Skip to main content

💼 CC6.6-4 Implements Boundary Protection Systems

  • ID: /frameworks/soc-2/cc6/06/04

Description

Boundary protection systems (for example, firewalls, demilitarized zones, and intrusion detection systems) are implemented to protect external access points from attempts and unauthorized access and are monitored to detect such attempts.

Similar

  • Internal
    • ID: dec-c-80050f6e

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (4)

PolicyLogic CountFlagsCompliance
🛡️ Google Cloud SQL Server Instance remote access Database Flag is not set to off🟢1🟢 x6no data
🛡️ Google GCE Instance Enable Connecting to Serial Ports is not disabled🟢1🟢 x6no data
🛡️ Google GCE Instance IP Forwarding is not disabled.🟢1🟢 x6no data
🛡️ Google GCE Network allows unrestricted SSH traffic🟢1🟢 x6no data