Benchmark: 0858.09m1Organizational.4-09.m 09.06 Network Security Management
Description
The organization monitors for all authorized and unauthorized wireless access to the information system and prohibits installation of wireless access points (WAPs) unless explicitly authorized in writing by the CIO or his/her designated representative.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-azure-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 0858.09m1Organizational.4-09.m 09.06 Network Security Management.
Run this benchmark in your terminal:
powerpipe benchmark run azure_compliance.benchmark.hipaa_hitrust_v92_0858_09m1organizational
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run azure_compliance.benchmark.hipaa_hitrust_v92_0858_09m1organizational --share
Controls
- Management ports of virtual machines should be protected with just-in-time network access control
- Windows machines should meet requirements for 'Windows Firewall Properties'
- All network ports should be restricted on network security groups associated to your virtual machine