Skip to main content

💼 1 Identity and access management controls would ideally ensure access to information assets is only granted where a valid business need exists, and only for as long as access is required. Access is typically granted to users, special purpose system accounts, and information assets such as services and other software.

  • ID: /frameworks/apra-cpg-234/c/1

Description

Empty...

Similar

  • Internal
    • ID: dec-c-f430a199

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (3)

PolicyLogic CountFlagsCompliance
🛡️ AWS EC2 Instance IAM role is not attached🟢1🟢 x6no data
🛡️ AWS IAM User has inline or directly attached policies🟢1🟠 x1, 🟢 x5no data
🛡️ Azure Key Vault Role Based Access Control is not enabled🟢1🟢 x6no data

Internal Rules

RulePoliciesFlags
✉️ dec-x-6c93750d1
✉️ dec-x-4157c58a1
✉️ dec-x-c80414561