Skip to main content

Repository → 💼 SOC 2 → 💼 CC6 Logical and Physical Access Controls → 💼 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.

💼 CC6.6-4 Implements Boundary Protection Systems

  • ID: /frameworks/soc-2/cc6/06/04

Description

Boundary protection systems (for example, firewalls, demilitarized zones, and intrusion detection systems) are implemented to protect external access points from attempts and unauthorized access and are monitored to detect such attempts.

Similar

  • Internal
    • ID: dec-c-80050f6e

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (4)

PolicyLogic CountFlagsCompliance
🛡️ Google Cloud SQL Server Instance remote access Database Flag is not set to off🟢1🟢 x6no data
🛡️ Google GCE Instance Enable Connecting to Serial Ports is not disabled🟢1🟢 x6no data
🛡️ Google GCE Instance IP Forwarding is not disabled.🟢1🟢 x6no data
🛡️ Google GCE Network has Firewall Rules which allow unrestricted SSH access from the Internet🟢1🟢 x6no data