Hi! I'm looking for an example of a workflow that an IT Auditor would build out to conduct SOC2 analysis. Does anyone have an example they can share? Screenshots are fine.
What type of analysis are you trying to do with the SOC 2? Are you testing specific controls for the SOC 2?
User | Count |
---|---|
107 | |
82 | |
70 | |
54 | |
40 |