Demo · sample data, not for production use · request the real tool →

CC6.1

Logical access security software, infrastructure, and architectures

SecurityImplementedSecurity (Common Criteria)

Control description

AICPA Trust Services Criteria

The entity implements logical access security software, infrastructure, and architectures over protected information assets.

Auditor test plan

How this is tested during the audit

Auditor inspects IAM configuration, MFA enforcement reports, and SSO coverage for in-scope systems.

Evidence

2 items attached to this control

  • PDF

    okta-mfa-coverage-report.pdf

    sha256:0000000000000000… · 150.6 KB · 9d ago

  • JSO

    iam-baseline-policy-v6.json

    sha256:0009000000000000… · 40.2 KB · 9d ago

Last reviewed
9d
Within 180-day window
Evidence on file
5

Owner

VE
VP Engineering
Accountable for design + operating effectiveness

Status timeline

Recent control history

  1. Last reviewed by VP Engineering

    9d ago

  2. Status set to implemented

    39d ago

  3. Initial control design approved

    99d ago