Skip to main content

πŸ’Ό CC6.6-4 Implements Boundary Protection Systems

Description​

Boundary protection systems (for example, firewalls, demilitarized zones, and intrusion detection systems) are implemented to protect external access points from attempts and unauthorized access and are monitored to detect such attempts.

Similar​

  • Internal
    • ID: dec-c-80050f6e

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (4)​

PolicyLogic CountFlags
πŸ“ Google Cloud SQL Server Instance remote access Database Flag is not set to off 🟒1🟒 x6
πŸ“ Google GCE Instance Enable Connecting to Serial Ports is not disabled 🟒1🟒 x6
πŸ“ Google GCE Instance IP Forwarding is not disabled. 🟒1🟒 x6
πŸ“ Google GCE Network has Firewall Rules which allow unrestricted SSH access from the Internet 🟒1🟒 x6