Skip to main content

💼 53 Wholesale access to sensitive data (e.g. contents of customer databases or intellectual property that can be exploited for personal gain) would be highly restricted to reduce the risk exposure to significant data leakage events. Industry experience of actual data leakage incidents include the unauthorised extraction of debit/credit card details, theft of personally identifiable information, loss of unencrypted backup media and the sale/trade or exploitation of customer identity data.

  • ID: /frameworks/apra-cpg-234/20/53

Description

Empty...

Similar

  • Internal
    • ID: dec-c-0b43da79

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (10)

PolicyLogic CountFlagsCompliance
🛡️ AWS EC2 Security Group allows unrestricted traffic to MongoDB🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS🟢1🟢 x6no data
🛡️ AWS RDS Instance is publicly accessible and in an unrestricted public subnet🟢1🟢 x6no data
🛡️ AWS S3 Bucket is not configured to block public access🟢1🟢 x6no data
🛡️ Azure Cosmos DB Account Virtual Network Filter is not enabled🟢1🟢 x6no data
🛡️ Azure Managed Disk Public Network Access is not disabled🟢1🟢 x6no data
🛡️ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP)🟢1🟢 x6no data
🛡️ Azure SQL Server Public Network Access is not disabled🟢1🟢 x6no data
🛡️ Azure Storage Account Allow Blob Anonymous Access is enabled🟢1🟢 x6no data
🛡️ Azure Storage Account Default Network Access Rule is not set to Deny🟢1🟢 x6no data

Internal Rules

RulePoliciesFlags
✉️ dec-x-4f30f24e1
✉️ dec-x-46a83a301
✉️ dec-x-0289e9c91
✉️ dec-x-083928f51
✉️ dec-x-637372481
✉️ dec-x-b17c005c1
✉️ dec-x-d127f4071
✉️ dec-x-ec547a7c1
✉️ dec-x-f937c35f1
✉️ dec-z-c82c9f971