💼 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches.
- ID:
/frameworks/pci-dss-v3.2.1/06/02
Description
Install critical security patches within one month of release.
Critical security patches should be identified according to the risk ranking process defined in Requirement 6.1.
Similar
- Sections
/frameworks/pci-dss-v4.0/06/03/03/frameworks/aws-fsbp-v1.0.0/ssm/02
- Internal
- ID:
dec-c-dd6c916a
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [SSM.2] Amazon EC2 instances managed by Systems Manager should have a patch compliance status of COMPLIANT after a patch installation | no data | ||||
| 💼 PCI DSS v4.0 → 💼 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates | 4 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 PCI DSS v4.0 → 💼 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates | 4 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (4)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS DMS Replication Instance Auto Minor Version Upgrade is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS ElastiCache Redis Cluster Auto Minor Version Upgrade is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Instance Auto Minor Version Upgrade is not enabled🟠🟢 | 1 | 🟠 x1, 🟢 x6 | no data |
| 🛡️ AWS RDS Multi-AZ Cluster Auto Minor Version Upgrade is not enabled🟢 | 1 | 🟢 x6 | no data |