Comment by njovin

11 hours ago

I've been through a handful of SOC2 audits and they've never asked us to _prove_ that we aren't storing passwords in plaintext or with reversible encryption (we weren't).

This is why so much of vetting & compliance is toothless. You can have robust change management, physical security, network security, identity management, etc. policies but absolutely nobody wants to spend enough on audit & enforcement to make them meaningful.

The gov't will make you _claim_ that you do all of these things before awarding a contract, but they won't ever check.

Good actors will do the right thing regardless because they know the consequences of cutting corners.