SOC 2
14 analysesTrust Services Criteria, SOC 2 Type I and II, control design, evidence collection, auditor handoffs.
Browse all SOC 2 analyses →Practitioner-depth analysis on the frameworks private-sector security and compliance leaders actually defend in audits. Written from inside the practice, not summarized from outside it.
Trust Services Criteria, SOC 2 Type I and II, control design, evidence collection, auditor handoffs.
Browse all SOC 2 analyses →NIST AI RMF, EU AI Act, ISO 42001, agentic AI risk, model cards, AI incident response.
NIST CSF, vulnerability management, incident response, security event escalation, tabletop exercises.
Compliance-as-code, continuous monitoring, third-party risk, control automation patterns.
CSPM, the shared responsibility model, IaC compliance, cloud control planes.
See also: HIPAA (maintenance only, 32 published analyses).
One compliance analysis per week from Josef Kamara, CPA, CISSP, CISA. Federal and private compliance, written for practitioners.