Skip to main content

πŸ’Ό PR.DS-2: Data-in-transit is protected

  • Contextual name: πŸ’Ό PR.DS-2: Data-in-transit is protected
  • ID: /frameworks/nist-csf-v1.1/pr-ds/02
  • Located in: πŸ’Ό Data Security (PR.DS)

Description​

Empty...

Similar​

  • Sections
    • /frameworks/iso-iec-27001-2013/08/02/03
    • /frameworks/iso-iec-27001-2013/13/01/01
    • /frameworks/iso-iec-27001-2013/13/02/01
    • /frameworks/iso-iec-27001-2013/13/02/03
    • /frameworks/iso-iec-27001-2013/14/01/02
    • /frameworks/iso-iec-27001-2013/14/01/03
    • /frameworks/nist-sp-800-53-r4/sc/08
    • /frameworks/nist-sp-800-53-r4/sc/11
    • /frameworks/nist-sp-800-53-r4/sc/12
  • Internal
    • ID: dec-c-e7ac5c27

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.8.2.3 Handling of assets
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.1.1 Network controls
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.2.1 Information transfer policies and procedures
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.2.3 Electronic messaging
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.14.1.2 Securing application services on public networks44
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.14.1.3 Protecting application services transactions78
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-8 TRANSMISSION CONFIDENTIALITY AND INTEGRITY422
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-11 TRUSTED PATH1
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-12 CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT544

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected69

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (21)​

PolicyLogic CountFlags
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6
πŸ“ AWS IAM User Access Keys are not rotated every 90 days or less 🟒1🟒 x6
πŸ“ AWS IAM User has more than one active access key 🟒1🟒 x6
πŸ“ AWS IAM User with console and programmatic access set during the initial creation 🟒🟒 x3
πŸ“ AWS KMS Symmetric CMK Rotation is not enabled 🟒1🟒 x6
πŸ“ AWS S3 Bucket is not configured to block public access 🟒1🟒 x6
πŸ“ AWS S3 Bucket Policy is not set to deny HTTP requests 🟒1🟒 x6
πŸ“ Azure App Service FTP deployments are not disabled 🟒1🟒 x6
πŸ“ Azure App Service HTTPS Only configuration is not enabled 🟒1🟒 x6
πŸ“ Azure Key Vault Soft Delete and Purge Protection functions are not enabled 🟒1🟒 x6
πŸ“ Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure Non-RBAC Key Vault stores Keys without expiration date 🟒1🟒 x6
πŸ“ Azure Non-RBAC Key Vault stores Secrets without expiration date 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Infrastructure Double Encryption is not enabled 🟒1🟒 x6
πŸ“ Azure RBAC Key Vault stores Keys without expiration date 🟒1🟒 x6
πŸ“ Azure RBAC Key Vault stores Secrets without expiration date 🟒1🟒 x6
πŸ“ Azure SQL Server Transparent Data Encryption Protector is not encrypted with Customer-managed key 🟒1🟒 x6
πŸ“ Azure Storage Account Secure Transfer Required is not enabled 🟒1🟒 x6
πŸ“ Azure Storage Account With Critical Data is not encrypted with customer managed key 🟒🟒 x3

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-0be4dfe51
βœ‰οΈ dec-x-0feec7902
βœ‰οΈ dec-x-4d6fee7a1
βœ‰οΈ dec-x-14f5fc251
βœ‰οΈ dec-x-82ca41272
βœ‰οΈ dec-x-230b5e351
βœ‰οΈ dec-x-995424b72
βœ‰οΈ dec-x-307950161
βœ‰οΈ dec-x-aef11ebd1
βœ‰οΈ dec-x-b10e98af1
βœ‰οΈ dec-x-bcb0c78f1
βœ‰οΈ dec-x-c0a7793e1
βœ‰οΈ dec-x-d5fbfc401
βœ‰οΈ dec-x-d95ea48b1