cc6.1-3-001

CC6.1 · D3 · detection_and_precision

D3
Difficulty
9
Gaps
0
Red Herrings
89%
Avg Score

Task

You are conducting a SOC 2 Type II readiness assessment for Meridian Cloud Systems, covering the observation period Q4 2025 (October 1 – December 31, 2025). Review all provided evidence artifacts and assess the organization's compliance with CC6.1 (Logical Access Security). Cross-reference documents to identify inconsistencies between stated policy and actual implementation. Identify all gaps, control deficiencies, and audit findings.

Evidence

Findings

IDTypeSeverityFinding
F-001gapcriticalStale unowned service account with active credentials (jenkins-legacy)
The 'jenkins-legacy' IAM user has an active access key (last rotated July 2023, over 2 years ago) but was last used in August 2024. The service account inventory shows it is 'Unassigned' with no owner...
F-002gaphighKey rotation violation on legacy-monitoring service account
The 'legacy-monitoring' IAM user has an access key last rotated on March 10, 2024 — over 9 months ago. Policy Section 4.3 requires automatic rotation every 90 days via AWS Secrets Manager. The key is ...
F-003gaphighDirect IAM console user violates SSO-only policy (david.kim)
The IAM user 'david.kim' has console password enabled and MFA active, but policy Section 3.3 explicitly states 'Direct IAM user accounts in AWS are prohibited for human users' — all human access must ...
F-004gaphighTermination SLA breach — Tom Bradley Okta disabled 7 days late
Tom Bradley (EMP-2341) was terminated on December 20 but HR notification was not sent until December 23 (3-day delay) and Okta was not disabled until December 27 (7 days after termination). Policy Sec...
F-005gapmediumTermination SLA breach — Priya Sharma Okta disabled 3 days late
Priya Sharma (EMP-2287) terminated November 22 but HR notification was delayed to November 24 (2 days) and Okta was not disabled until November 25 (3 days after termination). While less severe than To...
F-006gaphighOkta default sign-on policy does not require MFA
The Okta sign-on policy has a Default Policy (priority 3) with 'requireFactor': false. Any application not explicitly listed in the 'Production Systems' or 'Corporate Apps' policies will fall through ...
F-007gapmediumOkta access review completed late with unresolved flagged users
The Okta (IdP) access review (AR-2025-Q4-008) was initiated December 1 but not completed until January 8, 2026 — 23 business days, exceeding the 15-business-day SLA in policy Section 5.1. Additionally...
F-008gapmediumbackup-s3-sync has two active access keys with stale rotation
The 'backup-s3-sync' IAM user has two active access keys. Access key 2 was last rotated on January 15, 2024 — nearly 2 years ago — yet both keys were used on the same day (Dec 28, 2025). Having two ac...
F-009gaphighDirect IAM users excluded from quarterly access review scope
The quarterly access review covers 'AWS Console (SSO)' but the IAM credential report shows direct IAM users (david.kim, service accounts) that exist outside of SSO. The access review scope does not in...

Results

ModelProviderScoreRecallPrec.F1GapsReported
Sonnet 4.6Anthropic100%100%82%90%9/911
Opus 4.7Anthropic88%100%53%69%9/917
GPT-5.5OpenAI79%100%47%64%9/919
GPT-4.1OpenAI89%89%100%94%8/98
Haiku 4.5Anthropic100%100%64%78%9/914
GPT-4oOpenAI78%78%88%82%7/98