Skip to main content

💼 PR.AC-3: Remote access is managed

  • ID: /frameworks/nist-csf-v1.1/pr-ac/03

Description

Empty...

Similar

  • Sections
    • /frameworks/iso-iec-27001-2013/06/02/01
    • /frameworks/iso-iec-27001-2013/06/02/02
    • /frameworks/iso-iec-27001-2013/11/02/06
    • /frameworks/iso-iec-27001-2013/13/01/01
    • /frameworks/iso-iec-27001-2013/13/02/01
    • /frameworks/nist-sp-800-53-r4/ac/01
    • /frameworks/nist-sp-800-53-r4/ac/17
    • /frameworks/nist-sp-800-53-r4/ac/19
    • /frameworks/nist-sp-800-53-r4/ac/20
    • /frameworks/nist-sp-800-53-r4/sc/15
  • Internal
    • ID: dec-c-45e2b455

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 ISO/IEC 27001:2013 → 💼 A.6.2.1 Mobile device policyno data
💼 ISO/IEC 27001:2013 → 💼 A.6.2.2 Teleworkingno data
💼 ISO/IEC 27001:2013 → 💼 A.11.2.6 Security of equipment and assets off-premisesno data
💼 ISO/IEC 27001:2013 → 💼 A.13.1.1 Network controls21no data
💼 ISO/IEC 27001:2013 → 💼 A.13.2.1 Information transfer policies and procedures1no data
💼 NIST SP 800-53 Revision 4 → 💼 AC-1 ACCESS CONTROL POLICY AND PROCEDURESno data
💼 NIST SP 800-53 Revision 4 → 💼 AC-17 REMOTE ACCESS9no data
💼 NIST SP 800-53 Revision 4 → 💼 AC-19 ACCESS CONTROL FOR MOBILE DEVICES5no data
💼 NIST SP 800-53 Revision 4 → 💼 AC-20 USE OF EXTERNAL INFORMATION SYSTEMS4no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-15 COLLABORATIVE COMPUTING DEVICES4no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST CSF v2.0 → 💼 PR.AA-03: Users, services, and hardware are authenticated53no data
💼 NIST CSF v2.0 → 💼 PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties116no data
💼 NIST CSF v2.0 → 💼 PR.IR-01: Networks and environments are protected from unauthorized logical access and usage95no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (22)

PolicyLogic CountFlagsCompliance
🛡️ Google Cloud SQL Instance SSL Connections are not enforced🟢1🟢 x6no data
🛡️ Google GCE Firewall Rule logging is disabled🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted CiscoSecure/WebSM traffic🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted DNS traffic🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted FTP traffic🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted HTTP traffic🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted LDAP traffic🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted NetBIOS traffic🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted POP3 traffic🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted SMTP traffic🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted SSH traffic🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted traffic to Cassandra🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted traffic to Directory services"🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted traffic to Elasticsearch🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted traffic to Memcached🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted traffic to MongoDB🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted traffic to MySQL🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted traffic to OracleDB🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted traffic to PostgreSQL🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted traffic to Redis🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted Telnet traffic🟢1🟢 x6no data
🛡️ Google GKE Cluster Network policy is disabled.🟢1🟢 x6no data