Full description not available
T**L
Not formatted properly, wordy, repetitive
The table of contents is unusable and the book is not formatted properly. For the cost of this book this doesn’t seem acceptable. The information may be required for SOC 2 however it is repetitive and not a clear plan of action. I think it could be condensed considerably. Also I work on cybersecurity and I am not seeing clear alignment with top problems that cause security breaches. I think the legal issues such as what to do in case of disagreement could be separated from the technical controls that actually stop breaches and those controls could be presented in a more measurable way or referenced more explicitly if not part of this book. That being said, if you need to be SOC 2 compliant this seems to be from the official source so you may need this book. It serves that purpose.
J**S
Excellent, fairly easy to read guide
Very well organized with important examples.
Trustpilot
1 month ago
2 weeks ago