Skip to main content

💼 PR.PT-4: Communications and control networks are protected

  • ID: /frameworks/nist-csf-v1.1/pr-pt/04

Description

Empty...

Similar

  • Sections
    • /frameworks/iso-iec-27001-2013/13/01/01
    • /frameworks/iso-iec-27001-2013/13/02/01
    • /frameworks/iso-iec-27001-2013/14/01/03
    • /frameworks/nist-sp-800-53-r4/ac/04
    • /frameworks/nist-sp-800-53-r4/ac/17
    • /frameworks/nist-sp-800-53-r4/ac/18
    • /frameworks/nist-sp-800-53-r4/cp/08
    • /frameworks/nist-sp-800-53-r4/sc/07
    • /frameworks/nist-sp-800-53-r4/sc/19
    • /frameworks/nist-sp-800-53-r4/sc/20
    • /frameworks/nist-sp-800-53-r4/sc/21
    • /frameworks/nist-sp-800-53-r4/sc/22
    • /frameworks/nist-sp-800-53-r4/sc/23
    • /frameworks/nist-sp-800-53-r4/sc/24
    • /frameworks/nist-sp-800-53-r4/sc/25
    • /frameworks/nist-sp-800-53-r4/sc/29
    • /frameworks/nist-sp-800-53-r4/sc/32
    • /frameworks/nist-sp-800-53-r4/sc/36
    • /frameworks/nist-sp-800-53-r4/sc/37
    • /frameworks/nist-sp-800-53-r4/sc/38
    • /frameworks/nist-sp-800-53-r4/sc/39
    • /frameworks/nist-sp-800-53-r4/sc/40
    • /frameworks/nist-sp-800-53-r4/sc/41
    • /frameworks/nist-sp-800-53-r4/sc/43
  • Internal
    • ID: dec-c-724d2447

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 ISO/IEC 27001:2013 → 💼 A.13.1.1 Network controls1no data
💼 ISO/IEC 27001:2013 → 💼 A.13.2.1 Information transfer policies and proceduresno data
💼 ISO/IEC 27001:2013 → 💼 A.14.1.3 Protecting application services transactions1014no data
💼 NIST SP 800-53 Revision 4 → 💼 AC-4 INFORMATION FLOW ENFORCEMENT2211no data
💼 NIST SP 800-53 Revision 4 → 💼 AC-17 REMOTE ACCESS9no data
💼 NIST SP 800-53 Revision 4 → 💼 AC-18 WIRELESS ACCESS5no data
💼 NIST SP 800-53 Revision 4 → 💼 CP-8 TELECOMMUNICATIONS SERVICES5no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-7 BOUNDARY PROTECTION23510no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-19 VOICE OVER INTERNET PROTOCOLno data
💼 NIST SP 800-53 Revision 4 → 💼 SC-20 SECURE NAME _ ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)2no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-21 SECURE NAME _ ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER)1no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-22 ARCHITECTURE AND PROVISIONING FOR NAME _ ADDRESS RESOLUTION SERVICEno data
💼 NIST SP 800-53 Revision 4 → 💼 SC-23 SESSION AUTHENTICITY4no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-24 FAIL IN KNOWN STATEno data
💼 NIST SP 800-53 Revision 4 → 💼 SC-25 THIN NODESno data
💼 NIST SP 800-53 Revision 4 → 💼 SC-29 HETEROGENEITY1no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-32 INFORMATION SYSTEM PARTITIONINGno data
💼 NIST SP 800-53 Revision 4 → 💼 SC-36 DISTRIBUTED PROCESSING AND STORAGE1no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-37 OUT-OF-BAND CHANNELS1no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-38 OPERATIONS SECURITYno data
💼 NIST SP 800-53 Revision 4 → 💼 SC-39 PROCESS ISOLATION2no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-40 WIRELESS LINK PROTECTION4no data
💼 NIST SP 800-53 Revision 4 → 💼 SC-41 PORT AND I_O DEVICE ACCESSno data
💼 NIST SP 800-53 Revision 4 → 💼 SC-43 USAGE RESTRICTIONSno data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST CSF v2.0 → 💼 PR.AA-06: Physical access to assets is managed, monitored, and enforced commensurate with risk22no data
💼 NIST CSF v2.0 → 💼 PR.IR-01: Networks and environments are protected from unauthorized logical access and usage70no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (22)

PolicyLogic CountFlagsCompliance
🛡️ AWS CloudFront Web Distribution Cache Behaviors allow unencrypted traffic🟢1🟢 x6no data
🛡️ AWS CloudFront Web Distribution does not encrypt traffic to Custom Origins🟢1🟢 x6no data
🛡️ AWS DMS Endpoint doesn't use SSL🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows unrestricted traffic to MongoDB🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS🟢1🟢 x6no data
🛡️ AWS S3 Bucket is not configured to block public access🟢1🟢 x6no data
🛡️ AWS S3 Bucket Policy is not set to deny HTTP requests🟢1🟢 x6no data
🛡️ Azure App Service FTP deployments are not disabled🟢1🟢 x6no data
🛡️ Azure App Service HTTPS Only configuration is not enabled🟢1🟢 x6no data
🛡️ Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON🟢1🟢 x6no data
🛡️ Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON🟢1🟢 x6no data
🛡️ Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled🟢1🟢 x6no data
🛡️ Azure PostgreSQL Single Server Infrastructure Double Encryption is not enabled🟢1🟢 x6no data
🛡️ Azure Storage Account Secure Transfer Required is not enabled🟢1🟢 x6no data
🛡️ Google BigQuery Dataset is anonymously or publicly accessible🟢1🟢 x6no data
🛡️ Google Cloud SQL Instance External Authorized Networks whitelists all public IP addresses🟢1🟢 x6no data
🛡️ Google GCE Instance has a public IP address🟢1🟢 x6no data
🛡️ Google GCE Network has Firewall Rules which allow unrestricted SSH access from the Internet🟢1🟢 x6no data
🛡️ Google HTTPS or SSL Proxy Load Balancer permits SSL policies with weak cipher suites🟢⚪🟢 x2, ⚪ x1no data
🛡️ Google Storage Bucket is anonymously or publicly accessible🟢1🟢 x6no data

Internal Rules

RulePoliciesFlags
✉️ dec-x-6ed261671
✉️ dec-x-14f5fc251
✉️ dec-x-75db76ad1
✉️ dec-x-791dab131
✉️ dec-x-3181f3591
✉️ dec-x-995424b72
✉️ dec-x-a4e033891
✉️ dec-x-c0a7793e1
✉️ dec-x-d5fbfc401
✉️ dec-x-d95ea48b1