Skip to main content

πŸ’Ό AC-3 Access Enforcement (L)(M)(H)

  • Contextual name: πŸ’Ό AC-3 Access Enforcement (L)(M)(H)
  • ID: /frameworks/fedramp-high-security-controls/ac/03
  • Located in: πŸ’Ό Access Control

Description​

Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

Similar​

  • Sections
    • /frameworks/nist-sp-800-53-r5/ac/03
  • Internal
    • ID: dec-c-9b059ff2

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-3 Access Enforcement15417

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό AC-3 Access Enforcement (L)(M)(H)47
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό AC-3 Access Enforcement (L)(M)(H)47

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (47)​

PolicyLogic CountFlags
πŸ“ AWS Account IAM Access Analyzer is not enabled for all regions 🟒1🟒 x6
πŸ“ AWS Account Multi-Region CloudTrail is not enabled 🟒1🟒 x6
πŸ“ AWS Account Object-level CloudTrail Logging for Read Events for S3 Buckets is not enabled 🟒1🟒 x6
πŸ“ AWS Account Object-level CloudTrail Logging for Write Events for S3 Buckets is not enabled 🟒1🟒 x6
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6
πŸ“ AWS API Gateway API Route Authorization Type is not configured 🟒1🟒 x6
πŸ“ AWS CloudTrail Log File Validation is not enabled 🟒1🟒 x6
πŸ“ AWS EC2 Instance IAM role is not attached 🟒1🟒 x6
πŸ“ AWS EC2 Instance IMDSv2 is not enabled 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted DNS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted FTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted ICMP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted NetBIOS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted RPC traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted SMTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MSSQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MySQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to PostgreSQL 🟒1🟒 x6
πŸ“ AWS IAM Policy allows full administrative privileges 🟒1🟒 x6
πŸ“ AWS IAM User has inline or directly attached policies 🟒1🟠 x1, 🟒 x5
πŸ“ AWS IAM User with credentials unused for 45 days or more is not disabled 🟒1🟒 x6
πŸ“ AWS RDS Instance is publicly accessible and in an unrestricted public subnet 🟒1🟒 x6
πŸ“ AWS RDS Snapshot is publicly accessible 🟒1🟒 x6
πŸ“ AWS S3 Bucket is not configured to block public access 🟒1🟒 x6
πŸ“ AWS S3 Bucket Object Lock is not enabled 🟠🟒1🟠 x1, 🟒 x6
πŸ“ AWS S3 Bucket Policy is not set to deny HTTP requests 🟒1🟒 x6
πŸ“ Azure App Service FTP deployments are not disabled 🟒1🟒 x6
πŸ“ Azure App Service HTTPS Only configuration is not enabled 🟒1🟒 x6
πŸ“ Azure Cosmos DB Account Private Endpoints are not used 🟒1🟒 x6
πŸ“ Azure Cosmos DB Account Virtual Network Filter is not enabled 🟒1🟒 x6
πŸ“ Azure Cosmos DB Entra ID Client Authentication is not used 🟒🟒 x3
πŸ“ Azure Diagnostic Setting Logs export to Storage Account not encrypted with Customer-managed key 🟒1🟒 x6
πŸ“ Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure Network Security Group allows unrestricted RDP access from the Internet 🟒1🟒 x6
πŸ“ Azure Network Security Group allows unrestricted SSH access from the Internet 🟒1🟒 x6
πŸ“ Azure Network Security Group allows unrestricted UDP access from the Internet 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled 🟒1🟒 x6
πŸ“ Azure SQL Database Transparent Data Encryption is not enabled 🟒1🟒 x6
πŸ“ Azure SQL Server Microsoft Entra authentication is not configured 🟒1🟒 x6
πŸ“ Azure Storage Account Allow Blob Anonymous Access is set enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Cross Tenant Replication is enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Secure Transfer Required is not enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Trusted Azure Services are not enabled as networking exceptions 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-0a7801fb1
βœ‰οΈ dec-x-2fcb6d852
βœ‰οΈ dec-x-3e379c671
βœ‰οΈ dec-x-4c15a09f1
βœ‰οΈ dec-x-5c3c20671
βœ‰οΈ dec-x-6c93750d1
βœ‰οΈ dec-x-6eab9b881
βœ‰οΈ dec-x-11c3009f1
βœ‰οΈ dec-x-14f5fc251
βœ‰οΈ dec-x-42a090841
βœ‰οΈ dec-x-46a83a301
βœ‰οΈ dec-x-75db76ad1
βœ‰οΈ dec-x-157aa4b91
βœ‰οΈ dec-x-293ab45b1
βœ‰οΈ dec-x-599c86b41
βœ‰οΈ dec-x-3179d53c1
βœ‰οΈ dec-x-4157c58a1
βœ‰οΈ dec-x-66358b451
βœ‰οΈ dec-x-083928f51
βœ‰οΈ dec-x-995424b72
βœ‰οΈ dec-x-ab7fc52e1
βœ‰οΈ dec-x-b1e1a4941
βœ‰οΈ dec-x-b4d3d9dc2
βœ‰οΈ dec-x-b33429051
βœ‰οΈ dec-x-bcae85fb2
βœ‰οΈ dec-x-bf1f13f61
βœ‰οΈ dec-x-c0a7793e1
βœ‰οΈ dec-x-ca1c0c0d1
βœ‰οΈ dec-x-d5fbfc401
βœ‰οΈ dec-x-d95ea48b1
βœ‰οΈ dec-x-e43fd12e1
βœ‰οΈ dec-x-ec547a7c1
βœ‰οΈ dec-x-f12d78aa1
βœ‰οΈ dec-x-f937c35f1
βœ‰οΈ dec-z-3f480eb51
βœ‰οΈ dec-z-dbeeed9f1
βœ‰οΈ dec-z-f778950c1