| πΌ APRA CPG 234 β πΌ 1 Identity and access management controls would ideally ensure access to information assets is only granted where a valid business need exists, and only for as long as access is required. Access is typically granted to users, special purpose system accounts, and information assets such as services and other software. | | 3 | 3 | | no data |
| πΌ APRA CPG 234 β πΌ 4 Regulated entities would typically put in place processes to ensure that identities and credentials are issued, managed, verified, revoked and audited for authorised devices, users and software/processes. | | 8 | 8 | | no data |
| πΌ APRA CPG 234 β πΌ 16c information security operations and administration; | | 4 | 4 | | no data |
| πΌ APRA CPG 234 β πΌ 45 An understanding of plausible worst case scenarios can help regulated entities identify and implement additional controls to prevent or reduce the impact of such scenarios. One example is malware that infects computers and encrypts data, both on the infected computer and any connected storage, including (corporate) networks and cloud storage. Such attacks reinforce the importance of protecting the backup environment in the event that the production environment is compromised. Common techniques to achieve this include network segmentation, highly restricted and segregated access controls and network traffic flow restrictions. | | 35 | 37 | | no data |
| πΌ APRA CPG 234 β πΌ 47c segregation of duty controls which prevent personnel from deploying their own software changes to production; | | 5 | 5 | | no data |
| πΌ APRA CPG 234 β πΌ b. access to, and configuration of, information assets is restricted to the minimum required to achieve business objectives. This is typically referred to as the principle of βleast privilegeβ and aims to reduce the number of attack vectors that can be used to compromise information security; | | 3 | 3 | | no data |
| πΌ APRA CPG 234 β πΌ h. segregation of duties is enforced through appropriate allocation of roles and responsibilities. This reduces the potential for the actions of a single individual to compromise information security; | | 3 | 3 | | no data |
| πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [IAM.2] IAM users should not have IAM policies attached | | 1 | 1 | | no data |
| πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [IAM.21] IAM customer managed policies that you create should not allow wildcard actions for services | | | 1 | | no data |
| πΌ AWS Well-Architected β πΌ COST02-BP04 Implement groups and roles | | | 3 | | no data |
| πΌ AWS Well-Architected β πΌ SEC03-BP01 Define access requirements | | | 1 | | no data |
| πΌ CIS AWS v1.2.0 β πΌ 1.16 Ensure IAM policies are attached only to groups or roles | | 1 | 1 | | no data |
| πΌ CIS AWS v1.3.0 β πΌ 1.15 Ensure IAM Users Receive Permissions Only Through Groups | | 1 | 1 | | no data |
| πΌ CIS AWS v1.4.0 β πΌ 1.15 Ensure IAM Users Receive Permissions Only Through Groups | | 1 | 1 | | no data |
| πΌ CIS AWS v1.5.0 β πΌ 1.15 Ensure IAM Users Receive Permissions Only Through Groups - Level 1 (Automated) | | 1 | 1 | | no data |
| πΌ CIS AWS v2.0.0 β πΌ 1.15 Ensure IAM Users Receive Permissions Only Through Groups - Level 1 (Automated) | | 1 | 1 | | no data |
| πΌ CIS AWS v3.0.0 β πΌ 1.15 Ensure IAM Users Receive Permissions Only Through Groups - Level 1 (Automated) | | 1 | 1 | | no data |
| πΌ CIS AWS v4.0.0 β πΌ 1.15 Ensure IAM users receive permissions only through groups (Automated) | | | 1 | | no data |
| πΌ CIS AWS v4.0.1 β πΌ 1.15 Ensure IAM users receive permissions only through groups (Automated) | | | 1 | | no data |
| πΌ CIS AWS v5.0.0 β πΌ 1.14 Ensure IAM users receive permissions only through groups (Automated) | | | 1 | | no data |
| πΌ CIS AWS v6.0.0 β πΌ 2.14 Ensure IAM users receive permissions only through groups (Automated) | | | 1 | | no data |
| πΌ Cloudaware Framework β πΌ User Account Management | | | 19 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-2 Account Management (L)(M)(H) | 10 | 8 | 51 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-2(1) Automated System Account Management (M)(H) | | | 26 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-2(7) Privileged User Accounts (M)(H) | | 6 | 7 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-3 Access Enforcement (L)(M)(H) | | 37 | 84 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-5 Separation of Duties (M)(H) | | | 17 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-6 Least Privilege (M)(H) | 8 | 11 | 79 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-6(1) Authorize Access to Security Functions (M)(H) | | 4 | 4 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H) | | 1 | 6 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-6(3) Network Access to Privileged Commands (H) | | 1 | 2 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-6(7) Review of User Privileges (M)(H) | | 2 | 2 | | no data |
| πΌ FedRAMP High Security Controls β πΌ AC-6(10) Prohibit Non-privileged Users from Executing Privileged Functions (M)(H) | | 1 | 5 | | no data |
| πΌ FedRAMP High Security Controls β πΌ IA-5 Authenticator Management (L)(M)(H) | 6 | 14 | 37 | | no data |
| πΌ FedRAMP Low Security Controls β πΌ AC-2 Account Management (L)(M)(H) | | | 5 | | no data |
| πΌ FedRAMP Low Security Controls β πΌ AC-3 Access Enforcement (L)(M)(H) | | | 84 | | no data |
| πΌ FedRAMP Low Security Controls β πΌ IA-5 Authenticator Management (L)(M)(H) | 1 | | 37 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-2 Account Management (L)(M)(H) | 9 | | 51 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-2(1) Automated System Account Management (M)(H) | | | 26 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-2(7) Privileged User Accounts (M)(H) | | | 7 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-3 Access Enforcement (L)(M)(H) | | | 84 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-5 Separation of Duties (M)(H) | | | 17 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-6 Least Privilege (M)(H) | 6 | | 79 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-6(1) Authorize Access to Security Functions (M)(H) | | | 4 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-6(2) Non-privileged Access for Nonsecurity Functions (M)(H) | | | 6 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-6(7) Review of User Privileges (M)(H) | | | 2 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ AC-6(10) Prohibit Non-privileged Users from Executing Privileged Functions (M)(H) | | | 5 | | no data |
| πΌ FedRAMP Moderate Security Controls β πΌ IA-5 Authenticator Management (L)(M)(H) | 4 | | 37 | | no data |
| πΌ GDPR β πΌ Art. 25 Data protection by design and by default | | 10 | 10 | | no data |
| πΌ GDPR β πΌ Art. 32 Security of processing | | 5 | 5 | | no data |
| πΌ ISO/IEC 27001:2013 β πΌ A.9.2.2 User access provisioning | | 4 | 4 | | no data |
| πΌ ISO/IEC 27001:2022 β πΌ 5.3 Segregation of duties | | 2 | 2 | | no data |
| πΌ ISO/IEC 27001:2022 β πΌ 5.15 Access control | | 14 | 31 | | no data |
| πΌ ISO/IEC 27001:2022 β πΌ 5.18 Access rights | | 4 | 6 | | no data |
| πΌ ISO/IEC 27001:2022 β πΌ 8.2 Privileged access rights | | 7 | 10 | | no data |
| πΌ ISO/IEC 27001:2022 β πΌ 8.3 Information access restriction | | 10 | 24 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.CM-1: The network is monitored to detect potential cybersecurity events | | 18 | 63 | | no data |
| πΌ NIST CSF v1.1 β πΌ DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events | | 20 | 26 | | no data |
| πΌ NIST CSF v1.1 β πΌ PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes | | 19 | 34 | | no data |
| πΌ NIST CSF v1.1 β πΌ PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties | | 17 | 56 | | no data |
| πΌ NIST CSF v1.1 β πΌ PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions | | 4 | 13 | | no data |
| πΌ NIST CSF v1.1 β πΌ PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals' security and privacy risks and other organizational risks) | | 19 | 23 | | no data |
| πΌ NIST CSF v1.1 β πΌ PR.DS-5: Protections against data leaks are implemented | | 47 | 91 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.CM-01: Networks and network services are monitored to find potentially adverse events | | | 180 | | no data |
| πΌ NIST CSF v2.0 β πΌ DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events | | | 100 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.AA-01: Identities and credentials for authorized users, services, and hardware are managed by the organization | | | 43 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.AA-02: Identities are proofed and bound to credentials based on the context of interactions | | | 13 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.AA-03: Users, services, and hardware are authenticated | | | 53 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties | | | 133 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected | | | 187 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected | | | 160 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected | | | 184 | | no data |
| πΌ NIST CSF v2.0 β πΌ PR.IR-01: Networks and environments are protected from unauthorized logical access and usage | | | 123 | | no data |
| πΌ NIST SP 800-53 Revision 4 β πΌ AC-2 ACCOUNT MANAGEMENT | 13 | 3 | 6 | | no data |
| πΌ NIST SP 800-53 Revision 4 β πΌ AC-5 SEPARATION OF DUTIES | | 3 | 4 | | no data |
| πΌ NIST SP 800-53 Revision 4 β πΌ AC-6 LEAST PRIVILEGE | 10 | 2 | 7 | | no data |
| πΌ NIST SP 800-53 Revision 4 β πΌ IA-3 DEVICE IDENTIFICATION AND AUTHENTICATION | 4 | 1 | 1 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-2 Account Management | 13 | 20 | 50 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-2(1) Account Management _ Automated System Account Management | | 4 | 26 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-3 Access Enforcement | 15 | 5 | 59 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-3(7) Access Enforcement _ Role-based Access Control | | | 31 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-3(15) Access Enforcement _ Discretionary and Mandatory Access Control | | | 21 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-5 Separation of Duties | | | 17 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-6 Least Privilege | 10 | 23 | 72 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-6(1) Least Privilege _ Authorize Access to Security Functions | | 2 | 2 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-6(2) Least Privilege _ Non-privileged Access for Nonsecurity Functions | | 4 | 6 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-6(3) Least Privilege _ Network Access to Privileged Commands | | | 2 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-6(10) Least Privilege _ Prohibit Non-privileged Users from Executing Privileged Functions | | | 4 | | no data |
| πΌ NIST SP 800-53 Revision 5 β πΌ AU-9(4) Protection of Audit Information _ Access by Subset of Privileged Users | | 2 | 2 | | no data |
| πΌ PCI DSS v3.2.1 β πΌ 7.2.1 Coverage of all system components. | | | 11 | | no data |
| πΌ PCI DSS v4.0.1 β πΌ 7.3.1 An access control system(s) is in place that restricts access based on a user's need to know and covers all system components. | | | 11 | | no data |
| πΌ PCI DSS v4.0 β πΌ 7.3.1 An access control system(s) is in place that restricts access based on a user's need to know and covers all system components. | | | 11 | | no data |
| πΌ SOC 2 β πΌ CC6.1-4 Identifies and Authenticates Users | | 4 | 6 | | no data |