Skip to main content

πŸ’Ό PR.PT-4: Communications and control networks are protected

  • Contextual name: πŸ’Ό PR.PT-4: Communications and control networks are protected
  • ID: /frameworks/nist-csf-v1.1/pr-pt/04
  • Located in: πŸ’Ό Protective Technology (PR.PT)

Description​

Empty...

Similar​

  • Sections
    • /frameworks/iso-iec-27001-2013/13/01/01
    • /frameworks/iso-iec-27001-2013/13/02/01
    • /frameworks/iso-iec-27001-2013/14/01/03
    • /frameworks/nist-sp-800-53-r4/ac/04
    • /frameworks/nist-sp-800-53-r4/ac/17
    • /frameworks/nist-sp-800-53-r4/ac/18
    • /frameworks/nist-sp-800-53-r4/cp/08
    • /frameworks/nist-sp-800-53-r4/sc/07
    • /frameworks/nist-sp-800-53-r4/sc/19
    • /frameworks/nist-sp-800-53-r4/sc/20
    • /frameworks/nist-sp-800-53-r4/sc/21
    • /frameworks/nist-sp-800-53-r4/sc/22
    • /frameworks/nist-sp-800-53-r4/sc/23
    • /frameworks/nist-sp-800-53-r4/sc/24
    • /frameworks/nist-sp-800-53-r4/sc/25
    • /frameworks/nist-sp-800-53-r4/sc/29
    • /frameworks/nist-sp-800-53-r4/sc/32
    • /frameworks/nist-sp-800-53-r4/sc/36
    • /frameworks/nist-sp-800-53-r4/sc/37
    • /frameworks/nist-sp-800-53-r4/sc/38
    • /frameworks/nist-sp-800-53-r4/sc/39
    • /frameworks/nist-sp-800-53-r4/sc/40
    • /frameworks/nist-sp-800-53-r4/sc/41
    • /frameworks/nist-sp-800-53-r4/sc/43
  • Internal
    • ID: dec-c-724d2447

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.1.1 Network controls
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.13.2.1 Information transfer policies and procedures
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.14.1.3 Protecting application services transactions78
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-4 INFORMATION FLOW ENFORCEMENT2211
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-17 REMOTE ACCESS9
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-18 WIRELESS ACCESS5
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό CP-8 TELECOMMUNICATIONS SERVICES5
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-7 BOUNDARY PROTECTION2356
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-19 VOICE OVER INTERNET PROTOCOL
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-20 SECURE NAME _ ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)2
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-21 SECURE NAME _ ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER)1
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-22 ARCHITECTURE AND PROVISIONING FOR NAME _ ADDRESS RESOLUTION SERVICE
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-23 SESSION AUTHENTICITY4
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-24 FAIL IN KNOWN STATE
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-25 THIN NODES
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-29 HETEROGENEITY1
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-32 INFORMATION SYSTEM PARTITIONING
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-36 DISTRIBUTED PROCESSING AND STORAGE1
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-37 OUT-OF-BAND CHANNELS1
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-38 OPERATIONS SECURITY
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-39 PROCESS ISOLATION2
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-40 WIRELESS LINK PROTECTION4
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-41 PORT AND I_O DEVICE ACCESS
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό SC-43 USAGE RESTRICTIONS

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.AA-06: Physical access to assets is managed, monitored, and enforced commensurate with risk13
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.IR-01: Networks and environments are protected from unauthorized logical access and usage40

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (13)​

PolicyLogic CountFlags
πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MongoDB 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS 🟒1🟒 x6
πŸ“ AWS S3 Bucket is not configured to block public access 🟒1🟒 x6
πŸ“ AWS S3 Bucket Policy is not set to deny HTTP requests 🟒1🟒 x6
πŸ“ Azure App Service FTP deployments are not disabled 🟒1🟒 x6
πŸ“ Azure App Service HTTPS Only configuration is not enabled 🟒1🟒 x6
πŸ“ Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Infrastructure Double Encryption is not enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Secure Transfer Required is not enabled 🟒1🟒 x6

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-6ed261671
βœ‰οΈ dec-x-14f5fc251
βœ‰οΈ dec-x-75db76ad1
βœ‰οΈ dec-x-995424b72
βœ‰οΈ dec-x-c0a7793e1
βœ‰οΈ dec-x-d5fbfc401
βœ‰οΈ dec-x-d95ea48b1