🛡️SOC 2 CC2.1Rule: SOC2-CC2-001medium

Quality Information for Internal Control

Description

The entity obtains or generates relevant, accurate, and timely information to support the functioning of security controls and management oversight.

⚠️ Risk Impact

Decisions made on stale, inaccurate, or incomplete security telemetry produce stale, inaccurate, or incomplete responses. Auditors test whether the data feeding security decisions is itself trustworthy.

🔍 How EchelonGraph Detects This

SOC2-CC2-001Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as medium-severity findings with remediation guidance.

🔧 Remediation

Maintain a single source of truth for asset inventory, finding severity, and control state. Document data quality metrics: freshness (max staleness), completeness (% scope covered), accuracy (verified vs estimated). Surface these in the security dashboard the team actually uses.

💀 Real-World Attack Scenario

An engineering team relied on a CSV asset inventory exported monthly from the CMDB. By the time security reviewed the September inventory, the team had spun up 47 new GCP projects and decommissioned 12 — none reflected in the data. A breach in one of the new projects went undetected for 6 weeks because security was watching the wrong list.

💰 Cost of Non-Compliance

Stale inventory as breach detection delay factor: typical 2-6× longer dwell time when asset visibility lags by >30 days (Mandiant M-Trends 2024). Average cost per day of dwell time: $8,200 (IBM Cost of Breach 2024).

📋 Audit Questions

  • 1.What is the maximum staleness of your asset inventory? Show the timestamp on the live data.
  • 2.How is inventory completeness measured? What's the most recent coverage gap?
  • 3.How do you reconcile inventory across cloud providers?
  • 4.When was the last drift between inventory and reality detected?

🎯 MITRE ATT&CK Mapping

T1538 — Cloud Service Discovery

⚡ Common Pitfalls

  • Asset inventory updated via manual CSV export — useful as a snapshot, dangerous as a source of truth
  • Multiple inventories that don't agree (CMDB says 200 assets, security tool says 320, billing says 410) — each team builds on different assumptions
  • Measuring asset count but not freshness or completeness — '200 assets' looks complete until you check the timestamp

📈 Business Value

Live, reconciled asset inventory is the foundation every other security control rests on. Without it, every other CC criterion (CC3, CC4, CC6, CC7) operates on assumptions rather than evidence. Pays back via fewer false-positive incidents and faster real-incident triage.

⏱️ Effort Estimate

Manual

20-40 hours for inventory reconciliation pipeline + weekly drift checks

With EchelonGraph

EchelonGraph runs continuous discovery + reconciliation across AWS/GCP/Azure with <30 second drift detection

🔗 Cross-Framework References

ISO27001-A.5.10NIST-PM-9

Automate SOC 2 CC2.1 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →