Skip to main content

💼 AC-3 Access Enforcement (L)(M)(H)

  • Contextual name: 💼 AC-3 Access Enforcement (L)(M)(H)
  • ID: /frameworks/fedramp-low-security-controls/ac/03
  • Located in: 💼 Access Control

Description

Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

Similar

  • Sections
    • /frameworks/nist-sp-800-53-r5/ac/03
    • /frameworks/fedramp-high-security-controls/ac/03
  • Internal
    • ID: dec-c-9b059ff2

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 FedRAMP High Security Controls → 💼 AC-3 Access Enforcement (L)(M)(H)3767
💼 NIST SP 800-53 Revision 5 → 💼 AC-3 Access Enforcement15537

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (67)

PolicyLogic CountFlags
📝 AWS Account IAM Access Analyzer is not enabled for all regions 🟢1🟢 x6
📝 AWS Account Object-level CloudTrail Logging for Read Events for S3 Buckets is not enabled 🟢1🟢 x6
📝 AWS Account Object-level CloudTrail Logging for Write Events for S3 Buckets is not enabled 🟢1🟢 x6
📝 AWS Account Root User has active access keys 🟢1🟢 x6
📝 AWS API Gateway API Route Authorization Type is not configured 🟢1🟢 x6
📝 AWS CloudFront Web Distribution Cache Behaviors allow unencrypted traffic 🟢1🟢 x6
📝 AWS CloudFront Web Distribution does not encrypt traffic to Custom Origins 🟢1🟢 x6
📝 AWS CloudFront Web Distribution Default Root Object is not configured 🟢1🟢 x6
📝 AWS CloudTrail Log File Validation is not enabled 🟢1🟢 x6
📝 AWS DMS Replication Instance is publicly accessible 🟢1🟢 x6
📝 AWS EBS Snapshot is publicly accessible 🟢1🟢 x6
📝 AWS EC2 Auto Scaling Group behind ELB assigns public IP to instances 🟢1🟢 x6
📝 AWS EC2 Auto Scaling Group Launch Template is not configured to require IMDSv2 🟢1🟢 x6
📝 AWS EC2 Instance IAM role is not attached 🟢1🟢 x6
📝 AWS EC2 Instance IMDSv2 is not enabled 🟢1🟢 x6
📝 AWS EC2 Instance with an auto-assigned public IP address is in a default subnet 🟢1🟢 x6
📝 AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟢1🟢 x6
📝 AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted DNS traffic 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted FTP traffic 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted ICMP traffic 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted NetBIOS traffic 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted RPC traffic 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted SMTP traffic 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted traffic to MSSQL 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted traffic to MySQL 🟢1🟢 x6
📝 AWS EC2 Security Group allows unrestricted traffic to PostgreSQL 🟢1🟢 x6
📝 AWS IAM Policy allows full administrative privileges 🟢1🟢 x6
📝 AWS IAM User has inline or directly attached policies 🟢1🟠 x1, 🟢 x5
📝 AWS IAM User with credentials unused for 45 days or more is not disabled 🟢1🟢 x6
📝 AWS RDS Instance is publicly accessible and in an unrestricted public subnet 🟢1🟢 x6
📝 AWS RDS Snapshot is publicly accessible 🟢1🟢 x6
📝 AWS S3 Bucket is not configured to block public access 🟢1🟢 x6
📝 AWS S3 Bucket Object Lock is not enabled 🟠🟢1🟠 x1, 🟢 x6
📝 AWS S3 Bucket Policy is not set to deny HTTP requests 🟢1🟢 x6
📝 AWS VPC is not configured with a VPC Endpoint for Amazon EC2 service 🟢1🟢 x6
📝 AWS VPC Subnet Map Public IP On Launch is enabled 🟢1🟢 x6
📝 Azure App Service FTP deployments are not disabled 🟢1🟢 x6
📝 Azure App Service HTTPS Only configuration is not enabled 🟢1🟢 x6
📝 Azure Cosmos DB Account Private Endpoints are not used 🟢1🟢 x6
📝 Azure Cosmos DB Account Virtual Network Filter is not enabled 🟢1🟢 x6
📝 Azure Cosmos DB Entra ID Client Authentication is not used 🟢🟢 x3
📝 Azure Diagnostic Setting Logs export to Storage Account not encrypted with Customer-managed key 🟢1🟢 x6
📝 Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON 🟢1🟢 x6
📝 Azure Network Security Group allows public access to RDP port 🟢1🟢 x6
📝 Azure Network Security Group allows public access to SSH port 🟢1🟢 x6
📝 Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services 🟢1🟢 x6
📝 Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON 🟢1🟢 x6
📝 Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled 🟢1🟢 x6
📝 Azure SQL Database Transparent Data Encryption is not enabled 🟢1🟢 x6
📝 Azure SQL Server Microsoft Entra authentication is not configured 🟢1🟢 x6
📝 Azure Storage Account Allow Blob Anonymous Access is enabled 🟢1🟢 x6
📝 Azure Storage Account Cross Tenant Replication is enabled 🟢1🟢 x6
📝 Azure Storage Account Secure Transfer Required is not enabled 🟢1🟢 x6
📝 Azure Storage Account Trusted Azure Services are not enabled as networking exceptions 🟢1🟢 x6
📝 Google BigQuery Dataset is anonymously or publicly accessible 🟢1🟢 x6
📝 Google Cloud MySQL Instance Skip_show_database Database Flag is not set to on 🟢1🟢 x6
📝 Google Cloud SQL Instance External Authorized Networks do not whitelist all public IP addresses 🟢1🟢 x6
📝 Google Cloud SQL Instance has public IP addresses 🟢1🟢 x6
📝 Google Cloud SQL Server Instance cross db ownership chaining Database Flag is not set to off 🟢1🟢 x6
📝 Google GCE Instance has a public IP address 🟢1🟢 x6
📝 Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level 🟢1🟢 x6
📝 Google KMS Crypto Key is anonymously or publicly accessible 🟠🟢🟠 x1, 🟢 x3
📝 Google Logging Log Sink exports logs to a Storage Bucket without Bucket Lock 🟢1🟢 x6
📝 Google Storage Bucket is anonymously or publicly accessible 🟢1🟢 x6
📝 Google Storage Bucket Uniform Bucket-Level Access is not enabled 🟢1🟢 x6
📝 Google User has both Service Account Admin and Service Account User roles assigned 🟢1🟢 x6