last sync: 2025-Apr-29 17:16:02 UTC

Windows machines should meet requirements for 'Security Options - Recovery console'

Azure BuiltIn Policy definition

Source Azure Portal
Display name Windows machines should meet requirements for 'Security Options - Recovery console'
Id f71be03e-e25b-4d0f-b8bc-9b3e309b66c0
Version 3.0.0
Details on versioning
Versioning Versions supported for Versioning: 1
3.0.0
Built-in Versioning [Preview]
Category Guest Configuration
Microsoft Learn
Description Windows machines should have the specified Group Policy settings in the category 'Security Options - Recovery console' for allowing floppy copy and access to all drives and folders. This policy requires that the Guest Configuration prerequisites have been deployed to the policy assignment scope. For details, visit https://aka.ms/gcpol.
Cloud environments AzureCloud = true
AzureUSGovernment = true
AzureChinaCloud = unknown
Available in AzUSGov The Policy is available in AzureUSGovernment cloud. Version: '2.0.0'
Repository: Azure-Policy f71be03e-e25b-4d0f-b8bc-9b3e309b66c0
Mode Indexed
Type BuiltIn
Preview False
Deprecated False
Effect Default
AuditIfNotExists
Allowed
AuditIfNotExists, Disabled
RBAC role(s) none
Rule aliases IF (7)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.Compute/imageOffer Microsoft.Compute
Microsoft.Compute
Microsoft.Compute
virtualMachines
virtualMachineScaleSets
disks
properties.storageProfile.imageReference.offer
properties.virtualMachineProfile.storageProfile.imageReference.offer
properties.creationData.imageReference.id
True
True
True


False
False
False
Microsoft.Compute/imagePublisher Microsoft.Compute
Microsoft.Compute
Microsoft.Compute
virtualMachines
virtualMachineScaleSets
disks
properties.storageProfile.imageReference.publisher
properties.virtualMachineProfile.storageProfile.imageReference.publisher
properties.creationData.imageReference.id
True
True
True


False
False
False
Microsoft.Compute/imageSKU Microsoft.Compute
Microsoft.Compute
Microsoft.Compute
virtualMachines
virtualMachineScaleSets
disks
properties.storageProfile.imageReference.sku
properties.virtualMachineProfile.storageProfile.imageReference.sku
properties.creationData.imageReference.id
True
True
True


False
False
False
Microsoft.Compute/virtualMachines/osProfile.windowsConfiguration Microsoft.Compute virtualMachines properties.osProfile.windowsConfiguration True True
Microsoft.Compute/virtualMachines/storageProfile.osDisk.osType Microsoft.Compute virtualMachines properties.storageProfile.osDisk.osType True True
Microsoft.ConnectedVMwarevSphere/virtualMachines/osProfile.osType Microsoft.ConnectedVMwarevSphere virtualmachines properties.osProfile.osType True False
Microsoft.HybridCompute/imageOffer Microsoft.HybridCompute machines properties.osName True False
THEN-ExistenceCondition (2)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.GuestConfiguration/guestConfigurationAssignments/complianceStatus Microsoft.GuestConfiguration guestConfigurationAssignments properties.complianceStatus True False
Microsoft.GuestConfiguration/guestConfigurationAssignments/parameterHash Microsoft.GuestConfiguration guestConfigurationAssignments properties.parameterHash True False
Rule resource types IF (3)
Compliance
The following 47 compliance controls are associated with this Policy definition 'Windows machines should meet requirements for 'Security Options - Recovery console'' (f71be03e-e25b-4d0f-b8bc-9b3e309b66c0)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
Canada_Federal_PBMM_3-1-2020 SC_2 Canada_Federal_PBMM_3-1-2020_SC_2 Canada Federal PBMM 3-1-2020 SC 2 Application Partitioning Application Partitioning Shared The information system separates user functionality (including user interface services) from information system management functionality. To strengthen security posture and mitigate potential security vulnerabilities. 4
Canada_Federal_PBMM_3-1-2020 SC_5 Canada_Federal_PBMM_3-1-2020_SC_5 Canada Federal PBMM 3-1-2020 SC 5 Denial of Service Protection Denial of Service Protection Shared The information system protects against or limits the effects of the following denial of service attempts that attack bandwidth, transactional capacity and storage by employing geo-replication, IP address blocking, and network-based DDoS protections. To strengthen security posture and mitigate potential security vulnerabilities. 4
Canada_Federal_PBMM_3-1-2020 SC_6 Canada_Federal_PBMM_3-1-2020_SC_6 Canada Federal PBMM 3-1-2020 SC 6 Resource Availability Resource Availability Shared The information system protects the availability of resources by allocating organization-defined resources by priority; quota, or organization-defined security safeguards. To strengthen security posture and mitigate potential security vulnerabilities. 4
Canada_Federal_PBMM_3-1-2020 SC_7 Canada_Federal_PBMM_3-1-2020_SC_7 Canada Federal PBMM 3-1-2020 SC 7 Boundary Protection Boundary Protection Shared 1. The information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system. 2. The information system implements sub-networks for publicly accessible system components that are physically or logically separated from internal organizational networks. 3. The information system connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture. To strengthen security posture and mitigate potential security vulnerabilities. 4
Canada_Federal_PBMM_3-1-2020 SC_7(12) Canada_Federal_PBMM_3-1-2020_SC_7(12) Canada Federal PBMM 3-1-2020 SC 7(12) Boundary Protection Boundary Protection | Host-Based Protection Shared The organization implements organization-defined host-based boundary protection mechanisms at organization-defined information system components. To strengthen security posture and mitigate potential security vulnerabilities. 4
Canada_Federal_PBMM_3-1-2020 SC_7(3) Canada_Federal_PBMM_3-1-2020_SC_7(3) Canada Federal PBMM 3-1-2020 SC 7(3) Boundary Protection Boundary Protection | Access Points Shared The organization limits the number of external network connections to the information system. To strengthen security posture and mitigate potential security vulnerabilities. 4
Canada_Federal_PBMM_3-1-2020 SC_7(5) Canada_Federal_PBMM_3-1-2020_SC_7(5) Canada Federal PBMM 3-1-2020 SC 7(5) Boundary Protection Boundary Protection | Deny by Default / Allow by Exception Shared The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception). To strengthen security posture and mitigate potential security vulnerabilities. 4
Canada_Federal_PBMM_3-1-2020 SC_7(7) Canada_Federal_PBMM_3-1-2020_SC_7(7) Canada Federal PBMM 3-1-2020 SC 7(7) Boundary Protection Boundary Protection | Prevent Split Tunneling for Remote Devices Shared The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks. To strengthen security posture and mitigate potential security vulnerabilities. 4
Canada_Federal_PBMM_3-1-2020 SC_7(8) Canada_Federal_PBMM_3-1-2020_SC_7(8) Canada Federal PBMM 3-1-2020 SC 7(8) Boundary Protection Boundary Protection | Route Traffic to Authenticated Proxy Servers Shared The information system routes organization-defined internal communications traffic to all untrusted networks outside the control of the organization through authenticated proxy servers at managed interfaces. To strengthen security posture and mitigate potential security vulnerabilities. 4
CMMC_L2_v1.9.0 AC.L1_3.1.20 CMMC_L2_v1.9.0_AC.L1_3.1.20 Cybersecurity Maturity Model Certification (CMMC) Level 2 v1.9.0 AC.L1 3.1.20 Access Control External Connections Shared Verify and control/limit connections to and use of external information systems. To enhance security and minimise potential risks associated with external access. 27
CMMC_L2_v1.9.0 AC.L2_3.1.18 CMMC_L2_v1.9.0_AC.L2_3.1.18 Cybersecurity Maturity Model Certification (CMMC) Level 2 v1.9.0 AC.L2 3.1.18 Access Control Mobile Device Connection Shared Control connection of mobile devices. To mitigate the risk of unauthorized access or security breaches. 1
CMMC_L2_v1.9.0 CM.L2_3.4.8 CMMC_L2_v1.9.0_CM.L2_3.4.8 Cybersecurity Maturity Model Certification (CMMC) Level 2 v1.9.0 CM.L2 3.4.8 Configuration Management Application Execution Policy Shared Apply deny by exception (blacklisting) policy to prevent the use of unauthorized software or deny all, permit by exception (whitelisting) policy to allow the execution of authorized software. To reduce the risk of malware infections or unauthorized access. 5
EU_2555_(NIS2)_2022 EU_2555_(NIS2)_2022_21 EU_2555_(NIS2)_2022_21 EU 2022/2555 (NIS2) 2022 21 Cybersecurity risk-management measures Shared n/a Requires essential and important entities to take appropriate measures to manage cybersecurity risks. 193
EU_GDPR_2016_679_Art. 24 EU_GDPR_2016_679_Art._24 EU General Data Protection Regulation (GDPR) 2016/679 Art. 24 Chapter 4 - Controller and processor Responsibility of the controller Shared n/a n/a 310
EU_GDPR_2016_679_Art. 25 EU_GDPR_2016_679_Art._25 EU General Data Protection Regulation (GDPR) 2016/679 Art. 25 Chapter 4 - Controller and processor Data protection by design and by default Shared n/a n/a 310
EU_GDPR_2016_679_Art. 28 EU_GDPR_2016_679_Art._28 EU General Data Protection Regulation (GDPR) 2016/679 Art. 28 Chapter 4 - Controller and processor Processor Shared n/a n/a 310
EU_GDPR_2016_679_Art. 32 EU_GDPR_2016_679_Art._32 EU General Data Protection Regulation (GDPR) 2016/679 Art. 32 Chapter 4 - Controller and processor Security of processing Shared n/a n/a 310
FBI_Criminal_Justice_Information_Services_v5.9.5_5 .5 FBI_Criminal_Justice_Information_Services_v5.9.5_5.5 FBI Criminal Justice Information Services (CJIS) v5.9.5 5.5 Policy and Implementation - Access Control Access Control Shared Refer to Section 5.13.6 for additional access control requirements related to mobile devices used to access CJI. Access control provides the planning and implementation of mechanisms to restrict reading, writing, processing, and transmission of CJIS information and the modification of information systems, applications, services and communication configurations allowing access to CJIS information. 97
FBI_Criminal_Justice_Information_Services_v5.9.5_5 .7 FBI_Criminal_Justice_Information_Services_v5.9.5_5.7 404 not found n/a n/a 95
hipaa 1637.12b2Organizational.2-12.b hipaa-1637.12b2Organizational.2-12.b 1637.12b2Organizational.2-12.b 16 Business Continuity & Disaster Recovery 1637.12b2Organizational.2-12.b 12.01 Information Security Aspects of Business Continuity Management Shared n/a Business impact analyses are used to evaluate the consequences of disasters, security failures, loss of service, and service availability. 8
HITRUST_CSF_v11.3 10.h HITRUST_CSF_v11.3_10.h HITRUST CSF v11.3 10.h Security of System Files Ensure the security of system files, access to system files and program source code shall be controlled, and IT projects and support activities conducted in a secure manner. Shared The updation of operational software, applications, and program libraries is to be performed by authorized administrators. There shall be procedures in place to control the installation of software on operational systems. 3
NIST_SP_800-171_R3_3 .1.18 NIST_SP_800-171_R3_3.1.18 NIST 800-171 R3 3.1.18 Access Control Access Control for Mobile Devices Shared A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection; possesses local, non-removable, or removable data storage; and includes a self-contained power source. Mobile device functionality may also include voice communication capabilities, on-board sensors that allow the device to capture information, and/or built-in features for synchronizing local data with remote locations. Examples include smart phones, smart watches, and tablets. Mobile devices are typically associated with a single individual. The processing, storage, and transmission capability of mobile devices may be comparable to or a subset of notebook or desktop systems, depending on the nature and intended purpose of the device. The protection and control of mobile devices is behavior- or policy-based and requires users to take physical action to protect and control such devices when outside of controlled areas. Controlled areas are spaces for which the organization provides physical or procedural controls to meet the requirements established for protecting CUI. Due to the large variety of mobile devices with different characteristics and capabilities, organizational restrictions may vary for the different classes or types of such devices. Usage restrictions, configuration requirements, and connection requirements for mobile devices include configuration management, device identification and authentication, implementing mandatory protective software, scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware. Organizations can employ full-device encryption or container-based encryption to protect the confidentiality of CUI on mobile devices. Container-based encryption provides a fine-grained approach to the encryption of data and information, including encrypting selected data structures (e.g., files, records, or fields). a. Establish usage restrictions, configuration requirements, and connection requirements for mobile devices. b. Authorize the connection of mobile devices to the system. c. Implement full-device or container-based encryption to protect the confidentiality of CUI on mobile devices. 28
NIST_SP_800-171_R3_3 .13.9 NIST_SP_800-171_R3_3.13.9 NIST 800-171 R3 3.13.9 System and Communications Protection Control Network Disconnect Shared This requirement applies to internal and external networks. Terminating network connections associated with communications sessions includes deallocating TCP/IP addresses or port pairs at the operating system level or deallocating networking assignments at the application level if multiple application sessions are using a single network connection. Time periods of inactivity may be established by organizations and include time periods by type of network access or for specific network accesses. Terminate network connections associated with communications sessions at the end of the sessions or after periods of inactivity. 27
NIST_SP_800-171_R3_3 .4.8 NIST_SP_800-171_R3_3.4.8 404 not found n/a n/a 5
NIST_SP_800-53_R5.1.1 AC.19 NIST_SP_800-53_R5.1.1_AC.19 NIST SP 800-53 R5.1.1 AC.19 Access Control Access Control for Mobile Devices Shared a. Establish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas; and b. Authorize the connection of mobile devices to organizational systems. A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection; possesses local, non-removable or removable data storage; and includes a self-contained power source. Mobile device functionality may also include voice communication capabilities, on-board sensors that allow the device to capture information, and/or built-in features for synchronizing local data with remote locations. Examples include smart phones and tablets. Mobile devices are typically associated with a single individual. The processing, storage, and transmission capability of the mobile device may be comparable to or merely a subset of notebook/desktop systems, depending on the nature and intended purpose of the device. Protection and control of mobile devices is behavior or policy-based and requires users to take physical action to protect and control such devices when outside of controlled areas. Controlled areas are spaces for which organizations provide physical or procedural controls to meet the requirements established for protecting information and systems. Due to the large variety of mobile devices with different characteristics and capabilities, organizational restrictions may vary for the different classes or types of such devices. Usage restrictions and specific implementation guidance for mobile devices include configuration management, device identification and authentication, implementation of mandatory protective software, scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware. Usage restrictions and authorization to connect may vary among organizational systems. For example, the organization may authorize the connection of mobile devices to the organizational network and impose a set of usage restrictions, while a system owner may withhold authorization for mobile device connection to specific applications or impose additional usage restrictions before allowing mobile device connections to a system. Adequate security for mobile devices goes beyond the requirements specified in AC-19. Many controls for mobile devices are reflected in other controls allocated to the initial control baselines as starting points for the development of security plans and overlays using the tailoring process. There may also be some overlap by the security controls within the different families of controls. AC-20 addresses mobile devices that are not organization-controlled. 1
NIST_SP_800-53_R5.1.1 CM.7.2 NIST_SP_800-53_R5.1.1_CM.7.2 NIST SP 800-53 R5.1.1 CM.7.2 Configuration Management Control Least Functionality | Prevent Program Execution Shared Prevent program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies, rules of behavior, and/or access agreements regarding software program usage and restrictions] ; rules authorizing the terms and conditions of software program usage]. Prevention of program execution addresses organizational policies, rules of behavior, and/or access agreements that restrict software usage and the terms and conditions imposed by the developer or manufacturer, including software licensing and copyrights. Restrictions include prohibiting auto-execute features, restricting roles allowed to approve program execution, permitting or prohibiting specific software programs, or restricting the number of program instances executed at the same time. 2
NZISM_v3.7 11.4.11.C.01. NZISM_v3.7_11.4.11.C.01. NZISM v3.7 11.4.11.C.01. Mobile Telephony 11.4.11.C.01. - enhance security awareness and minimise risks associated with mobile communication. Shared n/a Agencies intending to use mobile devices for the transmission of classified information MUST ensure that: 1. the network has been certified and accredited for the purpose; 2. all classified traffic that passes over mobile devices is appropriately encrypted; and 3. users are aware of the area, surroundings, potential for overhearing and potential for oversight when using the device. 1
NZISM_v3.7 11.4.12.C.01. NZISM_v3.7_11.4.12.C.01. NZISM v3.7 11.4.12.C.01. Mobile Telephony 11.4.12.C.01. - maintain the integrity of secure environments. Shared n/a Mobile devices MUST be prevented from entering secure areas. 1
NZISM_v3.7 11.4.9.C.01. NZISM_v3.7_11.4.9.C.01. NZISM v3.7 11.4.9.C.01. Mobile Telephony 11.4.9.C.01. - ensure standardized practices, security protocols, and compliance with relevant regulations regarding the handling of sensitive information. Shared n/a Agencies MUST develop a policy governing the use of mobile devices. 1
NZISM_v3.7 16.4.37.C.01. NZISM_v3.7_16.4.37.C.01. NZISM v3.7 16.4.37.C.01. Privileged Access Management 16.4.37.C.01. - enhance security and reduce the risk of unauthorized access or misuse. Shared n/a Agencies MUST implement a Privileged Access Management (PAM) policy training module as part of the agency's overall user training and awareness requirement. 3
NZISM_v3.7 16.4.37.R.02. NZISM_v3.7_16.4.37.R.02. 404 not found n/a n/a 3
NZISM_v3.7 19.5.29.C.01. NZISM_v3.7_19.5.29.C.01. NZISM v3.7 19.5.29.C.01. Session Border Controllers 19.5.29.C.01. - enhance security measures and protect agency assets. Shared n/a Agencies MUST develop and implement user awareness and training programmes to support and enable safe use of VoIP and UC services. 3
NZISM_v3.7 2.1.49.C.01. NZISM_v3.7_2.1.49.C.01. NZISM v3.7 2.1.49.C.01. Overview of Key Agencies 2.1.49.C.01. - facilitate collaboration and access to resources for effective security management and response. Shared n/a Security personnel MUST familiarise themselves with the information security roles and services provided by New Zealand Government organisations. 4
NZISM_v3.7 21.4.7.C.01. NZISM_v3.7_21.4.7.C.01. NZISM v3.7 21.4.7.C.01. Non-Agency Owned Devices and Bring Your Own Device (BYOD) 21.4.7.C.01. - ensure proactive identification and mitigation of potential security risks. Shared n/a Agencies MUST undertake a risk assessment and implement appropriate controls BEFORE implementing a BYOD Policy and permitting the use of BYOD. 1
NZISM_v3.7 21.4.7.C.02. NZISM_v3.7_21.4.7.C.02. NZISM v3.7 21.4.7.C.02. Non-Agency Owned Devices and Bring Your Own Device (BYOD) 21.4.7.C.02. - ensure comprehensive protection of agency assets and sensitive information in the context of BYOD usage. Shared n/a Agencies MUST take an integrated approach to BYOD security, covering policy, training, support, systems architecture, security, systems management, change management, incident detection & management and business continuity. 1
NZISM_v3.7 21.4.8.C.01. NZISM_v3.7_21.4.8.C.01. NZISM v3.7 21.4.8.C.01. Non-Agency Owned Devices and Bring Your Own Device (BYOD) 21.4.8.C.01. - maintain security and compliance standards. Shared n/a BYOD MUST only be permitted for agency information systems up to and including RESTRICTED. 1
NZISM_v3.7 21.4.8.C.02. NZISM_v3.7_21.4.8.C.02. NZISM v3.7 21.4.8.C.02. Non-Agency Owned Devices and Bring Your Own Device (BYOD) 21.4.8.C.02. - maintain security and compliance standards. Shared n/a BYOD MUST NOT be used for CONFIDENTIAL, SECRET or TOP SECRET systems. 1
NZISM_v3.7 21.4.9.C.01. NZISM_v3.7_21.4.9.C.01. NZISM v3.7 21.4.9.C.01. Non-Agency Owned Devices and Bring Your Own Device (BYOD) 21.4.9.C.01. - mitigate security risks and ensure compliance with security standards. Shared n/a Devices that have been jail-broken, rooted or have settings violations MUST NOT be used for any agency business or be allowed to connect to any agency systems UNLESS this been specifically authorised. 1
NZISM_v3.7 3.3.13.C.01. NZISM_v3.7_3.3.13.C.01. NZISM v3.7 3.3.13.C.01. Information Technology Security Managers 3.3.13.C.01. - foster a culture of security awareness and equipping personnel with the knowledge and skills to effectively mitigate security risks. Shared n/a ITSMs SHOULD provide or arrange for the provision of information security awareness and training for all agency personnel. 4
NZISM_v3.7 5.1.12.C.02. NZISM_v3.7_5.1.12.C.02. NZISM v3.7 5.1.12.C.02. Documentation Fundamentals 5.1.12.C.02. - enhance the agency's ability to mitigate risks and minimize disruptions to operations. Shared n/a Agency personnel MUST be trained in and periodically exercise the Incident Response Plan. 4
NZISM_v3.7 5.7.4.C.01. NZISM_v3.7_5.7.4.C.01. NZISM v3.7 5.7.4.C.01. Emergency Procedures 5.7.4.C.01. - ensure the protection of classified information and systems. Shared n/a Agencies MUST include in procedures for personnel evacuating a facility the requirement to secure classified information and systems prior to the evacuation. 4
NZISM_v3.7 9.1.4.C.01. NZISM_v3.7_9.1.4.C.01. NZISM v3.7 9.1.4.C.01. Information Security Awareness and Training 9.1.4.C.01. - enhance the capability to safeguard sensitive information and mitigate security risks effectively. Shared n/a Agency management MUST ensure that all personnel who have access to a system have sufficient training and ongoing information security awareness. 4
SOC_2023 CC2.3 SOC_2023_CC2.3 SOC 2023 CC2.3 Information and Communication Facilitate effective internal communication. Shared n/a Entity to communicate with external parties regarding matters affecting the functioning of internal control. 218
SOC_2023 CC5.3 SOC_2023_CC5.3 SOC 2023 CC5.3 Control Activities Maintain alignment with organizational objectives and regulatory requirements. Shared n/a Entity deploys control activities through policies that establish what is expected and in procedures that put policies into action by establishing Policies and Procedures to Support Deployment of Management’s Directives, Responsibility and Accountability for Executing Policies and Procedures, perform tasks in a timely manner, taking corrective actions, perform using competent personnel and reassess policies and procedures. 229
SOC_2023 CC6.1 SOC_2023_CC6.1 SOC 2023 CC6.1 Logical and Physical Access Controls Mitigate security events and ensuring the confidentiality, integrity, and availability of critical information assets. Shared n/a Entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives by identifying and managing the inventory of information assets, restricting logical access, identification and authentication of users, consider network segmentation, manage points of access, restricting access of information assets, managing identification and authentication, managing credentials for infrastructure and software, using encryption to protect data and protect using encryption keys. 128
SOC_2023 CC7.4 SOC_2023_CC7.4 SOC 2023 CC7.4 Systems Operations Effectively manage security incidents, minimize their impact, and protect assets, operations, and reputation. Shared n/a The entity responds to identified security incidents by: a. Executing a defined incident-response program to understand, contain, remediate, and communicate security incidents by assigning roles and responsibilities; b. Establishing procedures to contain security incidents; c. Mitigating ongoing security incidents, End Threats Posed by Security Incidents; d. Restoring operations; e. Developing and Implementing Communication Protocols for Security Incidents; f. Obtains Understanding of Nature of Incident and Determines Containment Strategy; g. Remediation Identified Vulnerabilities; h. Communicating Remediation Activities; and, i. Evaluating the Effectiveness of Incident Response and periodic incident evaluations. 213
UK_NCSC_CAF_v3.2 B3.d UK_NCSC_CAF_v3.2_B3.d NCSC Cyber Assurance Framework (CAF) v3.2 B3.d Data Security Mobile Data Shared 1. Mobile devices that hold data that is important to the operation of the essential function are catalogued, are under your organisation's control and configured according to best practice for the platform, with appropriate technical and procedural policies in place. 2. Your organisation can remotely wipe all mobile devices holding data important to the operation of essential function. 3. You have minimised this data on these mobile devices. Some data may be automatically deleted off mobile devices after a certain period. Have protected data important to the operation of the essential function on mobile devices. 1
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
[Preview]: Motion Picture Association of America (MPAA) 92646f03-e39d-47a9-9e24-58d60ef49af8 Regulatory Compliance Preview BuiltIn unknown
[Preview]: Windows machines should meet requirements for the Azure compute security baseline be7a78aa-3e10-4153-a5fd-8c6506dbc821 Guest Configuration Preview BuiltIn true
Canada Federal PBMM 3-1-2020 f8f5293d-df94-484a-a3e7-6b422a999d91 Regulatory Compliance GA BuiltIn unknown
Cybersecurity Maturity Model Certification (CMMC) Level 2 v1.9.0 a4087154-2edb-4329-b56a-1cc986807f3c Regulatory Compliance GA BuiltIn unknown
EU 2022/2555 (NIS2) 2022 42346945-b531-41d8-9e46-f95057672e88 Regulatory Compliance GA BuiltIn unknown
EU General Data Protection Regulation (GDPR) 2016/679 7326812a-86a4-40c8-af7c-8945de9c4913 Regulatory Compliance GA BuiltIn unknown
FBI Criminal Justice Information Services (CJIS) v5.9.5 4fcabc2a-30b2-4ba5-9fbb-b1a4e08fb721 Regulatory Compliance GA BuiltIn unknown
HITRUST CSF v11.3 e0d47b75-5d99-442a-9d60-07f2595ab095 Regulatory Compliance GA BuiltIn unknown
HITRUST/HIPAA a169a624-5599-4385-a696-c8d643089fab Regulatory Compliance GA BuiltIn unknown
NCSC Cyber Assurance Framework (CAF) v3.2 6d220abf-cf6f-4b17-8f7e-0644c4cc84b4 Regulatory Compliance GA BuiltIn unknown
NIST 800-171 R3 38916c43-6876-4971-a4b1-806aa7e55ccc Regulatory Compliance GA BuiltIn unknown
NIST SP 800-53 R5.1.1 60205a79-6280-4e20-a147-e2011e09dc78 Regulatory Compliance GA BuiltIn unknown
NZISM v3.7 4476df0a-18ab-4bfe-b6ad-cccae1cf320f Regulatory Compliance GA BuiltIn unknown
SOC 2023 53ad89f5-8542-49e9-ba81-1cbd686e0d52 Regulatory Compliance GA BuiltIn unknown
History
Date/Time (UTC ymd) (i) Change type Change detail
2022-01-28 17:51:01 change Major (2.0.0 > 3.0.0)
2020-09-15 14:06:41 change Previous DisplayName: [Preview]: Windows machines should meet requirements for 'Security Options - Recovery console'
2020-08-20 14:05:01 add f71be03e-e25b-4d0f-b8bc-9b3e309b66c0
JSON compare
compare mode: version left: version right:
JSON
api-version=2021-06-01
EPAC