cc6.6-5-001

CC6.6 · D5 · f1

D5
Difficulty
4
Gaps
0
Red Herrings
28%
Avg Score

Task

You are a SOC 2 auditor evaluating Apex Fintech's system boundary controls for the Q4 2025 observation period (October 1 — December 31, 2025). Review the boundary policy, network architecture documentation, penetration test report, and API gateway access logs. Assess whether CC6.6 requirements for system boundary definition and protection are met. Identify any gaps, considering materiality, compensating controls, and the overall effectiveness of the boundary architecture.

Evidence

Findings

IDTypeSeverityFinding
F-001gapmediumAdmin API bypasses defined system boundary controls
The boundary policy (APXF-SEC-POL-009 Section 3.2) states 'No production service shall be directly accessible from the public internet without traversing the WAF and API Gateway.' The admin API endpoi...
F-002gaplowPenetration test staleness for Q4 observation period
The most recent penetration test was conducted July 14-25, 2025 (Q3). The policy requires quarterly penetration testing. The pentest report notes 'next assessment: Q4 2025 — Scheduled for October 2025...
F-003gapmediumNo centralized mTLS certificate inventory or validation evidence
The boundary policy (Section 3.3) requires mTLS for all service-to-service communication with 90-day certificate rotation via HashiCorp Vault. The network topology document confirms mTLS is configured...
F-004gaplowMateriality of traffic bypassing API Gateway boundary
Access logs show 0.3% of total production traffic (~12,500 requests/day) bypasses the API Gateway boundary by hitting the admin API directly. While all admin API traffic originates from the VPN CIDR r...

Results

ModelProviderScoreRecallPrec.F1GapsReported
Sonnet 4.6Anthropic55%75%43%55%3/47
Opus 4.7Anthropic33%50%25%33%2/48
GPT-5.5OpenAI15%25%11%15%1/49
GPT-4.1OpenAI20%25%17%20%1/46
Haiku 4.5Anthropic27%75%17%27%3/418
GPT-4oOpenAI20%25%17%20%1/46