| ๐ผ APRA CPG 234 โ ๐ผ 36f network design โ to ensure authorised network traffic flows and to reduce the impact of security compromises; | | 29 | 30 | | no data |
| ๐ผ APRA CPG 234 โ ๐ผ 45 An understanding of plausible worst case scenarios can help regulated entities identify and implement additional controls to prevent or reduce the impact of such scenarios. One example is malware that infects computers and encrypts data, both on the infected computer and any connected storage, including (corporate) networks and cloud storage. Such attacks reinforce the importance of protecting the backup environment in the event that the production environment is compromised. Common techniques to achieve this include network segmentation, highly restricted and segregated access controls and network traffic flow restrictions. | | 35 | 37 | | no data |
| ๐ผ AWS Foundational Security Best Practices v1.0.0 โ ๐ผ [EC2.19] Security groups should not allow unrestricted access to ports with high risk | | | 10 | | no data |
| ๐ผ CIS AWS v1.3.0 โ ๐ผ 5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports | | 1 | 1 | | no data |
| ๐ผ CIS AWS v1.4.0 โ ๐ผ 5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports | | 1 | 1 | | no data |
| ๐ผ CIS AWS v1.5.0 โ ๐ผ 5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports - Level 1 (Automated) | | 1 | 1 | | no data |
| ๐ผ CIS AWS v2.0.0 โ ๐ผ 5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports - Level 1 (Automated) | | 1 | 1 | | no data |
| ๐ผ CIS AWS v3.0.0 โ ๐ผ 5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports - Level 1 (Automated) | | 1 | 1 | | no data |
| ๐ผ CIS AWS v4.0.0 โ ๐ผ 5.3 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports (Automated) | | | 1 | | no data |
| ๐ผ CIS AWS v4.0.1 โ ๐ผ 5.3 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports (Automated) | | | 1 | | no data |
| ๐ผ CIS AWS v5.0.0 โ ๐ผ 5.3 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports (Automated) | | | 1 | | no data |
| ๐ผ CIS AWS v6.0.0 โ ๐ผ 6.3 Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports (Automated) | | | 1 | | no data |
| ๐ผ Cloudaware Framework โ ๐ผ Public and Anonymous Access | | | 101 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ AC-3 Access Enforcement (L)(M)(H) | | 37 | 68 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ AC-4 Information Flow Enforcement (M)(H) | 2 | 36 | 81 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ AC-4(21) Physical or Logical Separation of Information Flows (M)(H) | | 11 | 48 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ CM-2 Baseline Configuration (L)(M)(H) | 3 | 1 | 30 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ CM-2(2) Automation Support for Accuracy and Currency (M)(H) | | | 16 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ CM-7 Least Functionality (L)(M)(H) | 3 | 18 | 33 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ CM-7(1) Periodic Review (M)(H) | | 12 | 12 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ SC-7 Boundary Protection (L)(M)(H) | 10 | 8 | 50 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ SC-7(4) External Telecommunications Services (M)(H) | | | 28 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ SC-7(5) Deny by Default โ Allow by Exception (M)(H) | | | 18 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ SC-7(21) Isolation of System Components (H) | | | 24 | | no data |
| ๐ผ FedRAMP Low Security Controls โ ๐ผ AC-3 Access Enforcement (L)(M)(H) | | | 68 | | no data |
| ๐ผ FedRAMP Low Security Controls โ ๐ผ CM-2 Baseline Configuration (L)(M)(H) | | | 29 | | no data |
| ๐ผ FedRAMP Low Security Controls โ ๐ผ CM-7 Least Functionality (L)(M)(H) | | | 29 | | no data |
| ๐ผ FedRAMP Low Security Controls โ ๐ผ SC-7 Boundary Protection (L)(M)(H) | | | 35 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ AC-3 Access Enforcement (L)(M)(H) | | | 68 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ AC-4 Information Flow Enforcement (M)(H) | 1 | | 66 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ AC-4(21) Physical or Logical Separation of Information Flows (M)(H) | | | 48 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ CM-2 Baseline Configuration (L)(M)(H) | 3 | | 30 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ CM-2(2) Automation Support for Accuracy and Currency (M)(H) | | | 16 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ CM-7 Least Functionality (L)(M)(H) | 3 | | 33 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ CM-7(1) Periodic Review (M)(H) | | | 12 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ SC-7 Boundary Protection (L)(M)(H) | 7 | | 44 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ SC-7(4) External Telecommunications Services (M)(H) | | | 28 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ SC-7(5) Deny by Default โ Allow by Exception (M)(H) | | | 18 | | no data |
| ๐ผ ISO/IEC 27001:2013 โ ๐ผ A.9.1.2 Access to networks and network services | | 17 | 18 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.CM-1: The network is monitored to detect potential cybersecurity events | | 18 | 63 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed | | 18 | 24 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.DP-5: Detection processes are continuously improved | | 13 | 16 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ ID.AM-1: Physical devices and systems within the organization are inventoried | | | 3 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ ID.AM-2: Software platforms and applications within the organization are inventoried | | 5 | 7 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties | | 17 | 56 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation) | | 10 | 44 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition | | | 8 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.DS-5: Protections against data leaks are implemented | | 47 | 91 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality) | | 4 | 26 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.IP-7: Protection processes are improved | | | 2 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities | | 21 | 30 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.PT-4: Communications and control networks are protected | | 10 | 44 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.CM-01: Networks and network services are monitored to find potentially adverse events | | | 145 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events | | | 85 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.CM-06: External service provider activities and services are monitored to find potentially adverse events | | | 35 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events | | | 142 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.AM-01: Inventories of hardware managed by the organization are maintained | | | 4 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.AM-02: Inventories of software, services, and systems managed by the organization are maintained | | | 9 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.AM-03: Representations of the organization's authorized network communication and internal and external network data flows are maintained | | | 69 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.AM-08: Systems, hardware, software, services, and data are managed throughout their life cycles | | | 25 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities | | | 41 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties | | | 116 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ PR.AA-06: Physical access to assets is managed, monitored, and enforced commensurate with risk | | | 44 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected | | | 148 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected | | | 125 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected | | | 142 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ PR.IR-01: Networks and environments are protected from unauthorized logical access and usage | | | 95 | | no data |
| ๐ผ NIST SP 800-53 Revision 4 โ ๐ผ CM-7 (1) PERIODIC REVIEW | | 3 | 4 | | no data |
| ๐ผ NIST SP 800-53 Revision 4 โ ๐ผ CM-7 LEAST FUNCTIONALITY | 5 | 6 | 7 | | no data |
| ๐ผ NIST SP 800-53 Revision 4 โ ๐ผ CM-8 INFORMATION SYSTEM COMPONENT INVENTORY | 9 | 1 | 2 | | no data |
| ๐ผ NIST SP 800-53 Revision 4 โ ๐ผ PL-2 SYSTEM SECURITY PLAN | 3 | 1 | 2 | | no data |
| ๐ผ NIST SP 800-53 Revision 4 โ ๐ผ SC-7 BOUNDARY PROTECTION | 23 | 5 | 31 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ AC-4 Information Flow Enforcement | 32 | 68 | 91 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ AC-4(21) Information Flow Enforcement _ Physical or Logical Separation of Information Flows | | 37 | 48 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ CA-9(1) Internal System Connections _ Compliance Checks | | | 25 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ CM-2 Baseline Configuration | 7 | | 29 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ CM-2(2) Baseline Configuration _ Automation Support for Accuracy and Currency | | | 16 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ CM-7 Least Functionality | 9 | | 23 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ SC-7 Boundary Protection | 29 | 4 | 52 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ SC-7(4) Boundary Protection _ External Telecommunications Services | | | 28 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ SC-7(5) Boundary Protection _ Deny by Default โ Allow by Exception | | 4 | 18 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ SC-7(11) Boundary Protection _ Restrict Incoming Communications Traffic | | | 24 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ SC-7(16) Boundary Protection _ Prevent Discovery of System Components | | | 25 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ SC-7(21) Boundary Protection _ Isolation of System Components | | | 24 | | no data |
| ๐ผ PCI DSS v3.2.1 โ ๐ผ 1.1 Establish and implement firewall and router configuration standards | 7 | 1 | 39 | | no data |
| ๐ผ PCI DSS v3.2.1 โ ๐ผ 1.1.6 Documentation of business justification and approval for use of all services, protocols, and ports allowed, including documentation of security features implemented for those protocols considered to be insecure. | | 1 | 27 | | no data |
| ๐ผ PCI DSS v4.0.1 โ ๐ผ 1.2.1 Configuration standards for NSC rulesets are defined, implemented, maintained. | | | 34 | | no data |
| ๐ผ PCI DSS v4.0.1 โ ๐ผ 1.2.5 All services, protocols, and ports allowed are identified, approved, and have a defined business need. | | | 27 | | no data |
| ๐ผ PCI DSS v4.0.1 โ ๐ผ 1.2.6 Security features are defined and implemented for all services, protocols, and ports that are in use and considered to be insecure, such that the risk is mitigated. | | | 27 | | no data |
| ๐ผ PCI DSS v4.0 โ ๐ผ 1.2.1 Configuration standards for NSC rulesets are defined, implemented, maintained. | | 24 | 34 | | no data |
| ๐ผ PCI DSS v4.0 โ ๐ผ 1.2.5 All services, protocols, and ports allowed are identified, approved, and have a defined business need. | | 15 | 27 | | no data |
| ๐ผ PCI DSS v4.0 โ ๐ผ 1.2.6 Security features are defined and implemented for all services, protocols, and ports that are in use and considered to be insecure, such that the risk is mitigated. | | 6 | 27 | | no data |
| ๐ผ SOC 2 โ ๐ผ CC6.1-3 Restricts Logical Access | | 1 | 22 | | no data |
| ๐ผ SOC 2 โ ๐ผ CC6.1-7 Restricts Access to Information Assets | | 13 | 27 | | no data |
| ๐ผ UK Cyber Essentials โ ๐ผ 1.2 Prevent access to the administrative interface from the internet | | 36 | 38 | | no data |