SOC 2-Prompt-Bibliothek

Prompts zur Analyse der Trust Services Criteria

Verständnis der Trust Services Criteria

Nutzen Sie diese Prompts, um zu analysieren, welche Trust Services Criteria (TSC) für Ihren Service gelten, und um spezifische Anforderungen für Sicherheit, Verfügbarkeit, Verarbeitungsintegrität, Vertraulichkeit und Datenschutz zu verstehen.

Festlegung des Scopes für Ihr SOC 2-Engagement

Bestimmung der anwendbaren Kriterien

I'm preparing for a SOC 2 audit for [describe your service/system]. Help me determine which Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, Privacy) are applicable based on:
- Service type: [e.g., cloud-based HR platform]
- Data handled: [e.g., employee PII, payroll data]
- Customer expectations: [e.g., 99.9% uptime guarantee]
- Regulatory requirements: [e.g., GDPR, HIPAA]

Provide a recommendation with justification for each criterion.

Definition der Scope-Grenzen

Help me define the scope boundaries for my SOC 2 Type [I/II] audit of [service name]. Include:
- In-scope systems and applications: [list key systems]
- Out-of-scope components: [list exclusions]
- Third-party services: [list vendors]
- Physical locations: [list data centers/offices]
- Time period: [for Type II]

Generate a scope statement suitable for inclusion in my system description.

Laden Sie Ihr bestehendes Systemarchitektur-Diagramm oder Ihren Netzwerkplan hoch, um dem ISMS Copilot zu helfen, genauere Empfehlungen zur Scoping-Festlegung zu geben.

Common Criteria (Sicherheit - Erforderlich)

Übersicht der Sicherheitskriterien

Explain the Security Common Criteria (CC1.0 through CC9.0) requirements for SOC 2. For each criterion, provide:
- The control objective
- Key requirements and points of focus
- Typical controls organizations implement
- Common audit evidence

Deep-Dive in spezifische Kriterien

Provide detailed guidance on SOC 2 criterion [CC6.1] including:
- Full requirement text and points of focus
- How this applies to [describe your environment]
- Example controls that satisfy this criterion
- Evidence auditors typically request
- Common gaps organizations face

Verfügbarkeitskriterien (Availability)

Beurteilung der Anwendbarkeit der Verfügbarkeit

I offer [service description] with [uptime SLA/commitment]. Should I include the Availability criteria in my SOC 2 scope? Consider:
- Our uptime commitment: [percentage or description]
- System architecture: [e.g., multi-region cloud, single data center]
- Customer contracts: [uptime guarantees]
- Incident history: [recent availability issues]

Provide a recommendation and list the specific Availability criteria I'd need to address.

Mapping von Verfügbarkeits-Kontrollen

List all SOC 2 Availability criteria (A1.1, A1.2, A1.3) and for each one, suggest specific controls for [your service type]. Include:
- Monitoring and alerting controls
- Capacity planning processes
- Incident response procedures
- Backup and recovery mechanisms

Kriterien zur Verarbeitungsintegrität (Processing Integrity)

Anwendbarkeit der Verarbeitungsintegrität

Help me determine if Processing Integrity criteria apply to my SOC 2 scope. My service:
- Type: [e.g., payment processing, data transformation, reporting]
- Processing activities: [describe key data processing]
- Accuracy requirements: [customer expectations or regulatory requirements]
- Quality controls: [existing validation processes]

Should I include Processing Integrity? What specific criteria would apply?

Identifizierung von Verarbeitungskontrollen

For SOC 2 Processing Integrity criterion [PI1.1], help me identify controls for [your processing activity]. Address:
- Input validation and data quality checks
- Processing logic verification
- Output accuracy monitoring
- Error detection and correction
- Reconciliation processes

Vertraulichkeitskriterien (Confidentiality)

Scoping der Vertraulichkeit

I handle [types of confidential information] in my service. Analyze whether Confidentiality criteria should be in scope considering:
- Data types: [customer proprietary data, trade secrets, etc.]
- Contractual obligations: [NDAs, customer agreements]
- Access controls: [who can access what]
- Encryption practices: [at rest and in transit]

Provide a recommendation and list applicable Confidentiality criteria.

Design von Vertraulichkeitskontrollen

Design controls to meet SOC 2 Confidentiality criteria for [your service]. Cover:
- Data classification scheme
- Access control policies
- Encryption requirements (at rest, in transit, in use)
- Secure disposal procedures
- Third-party confidentiality agreements

Datenschutzkriterien (Privacy)

Beurteilung der Anwendbarkeit des Datenschutzes

Determine if Privacy criteria apply to my SOC 2 scope. We process:
- Personal information types: [list PII collected]
- Data subjects: [customers, employees, end users]
- Privacy regulations: [GDPR, CCPA, etc.]
- Privacy commitments: [privacy policy, consent mechanisms]
- Geographic scope: [regions where data subjects are located]

Should Privacy be included? Which specific Privacy criteria are most relevant?

Mapping der GAPP-Prinzipien

Map the Generally Accepted Privacy Principles (GAPP) to our privacy practices for [your service]:
- Notice: [how we inform data subjects]
- Choice and consent: [opt-in/opt-out mechanisms]
- Collection: [what we collect and why]
- Use and retention: [how we use data and retention periods]
- Access: [data subject access rights]
- Disclosure to third parties: [who we share with]
- Security: [privacy-specific security controls]
- Quality: [data accuracy measures]
- Monitoring and enforcement: [compliance oversight]

Generate a Privacy criteria mapping table.

Wenn Sie in mehreren Rechtsordnungen tätig sind, stellen Sie sicher, dass Ihre Analyse der Datenschutzkriterien regionalspezifische Anforderungen wie DSGVO, CCPA oder andere Datenschutzgesetze berücksichtigt.

Kriterienübergreifende Analyse

Identifizierung von Kriterien-Überschneidungen

I'm including [list selected criteria] in my SOC 2 scope. Identify where these criteria overlap and how I can design controls that satisfy multiple criteria simultaneously. Provide:
- Common control objectives across criteria
- Shared evidence opportunities
- Integrated control recommendations
- Efficiency tips for audit preparation

Gap-Analyse nach Kriterien

Conduct a gap analysis for [specific Trust Services Criterion] against our current state:

Current controls in place:
[Describe your existing controls]

Current documentation:
[List policies, procedures you have]

Known weaknesses:
[List any known gaps]

Provide a detailed gap assessment with prioritized remediation recommendations.

Nutzen Sie diese Prompts zur Kriterienanalyse frühzeitig in Ihrem SOC 2-Prozess, um den richtigen Scope festzulegen und kostspielige Scope-Änderungen während des Audits zu vermeiden.

War das hilfreich?