| ๐ผ APRA CPG 234 โ ๐ผ 67a network and user profiling that establishes a baseline of normal activity which, when combined with logging and alerting mechanisms, can enable detection of anomalous activity; | | 19 | 22 | | no data |
| ๐ผ APRA CPG 234 โ ๐ผ h. audit logging and monitoring of access to information assets by all users; | | 8 | 9 | | no data |
| ๐ผ CIS Azure v1.1.0 โ ๐ผ 3.3 Ensure Storage logging is enabled for Queue service for read, write, and delete requests | | 1 | 1 | | no data |
| ๐ผ CIS Azure v1.3.0 โ ๐ผ 3.3 Ensure Storage logging is enabled for Queue service for read, write, and delete requests - Level 2 (Manual) | | 1 | 1 | | no data |
| ๐ผ CIS Azure v1.4.0 โ ๐ผ 3.3 Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests - Level 2 (Automated) | | 1 | 1 | | no data |
| ๐ผ CIS Azure v1.5.0 โ ๐ผ 3.5 Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests - Level 2 (Automated) | | 1 | 1 | | no data |
| ๐ผ CIS Azure v2.0.0 โ ๐ผ 3.5 Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests - Level 2 (Automated) | | 1 | 1 | | no data |
| ๐ผ CIS Azure v2.1.0 โ ๐ผ 3.5 Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests - Level 2 (Automated) | | 1 | 1 | | no data |
| ๐ผ CIS Azure v3.0.0 โ ๐ผ 4.12 Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests (Automated) | | | 1 | | no data |
| ๐ผ Cloudaware Framework โ ๐ผ Logging and Monitoring Configuration | | | 65 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ AC-2(4) Automated Audit Actions (M)(H) | | | 16 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ AC-6(9) Log Use of Privileged Functions (M)(H) | | 7 | 26 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ AU-3(1) Additional Audit Information (M)(H) | | | 14 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ AU-6 Audit Record Review, Analysis, and Reporting (L)(M)(H) | 6 | 20 | 32 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ AU-11 Audit Record Retention (L)(M)(H) | | 16 | 18 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ AU-12 Audit Record Generation (L)(M)(H) | 2 | | 65 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ CM-3 Configuration Change Control (M)(H) | 4 | | 25 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ SI-4 System Monitoring (L)(M)(H) | 14 | 50 | 56 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ SI-4(4) Inbound and Outbound Communications Traffic (M)(H) | | 6 | 8 | | no data |
| ๐ผ FedRAMP High Security Controls โ ๐ผ SI-4(20) Privileged Users (H) | | 48 | 51 | | no data |
| ๐ผ FedRAMP Low Security Controls โ ๐ผ AU-6 Audit Record Review, Analysis, and Reporting (L)(M)(H) | | | 24 | | no data |
| ๐ผ FedRAMP Low Security Controls โ ๐ผ AU-11 Audit Record Retention (L)(M)(H) | | | 18 | | no data |
| ๐ผ FedRAMP Low Security Controls โ ๐ผ AU-12 Audit Record Generation (L)(M)(H) | | | 65 | | no data |
| ๐ผ FedRAMP Low Security Controls โ ๐ผ SI-4 System Monitoring (L)(M)(H) | | | 8 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ AC-2(4) Automated Audit Actions (M)(H) | | | 16 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ AC-6(9) Log Use of Privileged Functions (M)(H) | | | 26 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ AU-3(1) Additional Audit Information (M)(H) | | | 14 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ AU-6 Audit Record Review, Analysis, and Reporting (L)(M)(H) | 2 | | 32 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ AU-11 Audit Record Retention (L)(M)(H) | | | 18 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ AU-12 Audit Record Generation (L)(M)(H) | | | 65 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ CM-3 Configuration Change Control (M)(H) | 2 | | 19 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ SI-4 System Monitoring (L)(M)(H) | 7 | | 10 | | no data |
| ๐ผ FedRAMP Moderate Security Controls โ ๐ผ SI-4(4) Inbound and Outbound Communications Traffic (M)(H) | | | 8 | | no data |
| ๐ผ ISO/IEC 27001:2013 โ ๐ผ A.12.4.1 Event logging | | 15 | 18 | | no data |
| ๐ผ ISO/IEC 27001:2022 โ ๐ผ 5.28 Collection of evidence | | 14 | 21 | | no data |
| ๐ผ ISO/IEC 27001:2022 โ ๐ผ 8.15 Logging | | 18 | 34 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed | | 10 | 34 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.AE-2: Detected events are analyzed to understand attack targets and methods | | 18 | 24 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.AE-3: Event data are collected and correlated from multiple sources and sensors | | 18 | 38 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.AE-4: Impact of events is determined | | 13 | 14 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.CM-1: The network is monitored to detect potential cybersecurity events | | 18 | 63 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events | | 20 | 26 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.CM-5: Unauthorized mobile code is detected | | 11 | 12 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events | | 6 | 7 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed | | 18 | 24 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.DP-2: Detection activities comply with all applicable requirements | | 6 | 7 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.DP-3: Detection processes are tested | | 13 | 14 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.DP-4: Event detection information is communicated | | 29 | 33 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ DE.DP-5: Detection processes are continuously improved | | 13 | 16 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ ID.RA-1: Asset vulnerabilities are identified and documented | | 13 | 16 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations | | 15 | 19 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.IP-8: Effectiveness of protection technologies is shared | | 6 | 7 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy | | 16 | 33 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ RS.AN-1: Notifications from detection systems are investigated | | 18 | 24 | | no data |
| ๐ผ NIST CSF v1.1 โ ๐ผ RS.CO-2: Incidents are reported consistent with established criteria | | 19 | 22 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.AE-02: Potentially adverse events are analyzed to better understand associated activities | | | 35 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.AE-03: Information is correlated from multiple sources | | | 50 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.AE-04: The estimated impact and scope of adverse events are understood | | | 14 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.AE-06: Information on adverse events is provided to authorized staff and tools | | | 33 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.AE-07: Cyber threat intelligence and other contextual information are integrated into the analysis | | | 38 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.CM-01: Networks and network services are monitored to find potentially adverse events | | | 145 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events | | | 85 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.CM-06: External service provider activities and services are monitored to find potentially adverse events | | | 35 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events | | | 142 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ GV.SC-07: The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship | | | 26 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.AM-03: Representations of the organization's authorized network communication and internal and external network data flows are maintained | | | 69 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties | | | 40 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities | | | 41 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded | | | 31 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.RA-07: Changes and exceptions are managed, assessed for risk impact, recorded, and tracked | | | 31 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ ID.RA-10: Critical suppliers are assessed prior to acquisition | | | 26 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ RC.CO-04: Public updates on incident recovery are shared using approved methods and messaging | | | 22 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ RS.CO-02: Internal and external stakeholders are notified of incidents | | | 31 | | no data |
| ๐ผ NIST CSF v2.0 โ ๐ผ RS.MA-02: Incident reports are triaged and validated | | | 25 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ AC-2(4) Account Management _ Automated Audit Actions | | 14 | 16 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ AC-6(9) Least Privilege _ Log Use of Privileged Functions | | 17 | 19 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ AU-3(1) Content of Audit Records _ Additional Audit Information | | 13 | 14 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ AU-12 Audit Record Generation | 4 | 47 | 65 | | no data |
| ๐ผ NIST SP 800-53 Revision 5 โ ๐ผ CM-3 Configuration Change Control | 8 | 17 | 25 | | no data |
| ๐ผ PCI DSS v3.2.1 โ ๐ผ 10.1 Implement audit trails to link all access to system components to each individual user. | | 4 | 7 | | no data |
| ๐ผ PCI DSS v3.2.1 โ ๐ผ 10.2.1 All individual user accesses to cardholder data. | | 4 | 14 | | no data |
| ๐ผ PCI DSS v3.2.1 โ ๐ผ 10.2.4 Invalid logical access attempts. | | 4 | 14 | | no data |
| ๐ผ PCI DSS v4.0.1 โ ๐ผ 10.2.1.1 Audit logs capture all individual user access to cardholder data. | | | 14 | | no data |
| ๐ผ PCI DSS v4.0.1 โ ๐ผ 10.2.1.4 Audit logs capture all invalid logical access attempts. | | | 14 | | no data |
| ๐ผ PCI DSS v4.0 โ ๐ผ 10.2.1.1 Audit logs capture all individual user access to cardholder data. | | 1 | 14 | | no data |
| ๐ผ PCI DSS v4.0 โ ๐ผ 10.2.1.4 Audit logs capture all invalid logical access attempts. | | 1 | 14 | | no data |
| ๐ผ SOC 2 โ ๐ผ CC4.2-3 Monitors Corrective Action | | 6 | 6 | | no data |