logoalt Hacker News

kube-systemyesterday at 8:29 PM0 repliesview on HN

SOC2 requires an audit. But one of the weaknesses of SOC2 is that the audit mostly checks to determine that you are following whatever your policy is. It doesn't verify that your policy is rigorous.