IBM Cloud Docs
Change log: IBM Cloud Framework for Financial Services (Moderate)

Change log: IBM Cloud Framework for Financial Services (Moderate)

In this change log, you can learn about the latest changes, improvements, and updates for the Service Organization Control (IBM Cloud Framework for Financial Services (Moderate)) profile. The change log lists changes that were made, ordered by the version number.

Disclaimer: IBM Cloud Framework for Financial Services (Moderate) Security and Compliance Center profile should be used if you choose IBM® Key Protect for IBM Cloud® and/or IBM Cloud Activity Tracker Hosted Event Search as your data/log management solution, as per your information and data classification requirements. For further details on the differences between IBM® Key Protect for IBM Cloud® and IBM Cloud® Hyper Protect Crypto Services, read Data encryption at rest in IBM Cloud for a comparison of functionality. Additionally, for more information on auditing and monitoring of workload and data, read Audit logging of IBM Cloud events.

Profile versioning

When specifications or controls are edited, removed from, or added to a profile in a way that is not compatible with the current version, a new version is released. To take advantage of the changes in a new version, update your attachments to use the newest profile version.

This profile is consistently updated and is not an exhaustive list of all the controls that might be required for every organization. Be sure to validate the available controls to determine where you might need to supplement your workloads with other security measures.

Version summary

The following table details the release dates and status of each profile version.

New attachments cannot be created on deprecated profile versions. Select the most recent version to use for your evaluation.

Table. Active versions of the IBM Cloud Framework for Financial Services (Moderate) profile
Version number Release date Status
Version 1.1.0 2024-08-27 Active
Version 1.0.0 2024-06-06 Active

Version 1.1.0

The following rules were updated in the IBM Cloud for Financial Services library and profile as of 27 August 2024.

Table. Summary of the changes for version 1.1.0 of the IBM Cloud Framework for Financial Services (Moderate)
Rule ID Rule description Associated controls Update
rule-1d0a1c93-b89f-432e-af25-758ae517a7ba Check whether App Configuration can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-b5675539-fb0a-4464-93a3-f9c3ab1da0f8 Check whether App Configuration can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-9b2822ec-cde3-4367-b3b7-3aabceb7ce13 Check whether Auto scale for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-7cbf96ea-a032-4bc0-aae7-21d088965ef4 Check whether Auto scale for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-30e49535-38d9-4969-8f78-56cf8be67557 Check whether Backup for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-6b80be89-7c9f-472f-9ad2-363086fbcc86 Check whether Backup for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-1399da2c-af02-47a3-bec1-0baa48297619 Check whether Bare Metal Servers for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-a6843b59-7e8b-4e5f-8f45-fe98a28269e2 Check whether Bare Metal Servers for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-23aca5fe-3659-4b4d-a965-daad23ce2a01 Check whether Block Storage for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-3d843573-0a71-44cc-926a-330fbcf80ec6 Check whether Block Storage for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-bf187b2f-0d3b-48f2-a5a7-cab0c0788c43 Check whether Block Storage Snapshots for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-af1c19bb-a40e-4798-92ad-57d4e9d540ba Check whether Block Storage Snapshots for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-8f3a6416-3621-4666-a2a7-271704432552 Check whether Client VPN for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-9d0ae8c0-7332-4b65-858c-56fe9875789f Check whether Client VPN for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-9eb7b514-5c27-43ba-83fc-26d75e0bf695 Check whether Cloud Object Storage can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-61878b48-e181-455d-aed3-5730b6e27890 Check whether Cloud Object Storage can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-e9bae442-b92e-414d-88a9-d107511f554c Check whether Code Engine can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-15e9118b-2fd4-46a7-a454-7af07b2b342c Check whether Code Engine can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-87b52247-ec12-4e84-b328-d00491301e16 Check whether Container Registry can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-94ca1725-f251-4cee-8c4c-280e141f194a Check whether Container Registry can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-4aebb5fe-61df-458c-b534-60fd644ae542 Check whether Dedicated Host for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-c5642f67-fb2c-4fe1-aed1-585d9215808f Check whether Dedicated Host for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-94048ffe-f910-4ff2-881f-50df9005c0a2 Check whether Direct Link can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-65627941-63ee-4f52-9248-3b5a09163965 Check whether Direct Link can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-6252793f-9da5-4a04-9f9d-279b6e2c6907 Check whether DNS Services can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-dce07761-8ffd-4beb-a7cc-d38a17fffd4e Check whether DNS Services can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-c9dfee2f-6283-43ce-9337-4eaacaa3313c Check whether Event Notifications can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-0ffd34a1-3ca7-4d53-adbe-40f3980694e6 Check whether Event Notifications can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AAC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-762180a3-95e1-462b-a7ca-7995ca0dfb7c Check whether Event Streams can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-23850407-cbf6-42cf-8985-f90b2c966d04 Check whether Event Streams can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-a4841766-a395-41be-8a64-b51e85168fab Check whether Flow Logs for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-5593b5b5-dd27-45c9-b088-b40e447af5ef Check whether Flow Logs for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-315c8bb3-3eb8-4186-85bc-e66d68ba9dd0 Check whether Hyper Protect Crypto Services can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-00882b45-ee37-4dc1-b948-afa618755fbd Check whether Hyper Protect Crypto Services can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AAC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-0051b1c6-bee9-4e04-87e2-300e2c145104 Check whether IAM access groups can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-a534cbfa-1d2b-4b10-b405-7d6a0a969944 Check whether IAM access groups can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-e9a2d69f-757d-4371-8508-419fc13550f1 Check whether IAM access management can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-8e7fd3c6-01aa-47b8-9898-ba34ebc27015 Check whether IAM access management can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-0cddf009-8620-47e2-add9-e7609d82a221 Check whether IAM identities can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-56c515ef-4d2b-42e2-aa62-df4b37eab801 Check whether Kubernetes Service can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-4554e868-eb89-4b18-8692-564da18e0c2d Check whether Kubernetes Service can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-b5a6bedd-16b0-4a21-bb01-04d70d48a752 Check whether Load Balancer for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-10b28c5d-27aa-4d03-b863-2e770090df74 Check whether Load Balancer for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-3d59273d-8ed1-4767-8112-c3f95ce09c3e Check whether Schematics can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-553bdee0-a3c4-4ff9-a2f2-7903cc98ca2f Check whether Schematics can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-c26980c7-5fae-47b7-ad2a-e96e87cf28fc Check whether Secrets Manager can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-21fd1a1e-7909-48a4-949a-ada1785a34cf Check whether Secrets Manager can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-d6b8cc81-b78b-49a5-87a3-34c71a198a71 Check whether Security and Compliance Center can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-5c9aed4a-af5e-47e0-8a86-cac8199aa90d Check whether Security and Compliance Center can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-ff00ff6c-61d2-4a94-8de8-b150b4d35aab Check whether there are no wild cards in the private endpoint allow list for IAM identities (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-b426a552-33c4-4b8d-8e71-659e06a45024 Check whether Transit Gateway can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-ca36ff5d-003b-4b21-b584-061a2ac5268a Check whether Transit Gateway can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-7601aadc-cce6-4929-b3d2-26c4ba7e05ad Check whether User Management can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-e54063a9-379f-4cdf-a00c-2fd02c8d9eda Check whether User Management can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-9d963fd1-c56c-45ad-976e-96a45899b576 Check whether Virtual Private Cloud can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-29286737-f65b-41fb-8ba7-30e81f0f9dd8 Check whether Virtual Private Cloud can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-45e6a74e-74d4-495d-88da-f0cda147d8b4 Check whether Virtual Private Endpoints for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-fce897fe-d572-4412-9c74-828bfab0c26a Check whether Virtual Private Endpoints for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-4a8fce3e-5bf4-4b57-8df7-c9f2f374abf3 Check whether Virtual Servers for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-b6b7e67f-e7c2-4435-a883-80ab3d835d0e Check whether Virtual Servers for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-a3ee571a-b0fe-408f-9c8b-064e44fe99d5 Check whether VPC floating IPs can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-4736fc5d-63e2-4673-92e5-4c1f381645f5 Check whether VPC floating IPs can be accessed only through a private endpoint (Context-based restrictions or service) and allowed Ips AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-72f16940-fa5b-4719-a7e8-35a1cc721a6a Check whether VPC images can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-ed883cda-bdd3-48fd-972b-bf98b085423b Check whether VPC images can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-eaff5bf5-7754-4218-8cb7-ae87ec8fdc7f Check whether VPC network access control lists can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-9a64c779-5744-4bcc-a5ac-e4ad04b0f59c Check whether VPC network access control lists can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-113e00c2-0503-4a09-8e6c-893ad51b6643 Check whether VPC placement groups can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-fdabbd31-1b00-4a84-aca2-6c57e8404b9e Check whether VPC placement groups can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-3ead3fb3-9156-4d93-971c-7b782ceb00ae Check whether VPC public gateways can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-7758e8eb-c4d8-42a8-869f-30e3c189f6fa Check whether VPC public gateways can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-02ad5735-93ba-4229-9d10-70dd48d0f96c Check whether VPC security groups can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-2b0fc034-063b-47a7-86e9-5a96c8ca9f23 Check whether VPC security groups can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-235d040e-ae2b-4832-9c28-b79cc2d6be6c Check whether VPC SSH keys can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-b96fdad1-c2d5-4399-861f-49adecfd3485 Check whether VPC SSH keys can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-f33e4a5e-3297-4ec1-91b6-5f902fe87e75 Check whether VPC subnets can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-8b014ee6-2fcf-4e78-9412-d290251ff2a1 Check whether VPC subnets can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-2a1b103a-4ef3-416e-822a-abf556f8dbae Check whether VPN for VPC can be accessed only through a private endpoint (Context-based restrictions or service) AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was removed.
rule-a4cc268c-9c97-4dbb-b02f-bf74d5a5aa93 Check whether VPN for VPC can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(a), SC-7(b), SC-7(4)(a), and SC-7(5) The rule was added.
rule-3898fc92-305f-41c2-9464-c26ca71d639e "Check whether VPN for VPC has an ""establish mode"" configuration that is different from 'peer_only'" SC-13 The rule was added.
rule-8226d451-d6a7-46a7-8313-f8c091d6e33f Check whether IBM Cloud Kubernetes Service Ingress has TLS 1.2 enabled for all inbound traffic SC-11SC-13, SC-23, CM-7(b), SC-7(4)(C), SC-8, and SC-8(1) The rule was added.
rule-da567ec9-8e24-4c65-993b-ad290bfdb855 Check whether Cloud Object Storage buckets are enabled with IBM Activity Tracker SC-11, SC-13, SC-23, CM-7(b), SC-7(4)(C), SC-8, and SC-8(1) The rule was added.
rule-84a0c7b9-cb37-430b-8a6d-afafb384ed9b Check that Activity Tracker hosted Event Search is configured to collect global events generated by IBM Cloud services AC-2(4), AC-2(7)(b), AC-2(g), AC-6(9), AU-12(a), AU-12(b), AU-12(c), AU-2(a), AU-2(d), AU-3, AU-8(1)(a), AU-8(1)(b), AU-8(a), AU-8(b), CA-7(d), SI-4(a), SI-4(b), SI-4, and SI-4(c) The rule was added.
rule-2f84317e-83b3-451d-bb95-9bd4ba953bdf Check that there is an Activity Tracker hosted event search defined in each region to collect location-based events AC-2(4), AC-2(7)(b), AC-2(g), AC-6(9), AU-12(a), AU-12(b), AU-12(c), AU-2(a), AU-2(d), AU-3, AU-8(1)(a), AU-8(1)(b), AU-8(a), AU-8(b), CA-7(d), SI-4(a), SI-4(b), SI-4, and SI-4(c) The rule was added.
rule-ba79b984-ec18-4fc1-965d-82cf701eb94f Check whether an instance of IBM Log Analysis exists in each required region and is configured to receive platform logs AC-4 The rule was removed.

Version 1.0.0

Now available
As of 6 June 2024, the IBM Cloud Framework for Financial Services (Moderate) profile is a collection of controls that is designed to validate the configuration of your resources.

The following changes were made.

  • All the existing customer-managed encryption Keep Your Own Key (KYOK) rules were replaced with customer-managed encryption (Bring Your Own Key (BYOK) or Keep Your Own Key (KYOK)).

The following rules were added.

Table. Summary of the changes for version 1.1.0 of the IBM Cloud Framework for Financial Services (Moderate)
Rule ID Rule description Associated controls Update
rule-84a0c7b9-cb37-430b-8a6d-afafb384ed9b Check that Activity Tracker hosted Event Search is configured to collect global events generated by IBM Cloud services AC-2(4), AC-2(7)(b), AC-2(g), AC-6(9), AU-12(a), AU-12(b), AU-12(c), AU-2(a), AU-2(d), AU-3, AU-8(1)(a), AU-8(1)(b), AU-8(a), AU-8(b), CA-7(d), SI-4(a), SI-4(b), and SI-4(c) The rule was added.
rule-2f84317e-83b3-451d-bb95-9bd4ba953bdf Check that there is an Activity Tracker hosted event search defined in each region to collect location-based events AC-2(4), AC-2(7)(b), AC-2(g), AC-6(9), AU-12(a), AU-12(b), AU-12(c), AU-2(a), AU-2(d), AU-3, AU-8(1)(a), AU-8(1)(b), AU-8(a), AU-8(b), CA-7(d), SI-4(a), SI-4(b), and SI-4(c) The rule was added.
rule-ed64fa73-81e5-4920-8519-acfad845dd6c Check whether Identity and Access Management (IAM) is enabled with audit logging AC-2(4), AC-2(7)(b), AC-2(g), AC-6(9), AU-12(a), AU-12(b), AU-12(c), AU-2(a), AU-2(d), AU-3, AU-8(1)(a), AU-8(1)(b), AU-8(a), AU-8(b), CA-7(d), SI-4(a), SI-4(b), and SI-4(c) The rule was added.
rule-ab4301de-c43b-489f-ba0a-2ced0080ba8f Check whether IBM Log Analysis instance log retention is set to at least # days AC-2(4), AC-2(7)(b), AC-2(g), AC-6(9), AU-12(a), AU-12(b), AU-12(c), AU-2(a), AU-2(d), AU-3, AU-8(1)(a), AU-8(1)(b), AU-8(a), AU-8(b), CA-7(d), SI-4(a), SI-4(b), and SI-4(c) The rule was added.
rule-d592e06a-8756-4efc-a401-1ec215168f48 Check whether IBM Activity Tracker trails are integrated with LogDNA logs AC-2(4), AC-2(7)(b), AC-2(g), AC-6(9), AU-12(a), AU-12(b), AU-12(c), AU-2(a), AU-2(d), AU-3, AU-8(1)(a), AU-8(1)(b), AU-8(a), AU-8(b), CA-7(d), SI-4(a), SI-4(b), and SI-4(c) The rule was added.
rule-5910ed25-7ad7-42d0-8e42-905df0123346 Check whether IBM Activity Tracker is provisioned in multiple regions in an account AC-2(4), AC-2(7)(b), AC-2(g), AC-6(9), AU-12(a), AU-12(b), AU-12(c), AU-2(a), AU-2(d), AU-3, AU-8(1)(a), AU-8(1)(b), AU-8(a), AU-8(b), CA-7(d), SI-4(a), SI-4(b), and SI-4(c) The rule was added.
rule-911a3948-f5af-4d91-b329-5c71c1ebf8c2 Check whether an IBM Cloud Activity Tracker instance is available across all provisioned resource regions AC-2(4), AC-2(7)(b), AC-2(g), AC-6(9), AU-12(a), AU-12(b), AU-12(c), AU-2(a), AU-2(d), AU-3, AU-8(1)(a), AU-8(1)(b), AU-8(a), AU-8(b), CA-7(d), SI-4(a), SI-4(b), and SI-4(c) The rule was added.
rule-c98fab05-5119-451a-b100-35df840d2326 Check whether IBM Activity Tracker logs are encrypted at rest SC-13, SC-28, and SC-28(1) The rule was added.
rule-14808a2d-ab9b-4333-8275-f12559620cbb Check whether there are no wild cards in the private endpoint allow list for IBM Log Analysis (Context-based restrictions or service) AC-4 The rule was added.
rule-2aa7888e-ed67-40f3-9bff-8a70fddb4671 Check whether IBM Log Analysis can be accessed only through a private endpoint (Context-based restrictions or service) and allowed IPs AC-4, CM-7(a), CM-7(b), SC-7(4)(a), SC-7(5), SC-7(a), and SC-7(b) The rule was added.