πΌ CC6.6-4 Implements Boundary Protection Systems
- Contextual name: πΌ CC6.6-4 Implements Boundary Protection Systems
- ID:
/frameworks/soc-2/cc6/06/04
- Located in: πΌ CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.
Descriptionβ
Boundary protection systems (for example, firewalls, demilitarized zones, and intrusion detection systems) are implemented to protect external access points from attempts and unauthorized access and are monitored to detect such attempts.
Similarβ
- Internal
- ID:
dec-c-80050f6e
- ID:
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (4)β
Policy | Logic Count | Flags |
---|---|---|
π Google Cloud SQL Server Instance remote access Database Flag is not set to off π’ | 1 | π’ x6 |
π Google GCE Instance Enable Connecting to Serial Ports is not disabled π’ | 1 | π’ x6 |
π Google GCE Instance IP Forwarding is not disabled. π’ | 1 | π’ x6 |
π Google GCE Network has Firewall Rules which allow unrestricted SSH access from the Internet π’ | 1 | π’ x6 |