IFO4
Loading...| Ring Control | SOC2 | ISO | NIST | HIPAA | PCI | GDPR |
|---|---|---|---|---|---|---|
Ring 6 , ED-1 Vendor Enrollment Architecture | CC 9.2 | A.5.19, A.5.20, A.5.21 | SA-9, SR-3 | 164.314 | 12.8 | Art. 28 |
Ring 6 , ED-2 Build & Release Environment Governance | CC 7.1, CC 8.1 | A.8.28, A.8.31 | SA-11, SA-15 | 164.312(e) | 6.3, 6.5 | Art. 25, Art. 32(1)(b) |
Ring 6 , ED-6 IP Classification & Movement Controls | CC 6.1, CC 6.7 | A.5.12, A.5.13 | MP-2, MP-3, MP-5 | 164.310, 164.312(a) | 9.3 | Art. 5, Art. 32 |
Ring 5 , SE-1 Asset Discovery & Continuous Inventory | CC 3.2, CC 6.1 | A.5.9, A.8.1 | CM-8, PM-5 | 164.310(d) | 12.5 | Art. 30 |
Ring 5 , SE-2 Cost Anomaly Detection | CC 7.2, CC 7.3 | A.8.16 | SI-4 | 164.308(a)(1)(ii)(D) | 10.6 | Art. 32(1)(d) |
Ring 5 , SE-5 Risk Signal Classification | CC 7.2 | A.5.10, A.5.27 | SI-4, IR-4 | 164.308(a)(6) | 10.4, 10.5 | Art. 33 |
Ring 4 , OA-1 Universal Tagging Standards | CC 3.2, CC 6.1 | A.5.9, A.5.12 | CM-8, RA-2 | 164.310(d)(1) | 9.7, 12.5 | Art. 30 |
Ring 4 , OA-2 Ownership Assignment & SLA | CC 1.3, CC 3.1 | A.5.2, A.5.3 | PS-2, PS-7 | 164.308(a)(2) | 12.4 | Art. 24 |
Ring 4 , OA-5 Tag Compliance Enforcement | CC 2.2, CC 6.1 | A.5.10 | CM-2, CM-6 | 164.310 | 9.7 | Art. 32 |
Ring 3 , PC-1 Policy-as-Code Enforcement | CC 5.1, CC 5.2 | A.5.1, A.8.4 | AC-1, CM-5 | 164.308(a)(1) | 12.1 | Art. 25 |
Ring 3 , PC-3 Least Privilege IAM | CC 6.1, CC 6.3 | A.5.15, A.5.18, A.8.2 | AC-2, AC-6 | 164.308(a)(4), 164.312(a)(1) | 7.1, 7.2 | Art. 32 |
Ring 3 , PC-5 Segregation of Duties | CC 5.3 | A.5.3 | AC-5 | 164.308(a)(3) | 6.4 | Art. 32 |
Ring 2 , OE-1 Resource Right-Sizing | CC 7.4 | A.8.6 | SA-8 | - | - | Art. 32(1)(c) |
Ring 2 , OE-9 Storage Lifecycle | CC 6.5 | A.5.33, A.8.10 | MP-6, SI-12 | 164.310(d)(2) | 3.1 | Art. 5(1)(e) |
Ring 1 , EG-1 Immutable Audit Logs | CC 4.1, CC 7.2 | A.8.15 | AU-4, AU-9, AU-11 | 164.312(b) | 10.1 to 10.7 | Art. 32 |
Ring 1 , EG-3 MFA Enforcement | CC 6.1 | A.5.17, A.8.5 | IA-2 | 164.308(a)(5)(ii)(D) | 8.4, 8.5 | Art. 32 |
Ring 1 , EG-7 Just-In-Time Access | CC 6.2, CC 6.3 | A.5.16, A.5.18 | AC-2(1), AC-6(5) | 164.308(a)(4) | 7.2 | Art. 32 |
Core , OV-3 Protected Infrastructure Tier | CC 6.1, CC 7.5 | A.5.30 | CP-2, CP-6 | 164.308(a)(7) | 12.10 | Art. 32(1)(c) |