Skip to main content

πŸ’Ό PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected

  • Contextual name: πŸ’Ό PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected
  • ID: /frameworks/nist-csf-v2.0/pr-ds/10
  • Located in: πŸ’Ό Data Security (PR.DS)

Description​

  1. Remove data that must remain confidential (e.g., from processors and memory) as soon as it is no longer needed
  2. Protect data in use from access by other users and processes of the same platform

Similar​

  • Sections
    • /frameworks/nist-csf-v1.1/pr-ds/05
    • /frameworks/nist-sp-800-53-r5/ac/02
    • /frameworks/nist-sp-800-53-r5/ac/03
    • /frameworks/nist-sp-800-53-r5/ac/04
    • /frameworks/nist-sp-800-53-r5/au/09
    • /frameworks/nist-sp-800-53-r5/au/13
    • /frameworks/nist-sp-800-53-r5/ca/03
    • /frameworks/nist-sp-800-53-r5/cp/09
    • /frameworks/nist-sp-800-53-r5/sa/08
    • /frameworks/nist-sp-800-53-r5/sc/04
    • /frameworks/nist-sp-800-53-r5/sc/07
    • /frameworks/nist-sp-800-53-r5/sc/11
    • /frameworks/nist-sp-800-53-r5/sc/13
    • /frameworks/nist-sp-800-53-r5/sc/24
    • /frameworks/nist-sp-800-53-r5/sc/32
    • /frameworks/nist-sp-800-53-r5/sc/38
    • /frameworks/nist-sp-800-53-r5/sc/40
    • /frameworks/nist-sp-800-53-r5/sc/43
    • /frameworks/nist-sp-800-53-r5/si/03
    • /frameworks/nist-sp-800-53-r5/si/04
    • /frameworks/nist-sp-800-53-r5/si/07
    • /frameworks/nist-sp-800-53-r5/si/10
    • /frameworks/nist-sp-800-53-r5/si/16

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v1.1 β†’ πŸ’Ό PR.DS-5: Protections against data leaks are implemented4766
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-2 Account Management132034
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-3 Access Enforcement15534
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AC-4 Information Flow Enforcement326885
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AU-9 Protection of Audit Information724
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό AU-13 Monitoring for Information Disclosure3
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CA-3 Information Exchange7
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό CP-9 System Backup84
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SA-8 Security and Privacy Engineering Principles337
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-4 Information in Shared System Resources2
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-7 Boundary Protection29447
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-11 Trusted Path1
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-13 Cryptographic Protection413
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-24 Fail in Known State
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-32 System Partitioning1
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-38 Operations Security
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-40 Wireless Link Protection4
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SC-43 Usage Restrictions
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-3 Malicious Code Protection105
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-4 System Monitoring2518
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-7 Software, Firmware, and Information Integrity171943
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-10 Information Input Validation6
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό SI-16 Memory Protection

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (108)​

PolicyLogic CountFlags
πŸ“ AWS Account EBS Volume Encryption Attribute is not enabled in all regions 🟒1🟒 x6
πŸ“ AWS Account IAM Access Analyzer is not enabled for all regions 🟒1🟒 x6
πŸ“ AWS Account Object-level CloudTrail Logging for Read Events for S3 Buckets is not enabled 🟒1🟒 x6
πŸ“ AWS Account Object-level CloudTrail Logging for Write Events for S3 Buckets is not enabled 🟒1🟒 x6
πŸ“ AWS Account Root User credentials were used is the last 30 days 🟒1🟒 x6
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6
πŸ“ AWS API Gateway API Route Authorization Type is not configured 🟒1🟒 x6
πŸ“ AWS API Gateway REST API Stage is not configured to use an SSL certificate for authentication 🟒1🟒 x6
πŸ“ AWS CloudFront Web Distribution Cache Behaviors allow unencrypted traffic 🟒1🟒 x6
πŸ“ AWS CloudFront Web Distribution does not encrypt traffic to Custom Origins 🟒1🟒 x6
πŸ“ AWS CloudFront Web Distribution Default Root Object is not configured 🟒1🟒 x6
πŸ“ AWS CloudFront Web Distribution uses default SSL/TLS certificate 🟒1🟒 x6
πŸ“ AWS CloudFront Web Distribution uses Dedicated IP for SSL 🟒1🟒 x6
πŸ“ AWS CloudFront Web Distribution uses outdated SSL protocols with Custom Origins 🟒1🟒 x6
πŸ“ AWS CloudTrail is not encrypted with KMS CMK 🟒1🟒 x6
πŸ“ AWS CloudTrail Log File Validation is not enabled 🟒1🟒 x6
πŸ“ AWS DAX Cluster Server-Side Encryption is not enabled 🟒1🟒 x6
πŸ“ AWS DMS Endpoint doesn't use SSL 🟒1🟒 x6
πŸ“ AWS DMS Replication Instance is publicly accessible 🟒1🟒 x6
πŸ“ AWS DynamoDB Table Point In Time Recovery is not enabled 🟒1🟒 x6
πŸ“ AWS EBS Attached Volume is not encrypted 🟒1🟒 x6
πŸ“ AWS EBS Snapshot is publicly accessible 🟒1🟒 x6
πŸ“ AWS EC2 Auto Scaling Group behind ELB assigns public IP to instances 🟒1🟒 x6
πŸ“ AWS EC2 Auto Scaling Group Launch Template is not configured to require IMDSv2 🟒1🟒 x6
πŸ“ AWS EC2 Default Security Group does not restrict all traffic 🟒1🟒 x6
πŸ“ AWS EC2 Instance IMDSv2 is not enabled 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted CIFS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted DNS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted FTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted ICMP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted NetBIOS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted RPC traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted SMTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MongoDB 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MSSQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MySQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to PostgreSQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted Telnet traffic 🟒1🟒 x6
πŸ“ AWS EFS File System encryption is not enabled 🟒1🟒 x6
πŸ“ AWS IAM Policy allows full administrative privileges 🟒1🟒 x6
πŸ“ AWS IAM Server Certificate is expired 🟒1🟒 x6
πŸ“ AWS IAM User has inline or directly attached policies 🟒1🟠 x1, 🟒 x5
πŸ“ AWS IAM User with credentials unused for 45 days or more is not disabled 🟒1🟒 x6
πŸ“ AWS RDS Instance Encryption is not enabled 🟒1🟒 x6
πŸ“ AWS RDS Instance is publicly accessible and in an unrestricted public subnet 🟒1🟒 x6
πŸ“ AWS RDS Instance uses default endpoint port 🟒1🟒 x6
πŸ“ AWS RDS Snapshot is publicly accessible 🟒1🟒 x6
πŸ“ AWS S3 Bucket is not configured to block public access 🟒1🟒 x6
πŸ“ AWS S3 Bucket Lifecycle Configuration is not enabled 🟒1🟒 x6
πŸ“ AWS S3 Bucket Object Lock is not enabled 🟠🟒1🟠 x1, 🟒 x6
πŸ“ AWS S3 Bucket Policy is not set to deny HTTP requests 🟒1🟒 x6
πŸ“ AWS VPC Network ACL exposes admin ports to public internet ports 🟒1🟒 x6
πŸ“ Azure App Service Authentication is disabled and Basic Authentication is enabled 🟒1🟒 x6
πŸ“ Azure App Service Basic Authentication is enabled 🟒🟒 x3
πŸ“ Azure App Service FTP deployments are not disabled 🟒1🟒 x6
πŸ“ Azure App Service HTTPS Only configuration is not enabled 🟒1🟒 x6
πŸ“ Azure Cosmos DB Account Private Endpoints are not used 🟒1🟒 x6
πŸ“ Azure Cosmos DB Account Virtual Network Filter is not enabled 🟒1🟒 x6
πŸ“ Azure Cosmos DB Entra ID Client Authentication is not used 🟒🟒 x3
πŸ“ Azure Diagnostic Setting Logs export to Storage Account not encrypted with Customer-managed key 🟒1🟒 x6
πŸ“ Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure Network Security Group allows public access to HTTP(S) ports 🟒1🟒 x6
πŸ“ Azure Network Security Group allows public access to RDP port 🟒1🟒 x6
πŸ“ Azure Network Security Group allows public access to SSH port 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Infrastructure Double Encryption is not enabled 🟒1🟒 x6
πŸ“ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP) 🟒1🟒 x6
πŸ“ Azure Storage Account Allow Blob Anonymous Access is enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Cross Tenant Replication is enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Secure Transfer Required is not enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Trusted Azure Services are not enabled as networking exceptions 🟒1🟒 x6
πŸ“ Azure Subscription Network Watcher is not enabled in every available region 🟒1🟒 x6
πŸ“ Azure Unattached Managed Disk is not encrypted with Customer-managed key 🟒1🟒 x6
πŸ“ Azure Virtual Machine OS and Data disks are not encrypted with Customer-managed key 🟒1🟒 x6
πŸ“ Consumer Google Accounts are used 🟒🟒 x3
πŸ“ Google API Key is not restricted for unused APIs 🟒1🟒 x6
πŸ“ Google API Key is not rotated every 90 days 🟒1🟒 x6
πŸ“ Google BigQuery Dataset is anonymously or publicly accessible 🟒1🟒 x6
πŸ“ Google Cloud DNS Managed Zone DNSSEC is not enabled 🟒1🟒 x6
πŸ“ Google Cloud MySQL Instance allows anyone to connect with administrative privileges 🟒🟒 x3
πŸ“ Google Cloud MySQL Instance Skip_show_database Database Flag is not set to on 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance Automated Backups are not configured 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance External Authorized Networks do not whitelist all public IP addresses 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance has public IP addresses 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance 3625 (trace flag) Database Flag is not set to on 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance cross db ownership chaining Database Flag is not set to off 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance external scripts enabled Database Flag is not set to off 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance user connections Database Flag is set to a limiting (other than 0) value 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance user options Database Flag is configured 🟒1🟒 x6
πŸ“ Google GCE Instance has a public IP address 🟒1🟒 x6
πŸ“ Google GCE Instance is configured to use the Default Service Account with full access to all Cloud APIs 🟒1🟒 x6
πŸ“ Google GCE Instance IP Forwarding is not disabled. 🟒1🟒 x6
πŸ“ Google GCE Instance OS Login is not enabled 🟒1🟒 x6
πŸ“ Google GCE Network has Firewall Rules which allow unrestricted SSH access from the Internet 🟒1🟒 x6
πŸ“ Google GCE Subnetwork Flow Logs are not enabled 🟒1🟒 x6
πŸ“ Google HTTPS or SSL Proxy Load Balancer permits SSL policies with weak cipher suites 🟒🟒 x3
πŸ“ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level 🟒1🟒 x6
πŸ“ Google KMS Crypto Key is anonymously or publicly accessible 🟠🟒🟠 x1, 🟒 x3
πŸ“ Google Logging Log Sink exports logs to a Storage Bucket without Bucket Lock 🟒1🟒 x6
πŸ“ Google Project has API Keys 🟒1🟠 x1, 🟒 x5
πŸ“ Google Storage Bucket is anonymously or publicly accessible 🟒1🟒 x6
πŸ“ Google Storage Bucket Uniform Bucket-Level Access is not enabled 🟒1🟒 x6
πŸ“ Google User has both Service Account Admin and Service Account User roles assigned 🟒1🟒 x6