💼 7.2.1 Coverage of all system components.
- ID:
/frameworks/pci-dss-v3.2.1/07/02/01
Description
Empty...
Similar
- Sections
/frameworks/pci-dss-v4.0/07/03/01/frameworks/aws-fsbp-v1.0.0/ec2/01/frameworks/aws-fsbp-v1.0.0/iam/01/frameworks/aws-fsbp-v1.0.0/iam/02/frameworks/aws-fsbp-v1.0.0/iam/04/frameworks/aws-fsbp-v1.0.0/lambda/01/frameworks/aws-fsbp-v1.0.0/opensearch/01/frameworks/aws-fsbp-v1.0.0/rds/01/frameworks/aws-fsbp-v1.0.0/rds/02/frameworks/aws-fsbp-v1.0.0/s3/02/frameworks/aws-fsbp-v1.0.0/s3/03
- Internal
- ID:
dec-c-ff4b9348
- ID:
Similar Sections (Take Policies From)
Similar Sections (Give Policies To)
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 PCI DSS v4.0 → 💼 7.3.1 An access control system(s) is in place that restricts access based on a user's need to know and covers all system components. | 10 | no data |
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (10)
| Policy | Logic Count | Flags | Compliance |
|---|---|---|---|
| 🛡️ AWS Account Root User has active access keys🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EBS Snapshot is publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM Policy allows full administrative privileges🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User has inline or directly attached policies🟢 | 1 | 🟠 x1, 🟢 x5 | no data |
| 🛡️ AWS OpenSearch Domain is not encrypted at rest🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Instance is publicly accessible and in an unrestricted public subnet🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Snapshot is publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS S3 Bucket ACL allows public read or write access🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS S3 Bucket Policy allows public read or write access🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level🟢 | 1 | 🟢 x6 | no data |