| πΌ APRA CPG 234 β πΌ 67a network and user profiling that establishes a baseline of normal activity which, when combined with logging and alerting mechanisms, can enable detection of anomalous activity; | | 19 | 22 | | no data |
| πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [CloudTrail.4] CloudTrail log file validation should be enabled | | 1 | 1 | | no data |
| πΌ CIS AWS v1.2.0 β πΌ 2.2 Ensure CloudTrail log file validation is enabled | | 1 | 1 | | no data |
| πΌ CIS AWS v1.3.0 β πΌ 3.2 Ensure CloudTrail log file validation is enabled | | 1 | 1 | | no data |
| πΌ CIS AWS v1.4.0 β πΌ 3.2 Ensure CloudTrail log file validation is enabled | | 1 | 1 | | no data |
| πΌ CIS AWS v1.5.0 β πΌ 3.2 Ensure CloudTrail log file validation is enabled - Level 2 (Automated) | | 1 | 1 | | no data |
| πΌ CIS AWS v2.0.0 β πΌ 3.2 Ensure CloudTrail log file validation is enabled - Level 2 (Automated) | | 1 | 1 | | no data |
| πΌ CIS AWS v3.0.0 β πΌ 3.2 Ensure CloudTrail log file validation is enabled - Level 2 (Automated) | | 1 | 1 | | no data |
| πΌ CIS AWS v4.0.0 β πΌ 3.2 Ensure CloudTrail log file validation is enabled (Automated) | | | 1 | | no data |
| πΌ CIS AWS v4.0.1 β πΌ 3.2 Ensure CloudTrail log file validation is enabled (Automated) | | | 1 | | no data |
| πΌ CIS AWS v5.0.0 β πΌ 3.2 Ensure CloudTrail log file validation is enabled (Automated) | | | 1 | | no data |
| πΌ CIS AWS v6.0.0 β πΌ 4.2 Ensure CloudTrail log file validation is enabled (Automated) | | | 1 | | no data |
| πΌ Cloudaware Framework β πΌ Logging and Monitoring Configuration | | | 60 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-3 Access Enforcement (L)(M)(H) | | 37 | 67 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AU-6(1) Automated Process Integration (M)(H) | | | 3 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AU-7(1) Automatic Processing (M)(H) | | | 1 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AU-9 Protection of Audit Information (L)(M)(H) | 3 | 8 | 10 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AU-11 Audit Record Retention (L)(M)(H) | | 16 | 18 | | no data |
| πΌ FedRAMP High Security Controls β πΌ CM-5(1) Automated Access Enforcement and Audit Records (M)(H) | | 7 | 8 | | no data |
| πΌ FedRAMP High Security Controls β πΌ CP-9 System Backup (L)(M)(H) | 5 | 4 | 8 | | no data |
| πΌ FedRAMP High Security Controls β πΌ SI-4 System Monitoring (L)(M)(H) | 14 | 50 | 56 | | no data |
| πΌ FedRAMP High Security Controls β πΌ SI-4(4) Inbound and Outbound Communications Traffic (M)(H) | | 6 | 8 | | no data |
| πΌ FedRAMP High Security Controls β πΌ SI-7(1) Integrity Checks (M)(H) | | | 1 | | no data |
| πΌ FedRAMP High Security Controls β πΌ SI-7(7) Integration of Detection and Response (M)(H) | | | 1 | | no data |
| πΌ FedRAMP Low Security Controls β πΌ AC-3 Access Enforcement (L)(M)(H) | | | 67 | | no data |
| πΌ FedRAMP Low Security Controls β πΌ AU-9 Protection of Audit Information (L)(M)(H) | | | 10 | | no data |
| πΌ FedRAMP Low Security Controls β πΌ AU-11 Audit Record Retention (L)(M)(H) | | | 18 | | no data |
| πΌ FedRAMP Low Security Controls β πΌ CP-9 System Backup (L)(M)(H) | | | 7 | | no data |
| πΌ FedRAMP Low Security Controls β πΌ SI-4 System Monitoring (L)(M)(H) | | | 8 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-3 Access Enforcement (L)(M)(H) | | | 67 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AU-6(1) Automated Process Integration (M)(H) | | | 3 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AU-7(1) Automatic Processing (M)(H) | | | 1 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AU-9 Protection of Audit Information (L)(M)(H) | 1 | | 10 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AU-11 Audit Record Retention (L)(M)(H) | | | 18 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ CM-5(1) Automated Access Enforcement and Audit Records (M)(H) | | | 8 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ CP-9 System Backup (L)(M)(H) | 2 | | 8 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ SI-4 System Monitoring (L)(M)(H) | 7 | | 9 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ SI-4(4) Inbound and Outbound Communications Traffic (M)(H) | | | 8 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ SI-7(1) Integrity Checks (M)(H) | | | 1 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ SI-7(7) Integration of Detection and Response (M)(H) | | | 1 | | no data |
| πΌ GDPR β πΌ Art. 25 Data protection by design and by default | | 10 | 10 | | no data |
| πΌ GDPR β πΌ Art. 32 Security of processing | | 5 | 5 | | no data |
| πΌ ISO/IEC 27001:2013 β πΌ A.12.4.2 Protection of log information | | 1 | 2 | | no data |
| πΌ ISO/IEC 27001:2013 β πΌ A.12.4.3 Administrator and operator logs | | 7 | 8 | | no data |
| πΌ ISO/IEC 27001:2013 β πΌ A.18.1.3 Protection of records | | 1 | 3 | | no data |
| πΌ ISO/IEC 27001:2022 β πΌ 5.25 Assessment and decision on information security events | | 1 | 3 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed | | 10 | 14 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.AE-2: Detected events are analyzed to understand attack targets and methods | | 18 | 23 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.AE-3: Event data are collected and correlated from multiple sources and sensors | | 18 | 37 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.AE-4: Impact of events is determined | | 13 | 13 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.CM-1: The network is monitored to detect potential cybersecurity events | | 18 | 41 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events | | 20 | 26 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.CM-5: Unauthorized mobile code is detected | | 11 | 11 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events | | 6 | 6 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed | | 18 | 23 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.DP-2: Detection activities comply with all applicable requirements | | 6 | 6 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.DP-3: Detection processes are tested | | 13 | 13 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.DP-4: Event detection information is communicated | | 29 | 32 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.DP-5: Detection processes are continuously improved | | 13 | 15 | | no data |
| πΌ NIST CSF v1.1 β πΌ ID.GV-3: Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed | | 1 | 3 | | no data |
| πΌ NIST CSF v1.1 β πΌ ID.RA-1: Asset vulnerabilities are identified and documented | | 13 | 15 | | no data |
| πΌ NIST CSF v1.1 β πΌ PR.IP-4: Backups of information are conducted, maintained, and tested | | 4 | 7 | | no data |
| πΌ NIST CSF v1.1 β πΌ PR.IP-8: Effectiveness of protection technologies is shared | | 6 | 6 | | no data |
| πΌ NIST CSF v1.1 β πΌ PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy | | 16 | 32 | | no data |
| πΌ NIST CSF v1.1 β πΌ RS.AN-1: Notifications from detection systems are investigated | | 18 | 23 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.AE-02: Potentially adverse events are analyzed to better understand associated activities | | | 33 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.AE-03: Information is correlated from multiple sources | | | 48 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.AE-04: The estimated impact and scope of adverse events are understood | | | 13 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.AE-06: Information on adverse events is provided to authorized staff and tools | | | 32 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.AE-07: Cyber threat intelligence and other contextual information are integrated into the analysis | | | 37 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.CM-01: Networks and network services are monitored to find potentially adverse events | | | 120 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events | | | 83 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.CM-06: External service provider activities and services are monitored to find potentially adverse events | | | 33 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events | | | 139 | | no data |
| πΌ NIST CSF v2.0 β πΌ GV.OC-03: Legal, regulatory, and contractual requirements regarding cybersecurity - including privacy and civil liberties obligations - are understood and managed | | | 6 | | no data |
| πΌ NIST CSF v2.0 β πΌ ID.AM-03: Representations of the organization's authorized network communication and internal and external network data flows are maintained | | | 48 | | no data |
| πΌ NIST CSF v2.0 β πΌ ID.IM-01: Improvements are identified from evaluations | | | 25 | | no data |
| πΌ NIST CSF v2.0 β πΌ ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties | | | 38 | | no data |
| πΌ NIST CSF v2.0 β πΌ ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities | | | 39 | | no data |
| πΌ NIST CSF v2.0 β πΌ ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded | | | 29 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected | | | 118 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected | | | 98 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected | | | 112 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.DS-11: Backups of data are created, protected, maintained, and tested | | | 9 | | no data |
| πΌ NIST CSF v2.0 β πΌ RS.MA-02: Incident reports are triaged and validated | | | 24 | | no data |
| πΌ NIST SP 800-53 Revision 4 β πΌ AU-10 NON-REPUDIATION | 5 | 1 | 1 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AU-6(1) Audit Record Review, Analysis, and Reporting _ Automated Process Integration | | 1 | 3 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AU-7(1) Audit Record Reduction and Report Generation _ Automatic Processing | | 1 | 1 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AU-9 Protection of Audit Information | 7 | 2 | 4 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ SI-4 System Monitoring | 25 | 1 | 10 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ SI-7(1) Software, Firmware, and Information Integrity _ Integrity Checks | | | 1 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ SI-7(3) Software, Firmware, and Information Integrity _ Centrally Managed Integrity Tools | | | 1 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ SI-7(7) Software, Firmware, and Information Integrity _ Integration of Detection and Response | | | 1 | | no data |
| πΌ PCI DSS v3.2.1 β πΌ 10.5 Secure audit trails so they cannot be altered. | 5 | 1 | 5 | | no data |
| πΌ PCI DSS v3.2.1 β πΌ 10.5.2 Protect audit trail files from unauthorized modifications. | | 1 | 4 | | no data |
| πΌ PCI DSS v3.2.1 β πΌ 10.5.5 Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts. | | 1 | 2 | | no data |
| πΌ PCI DSS v4.0.1 β πΌ 10.3.2 Audit log files are protected to prevent modifications by individuals. | | | 4 | | no data |
| πΌ PCI DSS v4.0.1 β πΌ 10.3.4 File integrity monitoring or change-detection mechanisms is used on audit logs to ensure that existing log data cannot be changed without generating alerts. | | | 2 | | no data |
| πΌ PCI DSS v4.0 β πΌ 10.3.2 Audit log files are protected to prevent modifications by individuals. | | 2 | 4 | | no data |
| πΌ PCI DSS v4.0 β πΌ 10.3.4 File integrity monitoring or change-detection mechanisms is used on audit logs to ensure that existing log data cannot be changed without generating alerts. | | 2 | 2 | | no data |
| πΌ SOC 2 β πΌ CC4.2-3 Monitors Corrective Action | | 6 | 6 | | no data |
| πΌ SOC 2 β πΌ CC5.2-3 Establishes Relevant Security Management Process Controls Activities | | 15 | 35 | | no data |
| πΌ SOC 2 β πΌ CC7.1-2 Monitors Infrastructure and Software | | 8 | 11 | | no data |