Skip to main content

💼 40 An important aspect of information asset life-cycle management involves minimising vulnerabilities and maintaining support. Information security exposures could arise from hardware and software which is outdated or has limited or no support (whether through a third party, a related party or in-house). Technology that is end-of-life5 , out-of-support or in extended support is typically less secure by design, has a dated security model and can take longer, or is unable, to be updated to address new threats.

  • ID: /frameworks/apra-cpg-234/15/40

Description

Empty...

Similar

  • Internal
    • ID: dec-c-f5fc5d30

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (7)

PolicyLogic CountFlagsCompliance
🛡️ AWS DMS Replication Instance Auto Minor Version Upgrade is not enabled🟢1🟢 x6no data
🛡️ AWS ECR Repository Lifecycle Policy is not configured🟢1🟢 x6no data
🛡️ AWS RDS Instance Auto Minor Version Upgrade is not enabled🟠🟢1🟠 x1, 🟢 x6no data
🛡️ Azure App Service does not run the latest HTTP version🟢1🟢 x6no data
🛡️ Azure App Service does not run the latest Java version🟢⚪🟢 x2, ⚪ x1no data
🛡️ Azure App Service does not run the latest PHP version🟢⚪🟢 x2, ⚪ x1no data
🛡️ Azure App Service does not run the latest Python version🟢⚪🟢 x2, ⚪ x1no data

Internal Rules

RulePoliciesFlags
✉️ dec-x-0d66ed991
✉️ dec-x-9a0607d91
✉️ dec-x-879aa9961
✉️ dec-x-215302da1
✉️ dec-x-345591b31
✉️ dec-x-a20e54a01
✉️ dec-x-f82b98491