Skip to main content
Skip table of contents

SOX-COSO – Requirements

The deliverables that demonstrate adherence to the COSO Framework principles are shown in the following table.

COSO Framework Principle

Deliverable

Control Environment

Integrity

SOX COSO: File Integrity Monitoring Activity

Control Environment

Operations

SOX COSO: Account Management Activity SOX COSO: Applications Accessed By User

SOX COSO: Audit Exceptions Event Summary (By User)

SOX COSO: Audit Exceptions Event Summary (By Impacted Host) SOX COSO: Log Volume (By Log Source)

SOX COSO: Log Volume (By Log Host) SOX COSO: Log Volume (By Entity) SOX COSO: Log Volume (By Day) SOX COSO: Log Volume

SOX COSO: System Critical And Error Conditions SOX COSO: System Startup And Shutdown

SOX COSO: Top Applications Experiencing Errors SOX COSO: Top Hosts Experiencing Errors

Risk Assessment

Managing Change

SOX COSO: Host Access Granted And Revoked SOX COSO: Policy Activity Summary

SOX COSO: Terminated Account Summary SOX COSO: File Integrity Monitoring Activity SOX COSO: Account Management Activity

Control Activities

Authorization and Role Management

SOX COSO: Account Management Activity SOX COSO: Host Access Granted And Revoked SOX COSO: User Object Access Summary  SOX COSO: Policy Activity Summary

Control Activities

Authentication

SOX COSO: Failed Host Access

SOX COSO: Failed Application Access SOX COSO: Failed File Access

SOX COSO: User Authentication Summary

Control Activities

Verification

SOX COSO: Audit Failures by User  SOX COSO: Audit Failures by Host  SOX COSO: Suspicious Activity by User SOX COSO: Suspicious Activity by Host SOX COSO: Top Suspicious Users

SOX COSO: Top Targeted Hosts

SOX COSO: Top Targeted Applications

Control Activities

Operating Performance

SOX COSO: System Critical And Error Conditions SOX COSO: Account Management Activity

SOX COSO: System Startup And Shutdown

Control Activities

Security of Assets

SOX COSO: Suspicious Activity by User SOX COSO: Suspicious Activity by Host SOX COSO: Top Attackers

SOX COSO: Top Suspicious Users SOX COSO: Top Targeted Hosts

SOX COSO: Top Targeted Applications SOX COSO: Malware Detected

SOX COSO: Attacks Detected

SOX COSO: Compromises Detected

SOX COSO: System Security Event Summary

SOX COSO: Security Event Summary (By Impacted Host) SOX COSO: Security Event Summary (By Origin Host)

SOX COSO: Security Event Summary (By Impacted Application)

Information and Communication

Reporting

SOX COSO: Account Management Activity SOX COSO: User Authentication Activity SOX COSO: User Object Access Activity SOX COSO: System Security Activity

SOX COSO: Policy Activity

Monitoring

Ongoing Monitoring

SOX COSO: File Integrity Monitoring Activity SOX COSO: Usage Auditing Activity Summary

SOX COSO: Usage Auditing Event Detail (By Date) SOX COSO: Usage Auditing Event Detail (By User) SOX COSO: Usage Auditing Event List

SOX COSO: Usage Auditing Logon & Logoff Events

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.