Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

April 24 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.GCP.DR.01Ensure That Cloud SQL Database Instances Are Configured With Automated BackupsLowModification
  • Logic
  • CloudSql should have settings.backupConfiguration.enabled=true
  • CloudSql where instanceType!="READ_REPLICA_INSTANCE" should have settings.backupConfiguration.enabled=true
  • GCP CIS Foundations Benchmark v1.3.0
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • GCP CIS Foundations Benchmark v2.0.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Critical Security Controls v8
  • GCP ISO 27001:2022
  • GCP APRA 234
  • GCP CSA CCM v4
  • GCP ENS 2022 Spain
  • GCP RMiT Malaysia
  • GCP ACSC ISM
  • GCP FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP SOX (Section 404)
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP ISO 27002:2022
  • GCP ASD Essential Eight
  • GCP CMMC 2.0 v1.02
  • GCP NIST SP 800-171 R2
  • GCP New Zealand ISM v3.6
  • GCP CIS Foundations Benchmark v3.0.0
  • GCP NIST CSF v1.1
  • GCP HIPAA
  • GCP CIS Foundations Benchmark v1.1.0
  • GCP CIS Foundations Benchmark v1.2.0
  • GCP CloudGuard Best Practices
D9.AZU.NET.VirtualMachine.TCPdbEnsure no Virtual Machine Allows Incoming Traffic from 0.0.0.0/0 to Known DB-TCP PortsHighModification
  • Name
  • Logic
  • Ensure no Virtual Machine allow incoming traffic from 0.0.0.0/0 to Known DB-TCP ports
  • VirtualMachine where isPublic=true should not have nics contain [ networkSecurityGroup.inboundSecurityRules contain [protocol in ('TCP','All')] and networkSecurityGroup.inboundSecurityRules contain [ sourceAddressPrefixes contain [ '0.0.0.0/0' ] and destinationAddressPrefixes contain [ '0.0.0.0/0' ]] and networkSecurityGroup.inboundSecurityRules contain [ destinationPortRanges contain [destinationPort in($CloudGuard_Known_DB_TCP_Ports) ] ] ]
  • Ensure no Virtual Machine Allows Incoming Traffic from 0.0.0.0/0 to Known DB-TCP Ports
  • VirtualMachine where isPublic=true should not have nics contain [ networkSecurityGroup.inboundSecurityRules contain [protocol in ('TCP','All') and action like '%allow%'] and networkSecurityGroup.inboundSecurityRules contain [ sourceAddressPrefixes contain [ '0.0.0.0/0' ] and destinationAddressPrefixes contain [ '0.0.0.0/0' ]] and networkSecurityGroup.inboundSecurityRules contain [ destinationPortRanges contain [destinationPort in($CloudGuard_Known_DB_TCP_Ports) ] ] ]
  • Azure LGPD
  • Azure Security Risk Management
  • Azure PCI DSS v4
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v4
  • CloudGuard Azure Default Ruleset
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure ENS 2022 Spain
  • Azure ACSC ISM
  • Azure PCI DSS v3.2.1
  • Azure NIST SP 800-53 R4
  • Azure SOX (Section 404)
  • Azure Secure Controls Framework (SCF) v2023.1
  • Azure CSA CCM v3
  • Azure ISO 27001:2013
  • Azure HIPAA
  • Azure CloudGuard Network Security Alerts
  • Azure CloudGuard Best Practices
  • Azure New Zealand ISM v3.4
D9.AZU.NET.VirtualMachine.UDPdbEnsure no Virtual Machine Allows Incoming Traffic from 0.0.0.0/0 to Known DB-UDP PortsHighModification
  • Name
  • Logic
  • Ensure no Virtual Machine allow incoming traffic from 0.0.0.0/0 to Known DB-UDP ports
  • VirtualMachine where isPublic=true should not have nics contain [ networkSecurityGroup.inboundSecurityRules contain [protocol in ('UDP','All')] and networkSecurityGroup.inboundSecurityRules contain [ sourceAddressPrefixes contain [ '0.0.0.0/0' ] and destinationAddressPrefixes contain [ '0.0.0.0/0' ]] and networkSecurityGroup.inboundSecurityRules contain [ destinationPortRanges contain [destinationPort in($CloudGuard_Known_DB_UDP_Ports) ] ] ]
  • Ensure no Virtual Machine Allows Incoming Traffic from 0.0.0.0/0 to Known DB-UDP Ports
  • VirtualMachine where isPublic=true should not have nics contain [ networkSecurityGroup.inboundSecurityRules contain [protocol in ('UDP','All') and action like '%allow%'] and networkSecurityGroup.inboundSecurityRules contain [ sourceAddressPrefixes contain [ '0.0.0.0/0' ] and destinationAddressPrefixes contain [ '0.0.0.0/0' ]] and networkSecurityGroup.inboundSecurityRules contain [ destinationPortRanges contain [destinationPort in($CloudGuard_Known_DB_UDP_Ports) ] ] ]
  • Azure LGPD
  • Azure Security Risk Management
  • Azure PCI DSS v4
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v4
  • CloudGuard Azure Default Ruleset
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure ENS 2022 Spain
  • Azure ACSC ISM
  • Azure PCI DSS v3.2.1
  • Azure NIST SP 800-53 R4
  • Azure SOX (Section 404)
  • Azure Secure Controls Framework (SCF) v2023.1
  • Azure CSA CCM v3
  • Azure ISO 27001:2013
  • Azure HIPAA
  • Azure CloudGuard Network Security Alerts
  • Azure CloudGuard Best Practices
  • Azure New Zealand ISM v3.4
D9.AZU.NET.VirtualMachine.TCPEnsure no Virtual Machine Allows Incoming Traffic from 0.0.0.0/0 to Known TCP PortsHighModification
  • Name
  • Logic
  • Severity
  • Ensure no Virtual Machine allow incoming traffic from 0.0.0.0/0 to Known TCP ports
  • VirtualMachine where isPublic=true should not have nics contain [ networkSecurityGroup.inboundSecurityRules contain [protocol in ('TCP','All')] and networkSecurityGroup.inboundSecurityRules contain [ sourceAddressPrefixes contain [ '0.0.0.0/0' ] and destinationAddressPrefixes contain [ '0.0.0.0/0' ]] and networkSecurityGroup.inboundSecurityRules contain [ destinationPortRanges contain [destinationPort in($CloudGuard_Known_TCP_Ports) ] ] ]
  • Medium
  • Ensure no Virtual Machine Allows Incoming Traffic from 0.0.0.0/0 to Known TCP Ports
  • VirtualMachine where isPublic=true should not have nics contain [ networkSecurityGroup.inboundSecurityRules contain [protocol in ('TCP','All') and action like '%allow%'] and networkSecurityGroup.inboundSecurityRules contain [ sourceAddressPrefixes contain [ '0.0.0.0/0' ] and destinationAddressPrefixes contain [ '0.0.0.0/0' ]] and networkSecurityGroup.inboundSecurityRules contain [ destinationPortRanges contain [destinationPort in($CloudGuard_Known_TCP_Ports) ] ] ]
  • High
  • Azure LGPD
  • Azure Security Risk Management
  • Azure CIS Foundations Benchmark v1.5.0
  • Azure PCI DSS v4
  • Azure CIS Foundations Benchmark v2.0.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v4
  • CloudGuard Azure Default Ruleset
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure ENS 2022 Spain
  • Azure RMiT Malaysia
  • Azure ACSC ISM
  • Azure CIS Critical Security Controls v8
  • Azure PCI DSS v3.2.1
  • Azure NIST SP 800-53 R4
  • Azure SOX (Section 404)
  • Azure Secure Controls Framework (SCF) v2023.1
  • Azure CIS Foundations Benchmark v2.1.0
  • Azure CSA CCM v3
  • Azure ISO 27001:2013
  • Azure SOC 2 (AICPA TSC 2017 Controls)
  • Azure HIPAA
  • Azure CloudGuard Network Security Alerts
  • Azure CloudGuard Best Practices
  • Azure New Zealand ISM v3.4
D9.AZU.NET.VirtualMachine.UDPEnsure no Virtual Machine Allows Incoming Traffic from 0.0.0.0/0 to Known UDP PortsHighModification
  • Name
  • Logic
  • Severity
  • Ensure no Virtual Machine allow incoming traffic from 0.0.0.0/0 to Known UDP ports
  • VirtualMachine where isPublic=true should not have nics contain [ networkSecurityGroup.inboundSecurityRules contain [protocol in ('UDP','All')] and networkSecurityGroup.inboundSecurityRules contain [ sourceAddressPrefixes contain [ '0.0.0.0/0' ] and destinationAddressPrefixes contain [ '0.0.0.0/0' ]] and networkSecurityGroup.inboundSecurityRules contain [ destinationPortRanges contain [destinationPort in($CloudGuard_Known_UDP_Ports) ] ] ]
  • Medium
  • Ensure no Virtual Machine Allows Incoming Traffic from 0.0.0.0/0 to Known UDP Ports
  • VirtualMachine where isPublic=true should not have nics contain [ networkSecurityGroup.inboundSecurityRules contain [protocol in ('UDP','All') and action like '%allow%'] and networkSecurityGroup.inboundSecurityRules contain [ sourceAddressPrefixes contain [ '0.0.0.0/0' ] and destinationAddressPrefixes contain [ '0.0.0.0/0' ]] and networkSecurityGroup.inboundSecurityRules contain [ destinationPortRanges contain [destinationPort in($CloudGuard_Known_UDP_Ports) ] ] ]
  • High
  • Azure LGPD
  • Azure Security Risk Management
  • Azure CIS Foundations Benchmark v1.5.0
  • Azure PCI DSS v4
  • Azure CIS Foundations Benchmark v2.0.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v4
  • CloudGuard Azure Default Ruleset
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure ENS 2022 Spain
  • Azure RMiT Malaysia
  • Azure ACSC ISM
  • Azure CIS Critical Security Controls v8
  • Azure PCI DSS v3.2.1
  • Azure NIST SP 800-53 R4
  • Azure SOX (Section 404)
  • Azure Secure Controls Framework (SCF) v2023.1
  • Azure CIS Foundations Benchmark v2.1.0
  • Azure CSA CCM v3
  • Azure ISO 27001:2013
  • Azure SOC 2 (AICPA TSC 2017 Controls)
  • Azure HIPAA
  • Azure CloudGuard Network Security Alerts
  • Azure CloudGuard Best Practices
  • Azure New Zealand ISM v3.4
D9.AWS.LOG.04Ensure that AWS Config is Enabled in All RegionsHighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS ASD Essential Eight
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS NIST CSF v1.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.LOG.39Ensure that DNS query logging is enabled for your Amazon Route 53 hosted zonesHighModification
  • Logic
  • Route53HostedZone should have queryLoggingConfigs
  • Route53HostedZone where metadata.type like 'public' should have queryLoggingConfigs
  • AWS NIST SP 800-53 R5
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP)
  • AWS APRA 234
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
D9.AWS.IAM.186Ensure that Data Lake's 'allowFullTableExternalDataAccess' setting is disabledHighRemoval
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS ISO 27002:2022
  • AWS NIST CSF v1.1

April 17 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.49Ensure that AWS Secrets Manager secret rotation interval is smaller than 30 daysLowModification
  • Name
  • Ensure that AWS Secret Manager Secret rotation interval is smaller than 30 days
  • Ensure that AWS Secrets Manager secret rotation interval is smaller than 30 days
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI DSS v4
  • AWS HITRUST CSF v11.0
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ISO 27001:2022
  • AWS Foundational Security Best Practices (FSBP)
  • AWS APRA 234
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS NIST SP 800-172
  • AWS PIPEDA
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS ISO 27002:2022
  • AWS NIST CSF v1.1
  • AWS CloudGuard Best Practices
  • AWS HITRUST CSF v9.2
  • AWS ITSG-33 Canada
  • AWS MITRE ATT&CK Framework v10
D9.AWS.IAM.83Ensure that SQS policy does not allow all actions from all principalsHighModification
  • Name
  • Ensure that SQS policy won't allow all actions from all principals
  • Ensure that SQS policy does not allow all actions from all principals
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI DSS v4
  • AWS HITRUST CSF v11.0
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ISO 27001:2022
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS NIST SP 800-172
  • AWS PIPEDA
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS ISO 27002:2022
  • AWS NIST CSF v1.1
  • AWS CloudGuard Best Practices
  • AWS HITRUST CSF v9.2
  • AWS ITSG-33 Canada
  • AWS MITRE ATT&CK Framework v10
D9.AWS.OPE.107Ensure that DAX Parameter Group does not require rebootHighModification
  • Name
  • Ensure that DAX Parameter Group doesn't require reboot
  • Ensure that DAX Parameter Group does not require reboot
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS NY DFS 23 CRR 500
  • AWS New Zealand ISM v3.6
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS ISO 27002:2022
  • AWS NIST CSF v1.1
D9.AWS.IAM.58Ensure SNS Topics administrative actions are not publicly executable without a conditionCriticalModification
  • Name
  • Ensure SNS Topics administrative actions aren't publicly executable without a condition
  • Ensure SNS Topics administrative actions are not publicly executable without a condition
  • AWS NIST SP 800-53 R5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI DSS v4
  • AWS HITRUST CSF v11.0
  • CloudGuard AWS Default Ruleset
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO 27001:2022
  • AWS APRA 234
  • AWS ENS 2022 Spain
  • AWS MLPS 2.0
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS ISO 27002:2022
  • AWS NIST CSF v1.1
  • AWS CloudGuard Best Practices
  • AWS HITRUST CSF v9.2
  • AWS ITSG-33 Canada
  • AWS MITRE ATT&CK Framework v10
D9.GCP.CRY.27Ensure that AlloyDB cluster is encrypted using CMEKHighNew
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP CSA CCM v4
  • GCP ENS 2022 Spain
  • GCP ACSC ISM
  • GCP FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP SWIFT Customer Security Programme CSCF
  • GCP NIST SP 800-172
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP CMMC 2.0 v1.02
  • GCP NIST SP 800-171 R2
  • GCP NY DFS 23 CRR 500
  • GCP NIST CSF v1.1
  • GCP SOC 2 (AICPA TSC 2017 Controls)
  • GCP HIPAA
  • GCP EU GDPR
D9.GCP.CRY.28Ensure that AlloyDB cluster continuous backup is encrypted using CMEKHighNew
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP CSA CCM v4
  • GCP ENS 2022 Spain
  • GCP ACSC ISM
  • GCP FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP SWIFT Customer Security Programme CSCF
  • GCP NIST SP 800-172
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP CMMC 2.0 v1.02
  • GCP NIST SP 800-171 R2
  • GCP NY DFS 23 CRR 500
  • GCP NIST CSF v1.1
  • GCP SOC 2 (AICPA TSC 2017 Controls)
  • GCP HIPAA
  • GCP EU GDPR
D9.GCP.CRY.29Ensure that AlloyDB backup is encryptedHighNew
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP CSA CCM v4
  • GCP ACSC ISM
  • GCP FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP FFIEC Cybersecurity Assessment Tool (CAT)
  • GCP NIST SP 800-172
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP CMMC 2.0 v1.02
  • GCP NIST SP 800-171 R2
  • GCP NY DFS 23 CRR 500
  • GCP NIST CSF v1.1
  • GCP SOC 2 (AICPA TSC 2017 Controls)
  • GCP HIPAA
  • GCP EU GDPR
D9.GCP.DR.06Ensure that AlloyDB cluster has backup policy enabledHighNew
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP CSA CCM v4
  • GCP ENS 2022 Spain
  • GCP ACSC ISM
  • GCP FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP NIST SP 800-172
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP ASD Essential Eight
  • GCP CMMC 2.0 v1.02
  • GCP NIST SP 800-171 R2
  • GCP NIST CSF v1.1
  • GCP SOC 2 (AICPA TSC 2017 Controls)
  • GCP HIPAA
D9.GCP.MON.07Ensure that AlloyDB cluster is healthyHighNew
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP CSA CCM v4
  • GCP ENS 2022 Spain
  • GCP ACSC ISM
  • GCP FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP SWIFT Customer Security Programme CSCF
  • GCP FFIEC Cybersecurity Assessment Tool (CAT)
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP NIST SP 800-171 R2
  • GCP NY DFS 23 CRR 500
  • GCP NIST CSF v1.1
  • GCP SOC 2 (AICPA TSC 2017 Controls)
  • GCP HIPAA
  • GCP EU GDPR
D9.GCP.MON.08Ensure that AlloyDB instance is healthyHighNew
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP CSA CCM v4
  • GCP ENS 2022 Spain
  • GCP ACSC ISM
  • GCP FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP SWIFT Customer Security Programme CSCF
  • GCP FFIEC Cybersecurity Assessment Tool (CAT)
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP NIST SP 800-171 R2
  • GCP NY DFS 23 CRR 500
  • GCP NIST CSF v1.1
  • GCP SOC 2 (AICPA TSC 2017 Controls)
  • GCP HIPAA
  • GCP EU GDPR
D9.GCP.NET.81Ensure that AlloyDB instance enforces using connectorsLowNew
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP CSA CCM v4
  • GCP ENS 2022 Spain
  • GCP ACSC ISM
  • GCP FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP FFIEC Cybersecurity Assessment Tool (CAT)
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP NIST SP 800-171 R2
  • GCP NIST CSF v1.1
  • GCP SOC 2 (AICPA TSC 2017 Controls)
  • GCP EU GDPR
D9.GCP.OPE.30Ensure AlloyDB cluster version is latestInformationalNew
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP FedRAMP R5 (moderate)
  • GCP FFIEC Cybersecurity Assessment Tool (CAT)
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP CMMC 2.0 v1.02
  • GCP NIST SP 800-171 R2
  • GCP NIST CSF v1.1

...