Skip to main content

💼 52d appropriate segmentation of data, based on sensitivity and access needs;

  • ID: /frameworks/apra-cpg-234/20/52/d

Description

Empty...

Similar

  • Internal
    • ID: dec-c-883b5d12

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (10)

PolicyLogic CountFlagsCompliance
🛡️ AWS EC2 Security Group allows unrestricted traffic to MongoDB🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS🟢1🟢 x6no data
🛡️ AWS RDS Instance is publicly accessible and in an unrestricted public subnet🟢1🟢 x6no data
🛡️ AWS S3 Bucket is not configured to block public access🟢1🟢 x6no data
🛡️ Azure Cosmos DB Account Virtual Network Filter is not enabled🟢1🟢 x6no data
🛡️ Azure Managed Disk Public Network Access is not disabled🟢1🟢 x6no data
🛡️ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP)🟢1🟢 x6no data
🛡️ Azure SQL Server Public Network Access is not disabled🟢1🟢 x6no data
🛡️ Azure Storage Account Allow Blob Anonymous Access is enabled🟢1🟢 x6no data
🛡️ Azure Storage Account Default Network Access Rule is not set to Deny🟢1🟢 x6no data

Internal Rules

RulePoliciesFlags
✉️ dec-x-4f30f24e1
✉️ dec-x-46a83a301
✉️ dec-x-0289e9c91
✉️ dec-x-083928f51
✉️ dec-x-637372481
✉️ dec-x-b17c005c1
✉️ dec-x-d127f4071
✉️ dec-x-ec547a7c1
✉️ dec-x-f937c35f1
✉️ dec-z-c82c9f971