Scoping Sheet - SOC-v2
Scoping Sheet - SOC-v2
Customer Name :
Bussiness Type :
Contact Details :
# Pre questionnaire
6 Bandwidth up/down
7 Number of Desktops
8 Number of Laptops
14 Number of Switches
15 Number of Routers
Are you using antivirus, EPP or EDR? If yes, please mention the name of the
17
brand and license type.
18 List of Operating Systems on Computers
How is the network currently being monitored? 3rd party externally or with
22
internal software. Please be specific with your response.
Are you capturing & storing logs now for monitroing or complaince? If yes,
25
please specify log method, storage location(s) and retention policy.
35 What is your current Patching solution and how often do you patch?
Are you subject to any regulatory requirements, i.e., PCI, HIPAA, CJIS,
36
DFARS/CMMC etc.?
37 Do you have an active and practiced Incident Response Plan?
40 Have you identified how unauthorized disclosure of your data may occur?
41 Do you store and work with customer PII (Private Identifiable Information)?
What are the log sources that you plan to ingest and average daily ingestion
42
volume for the same?
What is the time frequency of unique fraud vectors that you encounter in
43
your organization?
What apps are allowed in the envoirment to upload the data (i.e Microsoft
2
OneDrive , Google Drive,iCloud etc.)?
Log retention
period Total Number Total EPS Total EPS
(in days) of Devices per day
180 0 0 0
Details
Details
Total Storage
Average Event Storage per Requirement
Size (in KB) Day (in GB) (in GB)
0 0 0
SOC services Questionnaire
Customer Name :
Bussiness Type :
Contact Details :
# Pre questionnaire
1 Detailed Asset Inventory
a. How many laptops are currently in use within your organization?
b. How many desktop computers do you have?
c. Are these endpoints centralized in one location or distributed across multiple sites?
d. What operating systems are these endpoints running (e.g., Windows, macOS, Linux)?
e. How many servers do you operate?
f. What are the roles of these servers (e.g., application servers, database servers, file servers)?
g. What operating systems are installed on these servers?
h. Are your servers hosted on-premises, in the cloud, or both?
i. How many network devices (e.g., routers, switches, firewalls) are part of your infrastructure?
j. What brands and models are these devices?
k. How are these network devices configured in terms of access control and security settings?
l. What critical applications are in use (e.g., CRM, ERP, custom financial applications)?
m. Are these applications web-based, client-server, or a mix of both?
n. What are the primary functions of these applications?
o. How are these applications integrated with your other systems?
3 Cloud Services
a. What cloud platforms are you using (e.g., AWS, Azure, Google Cloud)?
b. What services are you utilizing on these platforms (e.g., IaaS, PaaS, SaaS)?
c. What are the security controls in place for your cloud environments?
4 Remote Access
a. How do employees access your network remotely?
b What types of VPN or other secure access technologies are in use?
c Are there any policies in place regarding remote work and device security?
5 User Access Management
a. How is user access to systems and applications managed?
b. How many user accounts are there, and what are their privilege levels?
c. Are there regular audits of user access rights?
11 Cybersecurity Insurance
a. Do you maintain cybersecurity insurance? What does it cover?
12 Security Risks
a. What do you perceive as your major security risks?
b. Have you identified specific scenarios for unauthorized data disclosure?
180 0 0 0 0
Details
or your staff?
of coverage.
Total
Storage per Storage
Day (in GB) Requireme
nt (in GB)
0 0