring tools and configuration: [tools you use]
- Alerting and escalation procedures
- Incident response for availability events
- Communication protocols (status pages, customer notifications)
- Post-incident analysis and SLA reporting
Services monitored: [list critical services]
Availability commitment: [e.g., 99.9% uptime] Datenschutzspezifische Richtlinien
Datenschutzrichtlinie
Draft a Data Privacy Policy aligned with SOC 2 Privacy criteria and [GDPR/CCPA/other regulations]. Address:
- Privacy principles (notice, choice, collection, use, retention, access, disclosure, security)
- Legal basis for processing: [consent, contract, legitimate interest]
- Data subject rights (access, correction, deletion, portability)
- International data transfers: [mechanisms if applicable]
- Privacy by design and default
- Data protection impact assessments (DPIAs)
- Privacy incident response
Personal data we process: [list categories]
Data subjects: [customers, employees, end users]
Geographic scope: [regions] Verfahren zur Datenaufbewahrung und -entsorgung
Create a Data Retention and Disposal Procedure supporting Privacy and Confidentiality criteria. Cover:
- Retention schedules by data type:
[Data type 1]: [retention period and justification]
[Data type 2]: [retention period and justification]
- Legal and regulatory retention requirements
- Secure disposal methods (data erasure, physical destruction)
- Disposal verification and certification
- Roles and responsibilities
- Exception handling
Our data landscape: [databases, backups, archives, physical media] Verfahren zur Verarbeitungsintegrität
Verfahren zur Datenvalidierung und -qualität
Generate a Data Validation and Quality Procedure for SOC 2 Processing Integrity criterion PI1.4. Include:
- Input validation rules and controls
- Data quality dimensions (accuracy, completeness, consistency, timeliness)
- Automated validation checks
- Manual review processes
- Error handling and correction workflows
- Quality metrics and reporting
Our processing activities: [describe data flows and transformations]
Quality requirements: [accuracy thresholds, validation rules] Verfahren zur Überwachung der Verarbeitung
Create a Processing Monitoring and Reconciliation Procedure addressing PI1.1 through PI1.5. Cover:
- Processing metrics and KPIs
- Automated monitoring and alerts
- Reconciliation procedures (frequency: [daily/weekly/monthly])
- Exception investigation and resolution
- Processing logs and audit trails
- Reporting and escalation
Systems in scope: [list processing systems]
Critical processes: [payment processing, data transformation, etc.] Richtlinienpflege und Kommunikation
Verfahren zur Überprüfung und Aktualisierung von Richtlinien
Draft a Policy and Procedure Review and Update process that satisfies SOC 2 governance requirements. Include:
- Review frequency: [annual/biannual]
- Review triggers (regulatory changes, incidents, audit findings)
- Review responsibilities (policy owners, stakeholders, approvers)
- Version control and change tracking
- Communication and training on updates
- Archive and retention of superseded versions
Current policy inventory: [number of policies, last review dates] Schulungsplan zum Sicherheitsbewusstsein
Create a Security Awareness Training Plan supporting CC1.4 (security awareness and training). Cover:
- Training audience and role-based requirements
- Core training topics (phishing, passwords, data handling, incident reporting)
- Training delivery methods: [online modules, in-person, phishing simulations]
- Training frequency: [annual mandatory, ongoing awareness]
- New hire onboarding training
- Specialized training (developers, administrators, managers)
- Effectiveness measurement (quizzes, simulations, metrics)
- Record keeping
Organization size: [employee count]
Risk profile: [industry, threat landscape] Richtlinien müssen formell vom Management genehmigt und dem relevanten Personal mitgeteilt werden. Dokumentieren Sie Genehmigungen und abgeschlossene Schulungen als Audit-Nachweise.
Tipps zur Anpassung
Anpassung der Richtlinien an Ihr Unternehmen
I've generated a [policy name] using your prompts. Help me tailor it to our organization:
- Organization specifics: [size, industry, structure]
- Existing practices: [what we already do]
- Technology stack: [tools and platforms we use]
- Regulatory environment: [applicable laws and regulations]
- Risk appetite: [conservative/moderate/aggressive]
Review the draft policy and suggest specific customizations that reflect our actual practices and environment. Kombinieren Sie die Generierung von Richtlinien mit Gapanalyse-Prompts, um sicherzustellen, dass Ihre Richtlinien alle anwendbaren Trust Services Criteria abdecken und Ihre tatsächlichen Praktiken widerspiegeln.