💼 PR.IP-7: Protection processes are improved
- ID:
/frameworks/nist-csf-v1.1/pr-ip/07
Description
Empty...
Similar
- Sections
/frameworks/iso-iec-27001-2013/16/01/06/frameworks/nist-sp-800-53-r4/ca/02/frameworks/nist-sp-800-53-r4/ca/07/frameworks/nist-sp-800-53-r4/cp/02/frameworks/nist-sp-800-53-r4/ir/08/frameworks/nist-sp-800-53-r4/pl/02
- Internal
- ID:
dec-c-fc29ed77
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 ISO/IEC 27001:2013 → 💼 A.16.1.6 Learning from information security incidents | no data | ||||
| 💼 NIST SP 800-53 Revision 4 → 💼 CA-2 SECURITY ASSESSMENTS | 3 | no data | |||
| 💼 NIST SP 800-53 Revision 4 → 💼 CA-7 CONTINUOUS MONITORING | 3 | no data | |||
| 💼 NIST SP 800-53 Revision 4 → 💼 CP-2 CONTINGENCY PLAN | 8 | no data | |||
| 💼 NIST SP 800-53 Revision 4 → 💼 IR-8 INCIDENT RESPONSE PLAN | no data | ||||
| 💼 NIST SP 800-53 Revision 4 → 💼 PL-2 SYSTEM SECURITY PLAN | 3 | 1 | 2 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 NIST CSF v2.0 → 💼 ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities | 41 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (2)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports🟢 | 1 | 🟢 x6 | no data |