Skip to main content

πŸ’Ό PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties

Description​

Empty...

Similar​

  • Sections
    • /frameworks/iso-iec-27001-2013/06/01/02
    • /frameworks/iso-iec-27001-2013/09/01/02
    • /frameworks/iso-iec-27001-2013/09/02/03
    • /frameworks/iso-iec-27001-2013/09/04/01
    • /frameworks/iso-iec-27001-2013/09/04/04
    • /frameworks/iso-iec-27001-2013/09/04/05
    • /frameworks/nist-sp-800-53-r4/ac/01
    • /frameworks/nist-sp-800-53-r4/ac/02
    • /frameworks/nist-sp-800-53-r4/ac/03
    • /frameworks/nist-sp-800-53-r4/ac/05
    • /frameworks/nist-sp-800-53-r4/ac/06
    • /frameworks/nist-sp-800-53-r4/ac/14
    • /frameworks/nist-sp-800-53-r4/ac/16
    • /frameworks/nist-sp-800-53-r4/ac/24
  • Internal
    • ID: dec-c-2c2dde09

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.6.1.2 Segregation of duties
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.9.1.2 Access to networks and network services1718
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.9.2.3 Management of privileged access rights38
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.9.4.1 Information access restriction1920
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.9.4.4 Use of privileged utility programs
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.9.4.5 Access control to program source code
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-1 ACCESS CONTROL POLICY AND PROCEDURES
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-2 ACCOUNT MANAGEMENT1336
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-3 ACCESS ENFORCEMENT102
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-5 SEPARATION OF DUTIES34
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-6 LEAST PRIVILEGE1024
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-14 PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION1
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-16 SECURITY ATTRIBUTES10
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-24 ACCESS CONTROL DECISIONS2

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties88

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (52)​

PolicyLogic CountFlags
πŸ“ AWS Account IAM Access Analyzer is not enabled for all regions 🟒1🟒 x6
πŸ“ AWS Account Root User credentials were used is the last 30 days 🟒1🟒 x6
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6
πŸ“ AWS DMS Replication Instance is publicly accessible 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted CIFS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted DNS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted FTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted ICMP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted NetBIOS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted RPC traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted SMTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MongoDB 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MSSQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MySQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to PostgreSQL 🟒1🟒 x6
πŸ“ AWS IAM Policy allows full administrative privileges 🟒1🟒 x6
πŸ“ AWS IAM User has inline or directly attached policies 🟒1🟠 x1, 🟒 x5
πŸ“ AWS RDS Instance is publicly accessible and in an unrestricted public subnet 🟒1🟒 x6
πŸ“ AWS RDS Snapshot is publicly accessible 🟒1🟒 x6
πŸ“ AWS S3 Bucket is not configured to block public access 🟒1🟒 x6
πŸ“ Azure App Service Authentication is disabled and Basic Authentication is enabled 🟒1🟒 x6
πŸ“ Azure App Service Basic Authentication is enabled 🟒🟒 x3
πŸ“ Azure Cosmos DB Account Private Endpoints are not used 🟒1🟒 x6
πŸ“ Azure Cosmos DB Account Virtual Network Filter is not enabled 🟒1🟒 x6
πŸ“ Azure Cosmos DB Entra ID Client Authentication is not used 🟒🟒 x3
πŸ“ Azure Network Security Group allows public access to HTTP(S) ports 🟒1🟒 x6
πŸ“ Azure Network Security Group allows public access to RDP port 🟒1🟒 x6
πŸ“ Azure Network Security Group allows public access to SSH port 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services 🟒1🟒 x6
πŸ“ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP) 🟒1🟒 x6
πŸ“ Azure Storage Account Allow Blob Anonymous Access is enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Trusted Azure Services are not enabled as networking exceptions 🟒1🟒 x6
πŸ“ Consumer Google Accounts are used 🟒🟒 x3
πŸ“ Google BigQuery Dataset is anonymously or publicly accessible 🟒1🟒 x6
πŸ“ Google Cloud Audit Logging is not configured properly 🟒1🟒 x6
πŸ“ Google Cloud MySQL Instance allows anyone to connect with administrative privileges 🟒🟒 x3
πŸ“ Google Cloud MySQL Instance Skip_show_database Database Flag is not set to on 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance External Authorized Networks do not whitelist all public IP addresses 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance has public IP addresses 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance cross db ownership chaining Database Flag is not set to off 🟒1🟒 x6
πŸ“ Google GCE Instance has a public IP address 🟒1🟒 x6
πŸ“ Google GCE Instance is configured to use the Default Service Account with full access to all Cloud APIs 🟒1🟒 x6
πŸ“ Google IAM Service Account has admin privileges 🟒1🟒 x6
πŸ“ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level 🟒1🟒 x6
πŸ“ Google KMS Crypto Key is anonymously or publicly accessible 🟠🟒🟠 x1, 🟒 x3
πŸ“ Google Logging Log Sink exports logs to a Storage Bucket without Bucket Lock 🟒1🟒 x6
πŸ“ Google Storage Bucket is anonymously or publicly accessible 🟒1🟒 x6
πŸ“ Google Storage Bucket Uniform Bucket-Level Access is not enabled 🟒1🟒 x6
πŸ“ Google User has both Service Account Admin and Service Account User roles assigned 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-0a7801fb1
βœ‰οΈ dec-x-4c15a09f1
βœ‰οΈ dec-x-14bf01f31
βœ‰οΈ dec-x-46a83a301
βœ‰οΈ dec-x-157aa4b91
βœ‰οΈ dec-x-0289e9c91
βœ‰οΈ dec-x-599c86b41
βœ‰οΈ dec-x-083928f51
βœ‰οΈ dec-x-637372481
βœ‰οΈ dec-x-ab7fc52e1
βœ‰οΈ dec-x-b33429051
βœ‰οΈ dec-x-bf1f13f61
βœ‰οΈ dec-x-e02b5fdd1
βœ‰οΈ dec-x-ec547a7c1
βœ‰οΈ dec-x-f4cc003a1
βœ‰οΈ dec-x-f937c35f1
βœ‰οΈ dec-z-c82c9f971