Name/Id: ACF1635 / Microsoft Managed Control 1635 Category: System and Communications Protection Title: Boundary Protection | Host-Based Protection Ownership: Customer, Microsoft Description: The organization implements Packet Filtering, Firewalls, Event Reporting, Vulnerability Scanning Tools at all servers in the Microsoft Azure environment. Requirements: Azure implements the following host-based boundary protection mechanisms:
* IP Filtering
* VFP Filtering (for virtual machines)
* Host-based firewalls
* Guest firewalls (for virtual machines)
Azure uses a combination of detection and fast response via several methods to address the risk of intrusion. This includes the use of event forwarding tools, security incident and event management tools, vulnerability scanning and reporting tools, and centrally managed anti-virus on Azure assets. These tools are forms of host-based protection.
The following 1 compliance controls are associated with this Policy definition 'Microsoft Managed Control 1635 - Boundary Protection | Host-Based Protection' (87551b5d-1deb-4d0f-86cc-9dc14cb4bf7e)
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
Policies and procedures regarding the use of cryptography and, where appropriate, encryption
n/a
In order to safeguard the security of public electronic communications networks and publicly available electronic communications services, the use of encryption technologies, in particular end-to-end encryption as well as data-centric security concepts, such as cartography, segmentation, tagging, access policy and access management, and automated access decisions, should be promoted. Where necessary, the use of encryption, in particular end-to-end encryption should be mandatory for providers of public electronic communications networks or of publicly available electronic communications services in accordance with the principles of security and privacy by default and by design for the purposes of this Directive. The use of end-to-end encryption should be reconciled with the Member States’ powers to ensure the protection of their essential security interests and public security, and to allow for the prevention, investigation, detection and prosecution of criminal offences in accordance with Union law. However, this should not weaken end-to-end encryption, which is a critical technology for the effective protection of data and privacy and the security of communications.
32
No results
Initiatives usage
Rows: 1-1 / 1
Records:
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more