Skip to main content

💼 MP-2 Media Access (L)(M)(H)

  • Contextual name: 💼 MP-2 Media Access (L)(M)(H)
  • ID: /frameworks/fedramp-moderate-security-controls/mp/02
  • Located in: 💼 Media Protection

Description

Restrict access to [FedRAMP Assignment: all types of digital and/or non-digital media containing sensitive information] to [Assignment: organization-defined personnel or roles].

Similar

  • Sections
    • /frameworks/fedramp-high-security-controls/mp/02
  • Internal
    • ID: dec-c-02e2db60

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 FedRAMP High Security Controls → 💼 MP-2 Media Access (L)(M)(H)12

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (12)

PolicyLogic CountFlags
📝 Google BigQuery Dataset is anonymously or publicly accessible 🟢1🟢 x6
📝 Google Cloud MySQL Instance Skip_show_database Database Flag is not set to on 🟢1🟢 x6
📝 Google Cloud SQL Instance External Authorized Networks do not whitelist all public IP addresses 🟢1🟢 x6
📝 Google Cloud SQL Instance has public IP addresses 🟢1🟢 x6
📝 Google Cloud SQL Server Instance cross db ownership chaining Database Flag is not set to off 🟢1🟢 x6
📝 Google GCE Instance has a public IP address 🟢1🟢 x6
📝 Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level 🟢1🟢 x6
📝 Google KMS Crypto Key is anonymously or publicly accessible 🟠🟢🟠 x1, 🟢 x3
📝 Google Logging Log Sink exports logs to a Storage Bucket without Bucket Lock 🟢1🟢 x6
📝 Google Storage Bucket is anonymously or publicly accessible 🟢1🟢 x6
📝 Google Storage Bucket Uniform Bucket-Level Access is not enabled 🟢1🟢 x6
📝 Google User has both Service Account Admin and Service Account User roles assigned 🟢1🟢 x6