Quality Information for Internal Control
Description
The entity obtains or generates relevant, accurate, and timely information to support the functioning of security controls and management oversight.
⚠️ Risk Impact
Decisions made on stale, inaccurate, or incomplete security telemetry produce stale, inaccurate, or incomplete responses. Auditors test whether the data feeding security decisions is itself trustworthy.
🔍 How EchelonGraph Detects This
EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as medium-severity findings with remediation guidance.
🔧 Remediation
Maintain a single source of truth for asset inventory, finding severity, and control state. Document data quality metrics: freshness (max staleness), completeness (% scope covered), accuracy (verified vs estimated). Surface these in the security dashboard the team actually uses.
💀 Real-World Attack Scenario
An engineering team relied on a CSV asset inventory exported monthly from the CMDB. By the time security reviewed the September inventory, the team had spun up 47 new GCP projects and decommissioned 12 — none reflected in the data. A breach in one of the new projects went undetected for 6 weeks because security was watching the wrong list.
💰 Cost of Non-Compliance
Stale inventory as breach detection delay factor: typical 2-6× longer dwell time when asset visibility lags by >30 days (Mandiant M-Trends 2024). Average cost per day of dwell time: $8,200 (IBM Cost of Breach 2024).
📋 Audit Questions
- 1.What is the maximum staleness of your asset inventory? Show the timestamp on the live data.
- 2.How is inventory completeness measured? What's the most recent coverage gap?
- 3.How do you reconcile inventory across cloud providers?
- 4.When was the last drift between inventory and reality detected?
🎯 MITRE ATT&CK Mapping
⚡ Common Pitfalls
- ⛔Asset inventory updated via manual CSV export — useful as a snapshot, dangerous as a source of truth
- ⛔Multiple inventories that don't agree (CMDB says 200 assets, security tool says 320, billing says 410) — each team builds on different assumptions
- ⛔Measuring asset count but not freshness or completeness — '200 assets' looks complete until you check the timestamp
📈 Business Value
Live, reconciled asset inventory is the foundation every other security control rests on. Without it, every other CC criterion (CC3, CC4, CC6, CC7) operates on assumptions rather than evidence. Pays back via fewer false-positive incidents and faster real-incident triage.
⏱️ Effort Estimate
20-40 hours for inventory reconciliation pipeline + weekly drift checks
EchelonGraph runs continuous discovery + reconciliation across AWS/GCP/Azure with <30 second drift detection
🔗 Cross-Framework References
Automate SOC 2 CC2.1 compliance
EchelonGraph continuously monitors this control across all your cloud accounts.
Start Free →