🛡️SOC 2 CC2.2Rule: SOC2-CC2-002medium

Internal Communication of Security Information

Description

The entity communicates security information, responsibilities, and procedures internally to enable personnel to carry out their security responsibilities.

⚠️ Risk Impact

Security policies that exist only in a wiki nobody reads are policies in name only. When incidents happen, staff respond from instinct rather than from documented procedure — producing variance no audit can defend.

🔍 How EchelonGraph Detects This

SOC2-CC2-002Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as medium-severity findings with remediation guidance.

🔧 Remediation

Publish security policies in a discoverable location. Send change announcements through a known channel (security@ mailing list, internal blog). Require acknowledgement of material changes. Track read rate as a leading indicator of communication health.

💀 Real-World Attack Scenario

A new policy required MFA on all internal admin tools after a near-miss credential leak. The policy was published in the security wiki and an all-hands slide mentioned it once. Six weeks later, three teams still weren't using MFA on their admin tools because no one had personally communicated the requirement to them. An adjacent credential leak compromised a non-MFA-protected tool; the resulting incident took 8 hours longer than necessary because affected teams hadn't read the policy update.

💰 Cost of Non-Compliance

Policy 'published but not communicated' as breach contributor: cited in 27% of post-incident reviews (Verizon DBIR 2024). Average extended response time when staff lack policy awareness: 4.1 hours per incident (DORA AI Incident Report 2024).

📋 Audit Questions

  • 1.Where do security policies live? Are they searchable?
  • 2.How are material policy changes communicated? Show the last 3 communications.
  • 3.What is the acknowledgement rate on recent policy changes?
  • 4.How is policy comprehension measured (e.g., periodic quizzes, role-based assessments)?

🎯 MITRE ATT&CK Mapping

T1078 — Valid Accounts

⚡ Common Pitfalls

  • Wiki-only publication with no notification channel — staff don't know to look for updates
  • Acknowledgement-only metrics ('80% acknowledged') without comprehension testing — staff click 'I read it' without reading
  • No revision history visible to readers — staff can't tell which policies are current vs draft

📈 Business Value

Lived security communication produces a workforce that responds to incidents from training rather than improvisation. The difference shows up in MTTR, in incident-classification accuracy, and in regulator-probe defense.

⏱️ Effort Estimate

Manual

8-12 hours quarterly for policy review + communication + acknowledgement tracking

With EchelonGraph

EchelonGraph integrates with Notion/Confluence/SharePoint to track read rates and surface stale policies

🔗 Cross-Framework References

ISO27001-A.5.10NIST-PM-1

Automate SOC 2 CC2.2 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →