💼 7.1.2 Restrict access to privileged user IDs to least privileges necessary to perform job responsibilities.
- ID:
/frameworks/pci-dss-v3.2.1/07/01/02
Description
Empty...
Similar
- Sections
/frameworks/pci-dss-v4.0/07/02/02
- Internal
- ID:
dec-c-d59733bc
- ID:
Similar Sections (Take Policies From)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 PCI DSS v4.0 → 💼 7.2.2 Access is assigned to users, including privileged users, based on job classification, function, and least privileges. | 5 | no data |
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 PCI DSS v4.0 → 💼 7.2.2 Access is assigned to users, including privileged users, based on job classification, function, and least privileges. | 5 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (5)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ Consumer Google Accounts are used🟢⚪ | 🟢 x2, ⚪ x1 | no data | |
| 🛡️ Google GCE Instance is configured to use the Default Service Account with full access to all Cloud APIs🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GKE Cluster Node Pool uses default Service account🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google IAM Policy Binding Member (User) is assigned a basic role🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Resource Manager Organization has a Redis IAM role assigned🟢 | 1 | 🟢 x6 | no data |