500.02(b)(5)All ControlsAustralian Cyber Security Center (ACSC) Essential EightAWS Audit Manager Control Tower GuardrailsAWS Foundational Security Best PracticesCIS AWS Compute Services Benchmark v1.0.0CIS Controls v8 IG1CIS v1.2.0CIS v1.3.0CIS v1.4.0CIS v1.5.0CIS v2.0.0CIS v3.0.0CIS v4.0.0CISA Cyber EssentialsFederal Financial Institutions Examination Council (FFIEC)FedRAMP Low Revision 4FedRAMP Moderate Revision 4General Data Protection Regulation (GDPR)GxP 21 CFR Part 11GxP EU Annex 11HIPAA Final Omnibus Security Rule 2013HIPAA Security Rule 2003NIST 800-171 Revision 2NIST 800-172NIST 800-53 Revision 4NIST 800-53 Revision 5NIST Cybersecurity Framework (CSF) v1.1NYDFS 23PCI DSS v3.2.1RBI Cyber Security FrameworkReserve Bank of India - Information Technology Framework for Non-Banking Financial Companies (RBI ITF-NBFC)SOC 2
Dashboard: 500.02(b)(5)
Description
The cybersecurity program shall be based on the Covered Entity’s Risk Assessment and designed to perform the following core cybersecurity functions: detect Cybersecurity Events.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 500.02(b)(5) dashboard.
You could also snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe benchmark run aws_compliance.benchmark.nydfs_23_500_02_b_5 --share
Benchmark
This dashboard is automatically generated from the following benchmark:
benchmark.nydfs_23_500_02_b_5