Skip to main content

💼 PR.AC-3: Remote access is managed

Description

Empty...

Similar

  • Sections
    • /frameworks/iso-iec-27001-2013/06/02/01
    • /frameworks/iso-iec-27001-2013/06/02/02
    • /frameworks/iso-iec-27001-2013/11/02/06
    • /frameworks/iso-iec-27001-2013/13/01/01
    • /frameworks/iso-iec-27001-2013/13/02/01
    • /frameworks/nist-sp-800-53-r4/ac/01
    • /frameworks/nist-sp-800-53-r4/ac/17
    • /frameworks/nist-sp-800-53-r4/ac/19
    • /frameworks/nist-sp-800-53-r4/ac/20
    • /frameworks/nist-sp-800-53-r4/sc/15
  • Internal
    • ID: dec-c-45e2b455

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 ISO/IEC 27001:2013 → 💼 A.6.2.1 Mobile device policy
💼 ISO/IEC 27001:2013 → 💼 A.6.2.2 Teleworking
💼 ISO/IEC 27001:2013 → 💼 A.11.2.6 Security of equipment and assets off-premises
💼 ISO/IEC 27001:2013 → 💼 A.13.1.1 Network controls1
💼 ISO/IEC 27001:2013 → 💼 A.13.2.1 Information transfer policies and procedures
💼 NIST SP 800-53 Revision 4 → 💼 AC-1 ACCESS CONTROL POLICY AND PROCEDURES
💼 NIST SP 800-53 Revision 4 → 💼 AC-17 REMOTE ACCESS9
💼 NIST SP 800-53 Revision 4 → 💼 AC-19 ACCESS CONTROL FOR MOBILE DEVICES5
💼 NIST SP 800-53 Revision 4 → 💼 AC-20 USE OF EXTERNAL INFORMATION SYSTEMS4
💼 NIST SP 800-53 Revision 4 → 💼 SC-15 COLLABORATIVE COMPUTING DEVICES4

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST CSF v2.0 → 💼 PR.AA-03: Users, services, and hardware are authenticated32
💼 NIST CSF v2.0 → 💼 PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties91
💼 NIST CSF v2.0 → 💼 PR.IR-01: Networks and environments are protected from unauthorized logical access and usage69

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 Google GCE Network has Firewall Rules which allow unrestricted SSH access from the Internet 🟢1🟢 x6