Skip to main content

💼 52d appropriate segmentation of data, based on sensitivity and access needs;

Description

Empty...

Similar

  • Internal
    • ID: dec-c-883b5d12

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (10)

PolicyLogic CountFlags
📝 AWS EC2 Security Group allows unrestricted traffic to MongoDB 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS 🟢1🟢 x6
📝 AWS RDS Instance is publicly accessible and in an unrestricted public subnet 🟢1🟢 x6
📝 AWS S3 Bucket is not configured to block public access 🟢1🟢 x6
📝 Azure Cosmos DB Account Virtual Network Filter is not enabled 🟢1🟢 x6
📝 Azure Managed Disk Public Network Access is not disabled 🟢1🟢 x6
📝 Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP) 🟢1🟢 x6
📝 Azure SQL Server Public Network Access is not disabled 🟢1🟢 x6
📝 Azure Storage Account Allow Blob Anonymous Access is enabled 🟢1🟢 x6
📝 Azure Storage Account Default Network Access Rule is not set to Deny 🟢1🟢 x6

Internal Rules

RulePoliciesFlags
✉️ dec-x-4f30f24e1
✉️ dec-x-46a83a301
✉️ dec-x-0289e9c91
✉️ dec-x-083928f51
✉️ dec-x-637372481
✉️ dec-x-b17c005c1
✉️ dec-x-d127f4071
✉️ dec-x-ec547a7c1
✉️ dec-x-f937c35f1
✉️ dec-z-c82c9f971