πΌ NIST SP 800-53 Revision 5 β πΌ AC-3 Access Enforcement | 15 | 4 | 17 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-3(7) Access Enforcement _ Role-based Access Control | | | 7 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-4 Information Flow Enforcement | 32 | 61 | 73 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-4(21) Information Flow Enforcement _ Physical or Logical Separation of Information Flows | | 35 | 39 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-6 Least Privilege | 10 | 21 | 26 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-21 Information Sharing | 2 | | 2 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7 Boundary Protection | 29 | 5 | 33 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(3) Boundary Protection _ Access Points | | | 2 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(4) Boundary Protection _ External Telecommunications Services | | | 17 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(9) Boundary Protection _ Restrict Threatening Outgoing Communications Traffic | | | 7 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(11) Boundary Protection _ Restrict Incoming Communications Traffic | | | 15 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(16) Boundary Protection _ Prevent Discovery of System Components | | | 16 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(20) Boundary Protection _ Dynamic Isolation and Segregation | | | 2 | |
πΌ NIST SP 800-53 Revision 5 β πΌ SC-7(21) Boundary Protection _ Isolation of System Components | | | 16 | |
πΌ PCI DSS v3.2.1 β πΌ 1.2.1 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic. | | 10 | 14 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3.1 Implement a DMZ to limit inbound traffic to only system components that provide authorized publicly accessible services, protocols, and ports. | | 7 | 8 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3.2 Limit inbound Internet traffic to IP addresses within the DMZ. | | | 8 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3.4 Do not allow unauthorized outbound traffic from the cardholder data environment to the Internet. | | | 4 | |
πΌ PCI DSS v3.2.1 β πΌ 1.3.6 Place system components that store cardholder data in an internal network zone, segregated from the DMZ and other untrusted networks. | | | 3 | |