| πΌ APRA CPG 234 β πΌ 16f information security reporting and analytics; |  | 9 | 11 |  | no data | 
| πΌ APRA CPG 234 β πΌ 36j monitoring controls β for timely detection of compromises to information security; |  | 9 | 11 |  | no data | 
| πΌ APRA CPG 234 β πΌ 67a network and user profiling that establishes a baseline of normal activity which, when combined with logging and alerting mechanisms, can enable detection of anomalous activity; |  | 19 | 22 |  | no data | 
| πΌ APRA CPG 234 β πΌ e. use of, and access to, information assets is attributable to an individual, hardware or software, and activity logged and monitored; |  | 2 | 2 |  | no data | 
| πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [EC2.6] VPC flow logging should be enabled in all VPCs |  | 1 | 1 |  | no data | 
| πΌ CIS AWS v1.2.0 β πΌ 2.9 Ensure VPC flow logging is enabled in all VPCs |  | 1 | 1 |  | no data | 
| πΌ CIS AWS v1.3.0 β πΌ 3.9 Ensure VPC flow logging is enabled in all VPCs |  | 1 | 1 |  | no data | 
| πΌ CIS AWS v1.4.0 β πΌ 3.9 Ensure VPC flow logging is enabled in all VPCs |  | 1 | 1 |  | no data | 
| πΌ CIS AWS v1.5.0 β πΌ 3.9 Ensure VPC flow logging is enabled in all VPCs - Level 2 (Automated) |  | 1 | 1 |  | no data | 
| πΌ CIS AWS v2.0.0 β πΌ 3.9 Ensure VPC flow logging is enabled in all VPCs - Level 2 (Automated) |  | 1 | 1 |  | no data | 
| πΌ CIS AWS v3.0.0 β πΌ 3.7 Ensure VPC flow logging is enabled in all VPCs - Level 2 (Automated) |  | 1 | 1 |  | no data | 
| πΌ CIS AWS v4.0.0 β πΌ 3.7 Ensure VPC flow logging is enabled in all VPCs (Automated) |  |  | 1 |  | no data | 
| πΌ CIS AWS v4.0.1 β πΌ 3.7 Ensure VPC flow logging is enabled in all VPCs (Automated) |  |  | 1 |  | no data | 
| πΌ CIS AWS v5.0.0 β πΌ 3.7 Ensure VPC flow logging is enabled in all VPCs (Automated) |  |  | 1 |  | no data | 
| πΌ CIS AWS v6.0.0 β πΌ 4.7 Ensure VPC flow logging is enabled in all VPCs (Automated) |  |  | 1 |  | no data | 
| πΌ Cloudaware Framework β πΌ Logging and Monitoring Configuration |  |  | 65 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ AC-6(9) Log Use of Privileged Functions (M)(H) |  | 7 | 26 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ AU-2 Event Logging (L)(M)(H) |  |  | 17 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ AU-3 Content of Audit Records (L)(M)(H) | 1 |  | 28 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ AU-6 Audit Record Review, Analysis, and Reporting (L)(M)(H) | 6 | 20 | 32 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ AU-6(3) Correlate Audit Record Repositories (M)(H) |  |  | 8 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ AU-6(4) Central Review and Analysis (H) |  |  | 8 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ AU-11 Audit Record Retention (L)(M)(H) |  | 16 | 18 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ AU-12 Audit Record Generation (L)(M)(H) | 2 |  | 65 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ CA-7 Continuous Monitoring (L)(M)(H) | 2 |  | 13 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ CM-3 Configuration Change Control (M)(H) | 4 |  | 25 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ SI-4(1) System-wide Intrusion Detection System (M)(H) |  | 1 | 2 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ SI-4(4) Inbound and Outbound Communications Traffic (M)(H) |  | 6 | 8 |  | no data | 
| πΌ FedRAMP High Security Controls β πΌ SI-4(20) Privileged Users (H) |  | 48 | 51 |  | no data | 
| πΌ FedRAMP Low Security Controls β πΌ AU-2 Event Logging (L)(M)(H) |  |  | 17 |  | no data | 
| πΌ FedRAMP Low Security Controls β πΌ AU-3 Content of Audit Records (L)(M)(H) |  |  | 14 |  | no data | 
| πΌ FedRAMP Low Security Controls β πΌ AU-6 Audit Record Review, Analysis, and Reporting (L)(M)(H) |  |  | 24 |  | no data | 
| πΌ FedRAMP Low Security Controls β πΌ AU-11 Audit Record Retention (L)(M)(H) |  |  | 18 |  | no data | 
| πΌ FedRAMP Low Security Controls β πΌ AU-12 Audit Record Generation (L)(M)(H) |  |  | 65 |  | no data | 
| πΌ FedRAMP Low Security Controls β πΌ CA-7 Continuous Monitoring (L)(M)(H) | 1 |  | 13 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ AC-6(9) Log Use of Privileged Functions (M)(H) |  |  | 26 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ AU-2 Event Logging (L)(M)(H) |  |  | 17 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ AU-3 Content of Audit Records (L)(M)(H) | 1 |  | 28 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ AU-6 Audit Record Review, Analysis, and Reporting (L)(M)(H) | 2 |  | 32 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ AU-6(3) Correlate Audit Record Repositories (M)(H) |  |  | 8 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ AU-11 Audit Record Retention (L)(M)(H) |  |  | 18 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ AU-12 Audit Record Generation (L)(M)(H) |  |  | 65 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ CA-7 Continuous Monitoring (L)(M)(H) | 2 |  | 13 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ CM-3 Configuration Change Control (M)(H) | 2 |  | 19 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ SI-4(1) System-wide Intrusion Detection System (M)(H) |  |  | 2 |  | no data | 
| πΌ FedRAMP Moderate Security Controls β πΌ SI-4(4) Inbound and Outbound Communications Traffic (M)(H) |  |  | 8 |  | no data | 
| πΌ ISO/IEC 27001:2013 β πΌ A.12.4.1 Event logging |  | 15 | 18 |  | no data | 
| πΌ ISO/IEC 27001:2022 β πΌ 8.15 Logging |  | 18 | 34 |  | no data | 
| πΌ ISO/IEC 27001:2022 β πΌ 8.16 Monitoring activities |  | 4 | 5 |  | no data | 
| πΌ ISO/IEC 27001:2022 β πΌ 8.20 Networks security |  | 5 | 14 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ DE.AE-2: Detected events are analyzed to understand attack targets and methods |  | 18 | 24 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ DE.AE-3: Event data are collected and correlated from multiple sources and sensors |  | 18 | 38 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ DE.CM-1: The network is monitored to detect potential cybersecurity events |  | 18 | 63 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events |  | 20 | 26 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed |  | 18 | 24 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ DE.DP-4: Event detection information is communicated |  | 29 | 33 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations |  | 15 | 19 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy |  | 16 | 33 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ RS.AN-1: Notifications from detection systems are investigated |  | 18 | 24 |  | no data | 
| πΌ NIST CSF v1.1 β πΌ RS.CO-2: Incidents are reported consistent with established criteria |  | 19 | 22 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ DE.AE-02: Potentially adverse events are analyzed to better understand associated activities |  |  | 35 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ DE.AE-03: Information is correlated from multiple sources |  |  | 50 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ DE.AE-06: Information on adverse events is provided to authorized staff and tools |  |  | 33 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ DE.AE-07: Cyber threat intelligence and other contextual information are integrated into the analysis |  |  | 38 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ DE.CM-01: Networks and network services are monitored to find potentially adverse events |  |  | 145 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ DE.CM-02: The physical environment is monitored to find potentially adverse events |  |  | 13 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events |  |  | 85 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ DE.CM-06: External service provider activities and services are monitored to find potentially adverse events |  |  | 35 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events |  |  | 142 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ GV.SC-07: The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship |  |  | 26 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ ID.IM-01: Improvements are identified from evaluations |  |  | 26 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties |  |  | 40 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities |  |  | 41 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded |  |  | 31 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ ID.RA-07: Changes and exceptions are managed, assessed for risk impact, recorded, and tracked |  |  | 31 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ ID.RA-10: Critical suppliers are assessed prior to acquisition |  |  | 26 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ RC.CO-04: Public updates on incident recovery are shared using approved methods and messaging |  |  | 22 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ RS.CO-02: Internal and external stakeholders are notified of incidents |  |  | 31 |  | no data | 
| πΌ NIST CSF v2.0 β πΌ RS.MA-02: Incident reports are triaged and validated |  |  | 25 |  | no data | 
| πΌ NIST SP 800-53 Revision 4 β πΌ AU-2 AUDIT EVENTS | 4 | 3 | 4 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-4(26) Information Flow Enforcement _ Audit Filtering Actions |  |  | 9 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ AC-6(9) Least Privilege _ Log Use of Privileged Functions |  | 17 | 19 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ AU-2 Event Logging | 4 |  | 17 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ AU-3 Content of Audit Records | 3 | 13 | 28 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ AU-6(3) Audit Record Review, Analysis, and Reporting _ Correlate Audit Record Repositories |  |  | 8 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ AU-6(4) Audit Record Review, Analysis, and Reporting _ Central Review and Analysis |  |  | 8 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ AU-12 Audit Record Generation | 4 | 47 | 65 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ CA-7 Continuous Monitoring | 6 |  | 13 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ CM-3 Configuration Change Control | 8 | 17 | 25 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ SI-4(4) System Monitoring _ Inbound and Outbound Communications Traffic |  | 1 | 2 |  | no data | 
| πΌ NIST SP 800-53 Revision 5 β πΌ SI-7(8) Software, Firmware, and Information Integrity _ Auditing Capability for Significant Events |  |  | 8 |  | no data | 
| πΌ PCI DSS v3.2.1 β πΌ 10.3.3 Date and time. |  |  | 1 |  | no data | 
| πΌ PCI DSS v3.2.1 β πΌ 10.3.4 Success or failure indication. |  |  | 1 |  | no data | 
| πΌ PCI DSS v3.2.1 β πΌ 10.3.5 Origination of event. |  |  | 1 |  | no data | 
| πΌ PCI DSS v3.2.1 β πΌ 10.3.6 Identity or name of affected data, system component, or resource. |  |  | 1 |  | no data | 
| πΌ PCI DSS v3.2.1 β πΌ 11.4 Use intrusion-detection and/or intrusion-prevention techniques to detect  and/or prevent intrusions into the network. |  | 1 | 13 |  | no data | 
| πΌ PCI DSS v4.0.1 β πΌ 11.5.1 Intrusion-detection and/or intrusion-prevention techniques are used to  detect and/or prevent intrusions into the network. | 1 |  | 13 |  | no data | 
| πΌ PCI DSS v4.0.1 β πΌ 11.5.1.1 Intrusion-detection and/or intrusion-prevention techniques detect,  alert on/prevent, and address covert malware communication channels. |  |  | 13 |  | no data | 
| πΌ PCI DSS v4.0.1 β πΌ 11.6.1 A change- and tamper-detection mechanism is deployed. |  |  | 13 |  | no data | 
| πΌ PCI DSS v4.0 β πΌ 11.5.1 Intrusion-detection and/or intrusion-prevention techniques are used to  detect and/or prevent intrusions into the network. | 1 | 8 | 13 |  | no data | 
| πΌ PCI DSS v4.0 β πΌ 11.5.1.1 Intrusion-detection and/or intrusion-prevention techniques detect,  alert on/prevent, and address covert malware communication channels. |  | 8 | 13 |  | no data | 
| πΌ PCI DSS v4.0 β πΌ 11.6.1 A change- and tamper-detection mechanism is deployed. |  |  | 13 |  | no data | 
| πΌ SOC 2 β πΌ CC6.1-5 Considers Network Segmentation |  | 1 | 1 |  | no data |