Skip to main content

πŸ’Ό 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates

Description​

As follows:

  • Critical or high-security patches/updates (identified according to the risk ranking process at Requirement 6.3.1) are installed within one month of release.
  • All other applicable security patches/updates are installed within an appropriate time frame as determined by the entity's assessment of the criticality of the risk to the environment as identified according to the risk ranking process at Requirement 6.3.1.

Similar​

  • Sections
    • /frameworks/pci-dss-v4.0/06/03/03
    • /frameworks/aws-fsbp-v1.0.0/dms/06
    • /frameworks/aws-fsbp-v1.0.0/ecs/10
    • /frameworks/aws-fsbp-v1.0.0/elastic-beanstalk/02
    • /frameworks/aws-fsbp-v1.0.0/elasticache/02
    • /frameworks/aws-fsbp-v1.0.0/mq/03
    • /frameworks/aws-fsbp-v1.0.0/opensearch/10
    • /frameworks/aws-fsbp-v1.0.0/rds/13
    • /frameworks/aws-fsbp-v1.0.0/rds/35
    • /frameworks/aws-fsbp-v1.0.0/ssm/02
    • /frameworks/aws-fsbp-v1.0.0/ssm/03

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [DMS.6] DMS replication instances should have automatic minor version upgrade enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ECS.10] ECS Fargate services should run on the latest Fargate platform version
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ElasticBeanstalk.2] Elastic Beanstalk managed platform updates should be enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [ElastiCache.2] ElastiCache clusters should have automatic minor version upgrades enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [MQ.3] Amazon MQ brokers should have automatic minor version upgrade enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Opensearch.10] OpenSearch domains should have the latest software update installed
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.13] RDS automatic minor version upgrades should be enabled11
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [RDS.35] RDS DB clusters should have automatic minor version upgrade enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [SSM.2] Amazon EC2 instances managed by Systems Manager should have a patch compliance status of COMPLIANT after a patch installation
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [SSM.3] Amazon EC2 instances managed by Systems Manager should have an association compliance status of COMPLIANT
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates1

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS RDS Instance Auto Minor Version Upgrade is not enabled 🟠🟒1🟠 x1, 🟒 x6