πΌ APRA CPG 234 β πΌ 36d access management controls βonly authorised users, software and hardware are able to access information assets (refer to Attachment B for further guidance); | | 13 | 13 | |
πΌ APRA CPG 234 β πΌ 36e hardware and software asset controls βappropriate authorisation to prevent security compromises from unauthorised hardware and software assets; | | 15 | 15 | |
πΌ APRA CPG 234 β πΌ 36f network design β to ensure authorised network traffic flows and to reduce the impact of security compromises; | | 28 | 29 | |
πΌ APRA CPG 234 β πΌ 45 An understanding of plausible worst case scenarios can help regulated entities identify and implement additional controls to prevent or reduce the impact of such scenarios. One example is malware that infects computers and encrypts data, both on the infected computer and any connected storage, including (corporate) networks and cloud storage. Such attacks reinforce the importance of protecting the backup environment in the event that the production environment is compromised. Common techniques to achieve this include network segmentation, highly restricted and segregated access controls and network traffic flow restrictions. | | 34 | 36 | |
πΌ APRA CPG 234 β πΌ 52d appropriate segmentation of data, based on sensitivity and access needs; | | 10 | 10 | |
πΌ APRA CPG 234 β πΌ 53 Wholesale access to sensitive data (e.g. contents of customer databases or intellectual property that can be exploited for personal gain) would be highly restricted to reduce the risk exposure to significant data leakage events. Industry experience of actual data leakage incidents include the unauthorised extraction of debit/credit card details, theft of personally identifiable information, loss of unencrypted backup media and the sale/trade or exploitation of customer identity data. | | 10 | 10 | |
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [RDS.2] RDS DB Instances should prohibit public access, as determined by the PubliclyAccessible configuration | | 1 | 1 | |
πΌ CIS AWS v1.5.0 β πΌ 2.3.3 Ensure that public access is not given to RDS Instance - Level 1 (Automated) | | 1 | 1 | |
πΌ CIS AWS v2.0.0 β πΌ 2.3.3 Ensure that public access is not given to RDS Instance - Level 1 (Automated) | | 1 | 1 | |
πΌ CIS AWS v3.0.0 β πΌ 2.3.3 Ensure that public access is not given to RDS Instance - Level 1 (Automated) | | 1 | 1 | |
πΌ CIS AWS v4.0.0 β πΌ 2.2.3 Ensure that RDS instances are not publicly accessible (Automated) | | | 1 | |
πΌ CIS AWS v4.0.1 β πΌ 2.2.3 Ensure that RDS instances are not publicly accessible (Automated) | | | 1 | |
πΌ CIS AWS v5.0.0 β πΌ 2.2.3 Ensure that RDS instances are not publicly accessible (Automated) | | | 1 | |
πΌ Cloudaware Framework β πΌ Public and Anonymous Access | | | 24 | |
πΌ FedRAMP High Security Controls β πΌ AC-3 Access Enforcement (L)(M)(H) | | 37 | 47 | |
πΌ FedRAMP High Security Controls β πΌ AC-4 Information Flow Enforcement (M)(H) | 2 | 31 | 65 | |
πΌ FedRAMP High Security Controls β πΌ AC-4(21) Physical or Logical Separation of Information Flows (M)(H) | | 11 | 39 | |
πΌ FedRAMP High Security Controls β πΌ SC-7 Boundary Protection (L)(M)(H) | 10 | 6 | 33 | |
πΌ FedRAMP High Security Controls β πΌ SC-7(4) External Telecommunications Services (M)(H) | | | 17 | |
πΌ FedRAMP High Security Controls β πΌ SC-7(5) Deny by Default β Allow by Exception (M)(H) | | | 19 | |
πΌ FedRAMP High Security Controls β πΌ SC-7(21) Isolation of System Components (H) | | | 16 | |
πΌ FedRAMP Low Security Controls β πΌ AC-3 Access Enforcement (L)(M)(H) | | | 47 | |
πΌ FedRAMP Low Security Controls β πΌ SC-7 Boundary Protection (L)(M)(H) | | | 23 | |
πΌ FedRAMP Moderate Security Controls β πΌ AC-3 Access Enforcement (L)(M)(H) | | | 47 | |
πΌ FedRAMP Moderate Security Controls β πΌ AC-4 Information Flow Enforcement (M)(H) | 1 | | 51 | |
πΌ FedRAMP Moderate Security Controls β πΌ AC-4(21) Physical or Logical Separation of Information Flows (M)(H) | | | 39 | |
πΌ FedRAMP Moderate Security Controls β πΌ SC-7 Boundary Protection (L)(M)(H) | 7 | | 29 | |
πΌ FedRAMP Moderate Security Controls β πΌ SC-7(4) External Telecommunications Services (M)(H) | | | 17 | |
πΌ FedRAMP Moderate Security Controls β πΌ SC-7(5) Deny by Default β Allow by Exception (M)(H) | | | 19 | |
πΌ GDPR β πΌ Art. 25 Data protection by design and by default | | 10 | 10 | |
πΌ GDPR β πΌ Art. 46 Transfers subject to appropriate safeguards | | 2 | 2 | |
πΌ ISO/IEC 27001:2013 β πΌ A.9.4.1 Information access restriction | | 19 | 20 | |
πΌ ISO/IEC 27001:2022 β πΌ 5.10 Acceptable use of information and other associated assets | | 11 | 14 | |
πΌ ISO/IEC 27001:2022 β πΌ 5.15 Access control | | 14 | 16 | |
πΌ ISO/IEC 27001:2022 β πΌ 8.3 Information access restriction | | 10 | 11 | |
πΌ ISO/IEC 27001:2022 β πΌ 8.4 Access to source code | | 8 | 9 | |
πΌ NIST CSF v1.1 β πΌ PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties | | 17 | 35 | |
πΌ NIST CSF v1.1 β πΌ PR.DS-5: Protections against data leaks are implemented | | 43 | 51 | |
πΌ NIST CSF v2.0 β πΌ DE.CM-01: Networks and network services are monitored to find potentially adverse events | | | 83 | |
πΌ NIST CSF v2.0 β πΌ DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events | | | 89 | |
πΌ NIST CSF v2.0 β πΌ ID.AM-03: Representations of the organization's authorized network communication and internal and external network data flows are maintained | | | 31 | |
πΌ NIST CSF v2.0 β πΌ PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties | | | 58 | |
πΌ NIST CSF v2.0 β πΌ PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected | | | 82 | |
πΌ NIST CSF v2.0 β πΌ PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected | | | 69 | |
πΌ NIST CSF v2.0 β πΌ PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected | | | 67 | |
πΌ NIST CSF v2.0 β πΌ PR.IR-01: Networks and environments are protected from unauthorized logical access and usage | | | 40 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-4 Information Flow Enforcement | 32 | 61 | 73 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-4(15) Information Flow Enforcement _ Detection of Unsanctioned Information | | 7 | 8 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-4(21) Information Flow Enforcement _ Physical or Logical Separation of Information Flows | | 35 | 39 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7 Boundary Protection | 29 | 5 | 33 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(4) Boundary Protection _ External Telecommunications Services | | | 17 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(5) Boundary Protection _ Deny by Default β Allow by Exception | | 5 | 19 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(11) Boundary Protection _ Restrict Incoming Communications Traffic | | | 15 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(16) Boundary Protection _ Prevent Discovery of System Components | | | 16 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(21) Boundary Protection _ Isolation of System Components | | | 16 | |
πΌ PCI DSS v3.2.1 β πΌ 1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic. | | 10 | 14 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment. | 7 | 9 | 11 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3.1 Implement a DMZ to limit inbound traffic to only system components that provide authorized publicly accessible services, protocols, and ports. | | 7 | 8 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3.2 Limit inbound Internet traffic to IP addresses within the DMZ. | | | 8 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3.4 Do not allow unauthorized outbound traffic from the cardholder data environment to the Internet. | | | 4 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3.5 Permit only βestablishedβ connections into the network. | | | 8 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3.6 Place system components that store cardholder data in an internal network zone, segregated from the DMZ and other untrusted networks. | | | 3 | |
πΌ PCI DSS v3.2.1 β πΌ 7.2.1 Coverage of all system components. | | | 5 | |
πΌ PCI DSS v4.0.1 β πΌ 1.3.1 Inbound traffic to the CDE is restricted. | | | 14 | |
πΌ PCI DSS v4.0.1 β πΌ 1.3.2 Outbound traffic from the CDE is restricted. | | | 14 | |
πΌ PCI DSS v4.0.1 β πΌ 1.4.1 NSCs are implemented between trusted and untrusted networks. | | | 10 | |
πΌ PCI DSS v4.0.1 β πΌ 1.4.2 Inbound traffic from untrusted networks to trusted networks is restricted. | | | 8 | |
πΌ PCI DSS v4.0.1 β πΌ 1.4.4 System components that store cardholder data are not directly accessible from untrusted networks. | | | 3 | |
πΌ PCI DSS v4.0.1 β πΌ 7.3.1 An access control system(s) is in place that restricts access based on a user's need to know and covers all system components. | | | 5 | |
πΌ PCI DSS v4.0 β πΌ 1.3.1 Inbound traffic to the CDE is restricted. | | | 14 | |
πΌ PCI DSS v4.0 β πΌ 1.3.2 Outbound traffic from the CDE is restricted. | | | 14 | |
πΌ PCI DSS v4.0 β πΌ 1.4.1 NSCs are implemented between trusted and untrusted networks. | | | 10 | |
πΌ PCI DSS v4.0 β πΌ 1.4.2 Inbound traffic from untrusted networks to trusted networks is restricted. | | | 8 | |
πΌ PCI DSS v4.0 β πΌ 1.4.4 System components that store cardholder data are not directly accessible from untrusted networks. | | | 3 | |
πΌ PCI DSS v4.0 β πΌ 7.3.1 An access control system(s) is in place that restricts access based on a user's need to know and covers all system components. | | | 5 | |
πΌ UK Cyber Essentials β πΌ 1.2 Prevent access to the administrative interface from the internet | | 35 | 37 | |