Skip to main content

πŸ’Ό PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation)

Description​

Empty...

Similar​

  • Sections
    • /frameworks/iso-iec-27001-2013/13/01/01
    • /frameworks/iso-iec-27001-2013/13/01/03
    • /frameworks/iso-iec-27001-2013/13/02/01
    • /frameworks/iso-iec-27001-2013/14/01/02
    • /frameworks/iso-iec-27001-2013/14/01/03
    • /frameworks/nist-sp-800-53-r4/ac/04
    • /frameworks/nist-sp-800-53-r4/ac/10
    • /frameworks/nist-sp-800-53-r4/sc/07
  • Internal
    • ID: dec-c-0bff4159

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.1.1 Network controls
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.1.3 Segregation in networks
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.2.1 Information transfer policies and procedures
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.14.1.2 Securing application services on public networks44
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.14.1.3 Protecting application services transactions78
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-4 INFORMATION FLOW ENFORCEMENT2211
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-10 CONCURRENT SESSION CONTROL
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-7 BOUNDARY PROTECTION2356

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.IR-01: Networks and environments are protected from unauthorized logical access and usage40

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (13)​

PolicyLogic CountFlags
πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MongoDB 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS 🟒1🟒 x6
πŸ“ AWS S3 Bucket is not configured to block public access 🟒1🟒 x6
πŸ“ AWS S3 Bucket Policy is not set to deny HTTP requests 🟒1🟒 x6
πŸ“ Azure App Service FTP deployments are not disabled 🟒1🟒 x6
πŸ“ Azure App Service HTTPS Only configuration is not enabled 🟒1🟒 x6
πŸ“ Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Infrastructure Double Encryption is not enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Secure Transfer Required is not enabled 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-6ed261671
βœ‰οΈ dec-x-14f5fc251
βœ‰οΈ dec-x-75db76ad1
βœ‰οΈ dec-x-995424b72
βœ‰οΈ dec-x-c0a7793e1
βœ‰οΈ dec-x-d5fbfc401
βœ‰οΈ dec-x-d95ea48b1