{"controls":{"0843":{"1":"Application control is implemented on workstations.","2":"Application control is implemented on workstations.","3":"Application control is implemented on workstations."},"1870":{"1":"Application control is applied to user profiles and temporary folders used by operating systems, web browsers and email clients.","2":"Application control is applied to user profiles and temporary folders used by operating systems, web browsers and email clients.","3":"Application control is applied to user profiles and temporary folders used by operating systems, web browsers and email clients."},"1657":{"1":"Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set.","2":"Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set.","3":"Application control restricts the execution of executables, software libraries, scripts, installers, compiled HTML, HTML applications and control panel applets to an organisation-approved set."},"1490":{"2":"Application control is implemented on internet-facing servers.","3":"Application control is implemented on internet-facing servers."},"1871":{"2":"Application control is applied to all locations other than user profiles and temporary folders used by operating systems, web browsers and email clients.","3":"Application control is applied to all locations other than user profiles and temporary folders used by operating systems, web browsers and email clients."},"1544":{"2":"Microsoft\u2019s recommended application blocklist is implemented.","3":"Microsoft\u2019s recommended application blocklist is implemented."},"1582":{"2":"Application control rulesets are validated on an annual or more frequent basis.","3":"Application control rulesets are validated on an annual or more frequent basis."},"1660":{"2":"Allowed and blocked application control events are centrally logged.","3":"Allowed and blocked application control events are centrally logged."},"1815":{"2":"Event logs are protected from unauthorised modification and deletion.","3":"Event logs are protected from unauthorised modification and deletion."},"1906":{"2":"Event logs from internet-facing servers are analysed in a timely manner to detect cyber security events.","3":"Event logs from internet-facing servers are analysed in a timely manner to detect cyber security events."},"1228":{"2":"Cyber security events are analysed in a timely manner to identify cyber security incidents.","3":"Cyber security events are analysed in a timely manner to identify cyber security incidents."},"0123":{"2":"Cyber security incidents are reported to the Chief Information Security Officer, or one of their delegates, as soon as possible after they occur or are discovered.","3":"Cyber security incidents are reported to the Chief Information Security Officer, or one of their delegates, as soon as possible after they occur or are discovered."},"0140":{"2":"Cyber security incidents are reported to ASD as soon as possible after they occur or are discovered.","3":"Cyber security incidents are reported to ASD as soon as possible after they occur or are discovered."},"1819":{"2":"Following the identification of a cyber security incident, the cyber security incident response plan is enacted.","3":"Following the identification of a cyber security incident, the cyber security incident response plan is enacted."},"1656":{"3":"Application control is implemented on non-internet-facing servers."},"1658":{"3":"Application control is implemented on non-internet-facing servers."},"1659":{"3":"Microsoft\u2019s vulnerable driver blocklist is implemented."},"1907":{"3":"Event logs from non-internet-facing servers are analysed in a timely manner to detect cyber security events."},"0109":{"3":"Event logs from workstations are analysed in a timely manner to detect cyber security events."},"1807":{"1":"An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities.","2":"An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities.","3":"An automated method of asset discovery is used at least fortnightly to support the detection of assets for subsequent vulnerability scanning activities."},"1808":{"1":"A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.","2":"A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.","3":"A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities."},"1698":{"1":"A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services.","2":"A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services.","3":"A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in online services."},"1699":{"1":"A vulnerability scanner is used at least weekly to identify missing patches or updates for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products.","2":"A vulnerability scanner is used at least weekly to identify missing patches or updates for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products.","3":"A vulnerability scanner is used at least weekly to identify missing patches or updates for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products."},"1876":{"1":"Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist.","2":"Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist.","3":"Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist."},"1690":{"1":"Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist.","2":"Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist.","3":"Patches, updates or other vendor mitigations for vulnerabilities in online services are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist."},"1691":{"1":"Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release.","2":"Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release."},"1905":{"1":"Online services that are no longer supported by vendors are removed.","2":"Online services that are no longer supported by vendors are removed.","3":"Online services that are no longer supported by vendors are removed."},"1704":{"1":"Office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed.","2":"Office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed.","3":"Office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed."},"1700":{"2":"A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products.","3":"A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products."},"1693":{"2":"Patches, updates or other vendor mitigations for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within one month of release.","3":"Patches, updates or other vendor mitigations for vulnerabilities in applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within one month of release."},"1692":{"3":"Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist."},"1901":{"3":"Patches, updates or other vendor mitigations for vulnerabilities in office productivity suites, web browsers and their extensions, email clients, PDF software, and security products are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist."},"0304":{"3":"Applications other than office productivity suites, web browsers and their extensions, email clients, PDF software, Adobe Flash Player, and security products that are no longer supported by vendors are removed."},"1671":{"1":"Microsoft Office macros are disabled for users that do not have a demonstrated business requirement.","2":"Microsoft Office macros are disabled for users that do not have a demonstrated business requirement.","3":"Microsoft Office macros are disabled for users that do not have a demonstrated business requirement."},"1488":{"1":"Microsoft Office macros in files originating from the internet are blocked.","2":"Microsoft Office macros in files originating from the internet are blocked.","3":"Microsoft Office macros in files originating from the internet are blocked."},"1672":{"1":"Microsoft Office macro antivirus scanning is enabled.","2":"Microsoft Office macro antivirus scanning is enabled.","3":"Microsoft Office macro antivirus scanning is enabled."},"1489":{"1":"Microsoft Office macro security settings cannot be changed by users.","2":"Microsoft Office macro security settings cannot be changed by users.","3":"Microsoft Office macro security settings cannot be changed by users."},"1673":{"2":"Microsoft Office macros are blocked from making Win32 API calls.","3":"Microsoft Office macros are blocked from making Win32 API calls."},"1674":{"3":"Only Microsoft Office macros running from within a sandboxed environment, a Trusted Location or that are digitally signed by a trusted publisher are allowed to execute."},"1890":{"3":"Microsoft Office macros are checked to ensure they are free of malicious code before being digitally signed or placed within Trusted Locations."},"1487":{"3":"Only privileged users responsible for validating that Microsoft Office macros are free of malicious code can write to and modify content within Trusted Locations."},"1675":{"3":"Microsoft Office macros digitally signed by an untrusted publisher cannot be enabled via the Message Bar or Backstage View."},"1891":{"3":"Microsoft Office macros digitally signed by signatures other than V3 signatures cannot be enabled via the Message Bar or Backstage View."},"1676":{"3":"Microsoft Office\u2019s list of trusted publishers is validated on an annual or more frequent basis."},"1654":{"1":"Internet Explorer 11 is disabled or removed.","2":"Internet Explorer 11 is disabled or removed.","3":"Internet Explorer 11 is disabled or removed."},"1486":{"1":"Web browsers do not process Java from the internet.","2":"Web browsers do not process Java from the internet.","3":"Web browsers do not process Java from the internet."},"1485":{"1":"Web browsers do not process web advertisements from the internet.","2":"Web browsers do not process web advertisements from the internet.","3":"Web browsers do not process web advertisements from the internet."},"1585":{"1":"Web browser security settings cannot be changed by users.","2":"Web browser, Microsoft Office and PDF software security settings cannot be changed by users.","3":"Web browser, Microsoft Office and PDF software security settings cannot be changed by users."},"1412":{"2":"Web browsers are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.","3":"Web browsers are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur."},"1667":{"2":"Microsoft Office is blocked from creating child processes.","3":"Microsoft Office is blocked from creating child processes."},"1668":{"2":"Microsoft Office is blocked from creating executable content.","3":"Microsoft Office is blocked from creating executable content."},"1669":{"2":"Microsoft Office is blocked from injecting code into other processes.","3":"Microsoft Office is blocked from injecting code into other processes."},"1542":{"2":"Microsoft Office is configured to prevent activation of OLE packages.","3":"Microsoft Office is configured to prevent activation of OLE packages."},"1859":{"2":"Office productivity suites are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.","3":"Office productivity suites are hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur."},"1823":{"2":"Office productivity suite security settings cannot be changed by users.","3":"Office productivity suite security settings cannot be changed by users."},"1670":{"2":"PDF software is blocked from creating child processes.","3":"PDF software is blocked from creating child processes."},"1860":{"2":"PDF software is hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur.","3":"PDF software is hardened using ASD and vendor hardening guidance, with the most restrictive guidance taking precedence when conflicts occur."},"1824":{"2":"PDF software security settings cannot be changed by users.","3":"PDF software security settings cannot be changed by users."},"1623":{"2":"PowerShell module logging, script block logging and transcription events are centrally logged.","3":"PowerShell module logging, script block logging and transcription events are centrally logged."},"1889":{"2":"Command line process creation events are centrally logged.","3":"Command line process creation events are centrally logged."},"1655":{"3":".NET Framework 3.5 (includes .NET 2.0 and 3.0) is disabled or removed."},"1621":{"3":"Windows PowerShell 2.0 is disabled or removed."},"1622":{"3":"PowerShell is configured to use Constrained Language Mode."},"1507":{"1":"Requests for privileged access to systems, applications and data repositories are validated when first requested.","2":"Requests for privileged access to systems, applications and data repositories are validated when first requested.","3":"Requests for privileged access to systems, applications and data repositories are validated when first requested."},"0445":{"1":"Privileged users are assigned a dedicated privileged account to be used solely for duties requiring privileged access.","2":"Privileged users are assigned a dedicated privileged account to be used solely for duties requiring privileged access.","3":"Privileged users are assigned a dedicated privileged account to be used solely for duties requiring privileged access."},"1175":{"1":"Privileged accounts (excluding those explicitly authorised to access online services) are prevented from accessing the internet, email and web services.","2":"Privileged accounts (excluding those explicitly authorised to access online services) are prevented from accessing the internet, email and web services.","3":"Privileged accounts (excluding those explicitly authorised to access online services) are prevented from accessing the internet, email and web services."},"1883":{"1":"Privileged accounts explicitly authorised to access online services are strictly limited to only what is required for users and services to undertake their duties.","2":"Privileged accounts explicitly authorised to access online services are strictly limited to only what is required for users and services to undertake their duties.","3":"Privileged accounts explicitly authorised to access online services are strictly limited to only what is required for users and services to undertake their duties."},"1380":{"1":"Privileged users use separate privileged and unprivileged operating environments.","2":"Privileged users use separate privileged and unprivileged operating environments.","3":"Privileged users use separate privileged and unprivileged operating environments."},"1688":{"1":"Unprivileged accounts cannot logon to privileged operating environments.","2":"Unprivileged accounts cannot logon to privileged operating environments.","3":"Unprivileged accounts cannot logon to privileged operating environments."},"1689":{"1":"Privileged accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments.","2":"Privileged accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments.","3":"Privileged accounts (excluding local administrator accounts) cannot logon to unprivileged operating environments."},"1647":{"2":"Privileged access to systems, applications and data repositories is disabled after 12 months unless revalidated.","3":"Privileged access to systems, applications and data repositories is disabled after 12 months unless revalidated."},"1648":{"2":"Privileged access to systems and applications is disabled after 45 days of inactivity.","3":"Privileged access to systems and applications is disabled after 45 days of inactivity."},"1687":{"2":"Privileged operating environments are not virtualised within unprivileged operating environments.","3":"Privileged operating environments are not virtualised within unprivileged operating environments."},"1387":{"2":"Administrative activities are conducted through jump servers.","3":"Administrative activities are conducted through jump servers."},"1685":{"2":"Credentials for break glass accounts, local administrator accounts and service accounts are long, unique, unpredictable and managed.","3":"Credentials for break glass accounts, local administrator accounts and service accounts are long, unique, unpredictable and managed."},"1509":{"2":"Privileged access events are centrally logged.","3":"Privileged access events are centrally logged."},"1650":{"2":"Privileged account and group management events are centrally logged.","3":"Privileged account and group management events are centrally logged."},"1508":{"3":"Privileged access to systems, applications and data repositories is limited to only what is required for users and services to undertake their duties."},"1898":{"3":"Secure Admin Workstations are used in the performance of administrative activities."},"1649":{"3":"Just-in-time administration is used for administering systems and applications."},"1896":{"3":"Memory integrity functionality is enabled."},"1861":{"3":"Local Security Authority protection functionality is enabled."},"1686":{"3":"Credential Guard functionality is enabled."},"1897":{"3":"Remote Credential Guard functionality is enabled."},"1701":{"1":"A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices.","2":"A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices.","3":"A vulnerability scanner is used at least daily to identify missing patches or updates for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices."},"1702":{"1":"A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices.","2":"A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices.","3":"A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices."},"1877":{"1":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist.","2":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist.","3":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist."},"1694":{"1":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist.","2":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist.","3":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of internet-facing servers and internet-facing network devices are applied within two weeks of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist."},"1695":{"1":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices are applied within one month of release.","2":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices are applied within one month of release."},"1501":{"1":"Operating systems that are no longer supported by vendors are replaced.","2":"Operating systems that are no longer supported by vendors are replaced.","3":"Operating systems that are no longer supported by vendors are replaced."},"1703":{"3":"A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in drivers."},"1900":{"3":"A vulnerability scanner is used at least fortnightly to identify missing patches or updates for vulnerabilities in firmware."},"1696":{"3":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist."},"1902":{"3":"Patches, updates or other vendor mitigations for vulnerabilities in operating systems of workstations, non-internet-facing servers and non-internet-facing network devices are applied within one month of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist."},"1879":{"3":"Patches, updates or other vendor mitigations for vulnerabilities in drivers are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist."},"1697":{"3":"Patches, updates or other vendor mitigations for vulnerabilities in drivers are applied within one month of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist."},"1903":{"3":"Patches, updates or other vendor mitigations for vulnerabilities in firmware are applied within 48 hours of release when vulnerabilities are assessed as critical by vendors or when working exploits exist."},"1904":{"3":"Patches, updates or other vendor mitigations for vulnerabilities in firmware are applied within one month of release when vulnerabilities are assessed as non-critical by vendors and no working exploits exist."},"1407":{"3":"The latest release, or the previous release, of operating systems are used."},"1504":{"1":"Multi-factor authentication is used to authenticate users to their organisation\u2019s online services that process, store or communicate their organisation\u2019s sensitive data.","2":"Multi-factor authentication is used to authenticate users to their organisation\u2019s online services that process, store or communicate their organisation\u2019s sensitive data.","3":"Multi-factor authentication is used to authenticate users to their organisation\u2019s online services that process, store or communicate their organisation\u2019s sensitive data."},"1679":{"1":"Multi-factor authentication is used to authenticate users to third-party online services that process, store or communicate their organisation\u2019s sensitive data.","2":"Multi-factor authentication is used to authenticate users to third-party online services that process, store or communicate their organisation\u2019s sensitive data.","3":"Multi-factor authentication is used to authenticate users to third-party online services that process, store or communicate their organisation\u2019s sensitive data."},"1680":{"1":"Multi-factor authentication (where available) is used to authenticate users to third-party online services that process, store or communicate their organisation\u2019s non-sensitive data.","2":"Multi-factor authentication (where available) is used to authenticate users to third-party online services that process, store or communicate their organisation\u2019s non-sensitive data.","3":"Multi-factor authentication (where available) is used to authenticate users to third-party online services that process, store or communicate their organisation\u2019s non-sensitive data."},"1892":{"1":"Multi-factor authentication is used to authenticate users to their organisation\u2019s online customer services that process, store or communicate their organisation\u2019s sensitive customer data.","2":"Multi-factor authentication is used to authenticate users to their organisation\u2019s online customer services that process, store or communicate their organisation\u2019s sensitive customer data.","3":"Multi-factor authentication is used to authenticate users to their organisation\u2019s online customer services that process, store or communicate their organisation\u2019s sensitive customer data."},"1893":{"1":"Multi-factor authentication is used to authenticate users to third-party online customer services that process, store or communicate their organisation\u2019s sensitive customer data.","2":"Multi-factor authentication is used to authenticate users to third-party online customer services that process, store or communicate their organisation\u2019s sensitive customer data.","3":"Multi-factor authentication is used to authenticate users to third-party online customer services that process, store or communicate their organisation\u2019s sensitive customer data."},"1681":{"1":"Multi-factor authentication is used to authenticate customers to online customer services that process, store or communicate sensitive customer data.","2":"Multi-factor authentication is used to authenticate customers to online customer services that process, store or communicate sensitive customer data.","3":"Multi-factor authentication is used to authenticate customers to online customer services that process, store or communicate sensitive customer data."},"1401":{"1":"Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are.","2":"Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are.","3":"Multi-factor authentication uses either: something users have and something users know, or something users have that is unlocked by something users know or are."},"1173":{"2":"Multi-factor authentication is used to authenticate privileged users of systems.","3":"Multi-factor authentication is used to authenticate privileged users of systems."},"0974":{"2":"Multi-factor authentication is used to authenticate unprivileged users of systems.","3":"Multi-factor authentication is used to authenticate unprivileged users of systems."},"1872":{"2":"Multi-factor authentication used for authenticating users of online services is phishing-resistant.","3":"Multi-factor authentication used for authenticating users of online services is phishing-resistant."},"1873":{"2":"Multi-factor authentication used for authenticating customers of online customer services provides a phishing-resistant option."},"1682":{"2":"Multi-factor authentication used for authenticating users of systems is phishing-resistant.","3":"Multi-factor authentication used for authenticating users of systems is phishing-resistant."},"1683":{"2":"Successful and unsuccessful multi-factor authentication events are centrally logged.","3":"Successful and unsuccessful multi-factor authentication events are centrally logged."},"1505":{"3":"Multi-factor authentication is used to authenticate users of data repositories."},"1874":{"3":"Multi-factor authentication used for authenticating customers of online customer services is phishing-resistant."},"1894":{"3":"Multi-factor authentication used for authenticating users of data repositories is phishing-resistant."},"1511":{"1":"Backups of data, applications and settings are performed and retained in accordance with business criticality and business continuity requirements.","2":"Backups of data, applications and settings are performed and retained in accordance with business criticality and business continuity requirements.","3":"Backups of data, applications and settings are performed and retained in accordance with business criticality and business continuity requirements."},"1810":{"1":"Backups of data, applications and settings are synchronised to enable restoration to a common point in time.","2":"Backups of data, applications and settings are synchronised to enable restoration to a common point in time.","3":"Backups of data, applications and settings are synchronised to enable restoration to a common point in time."},"1811":{"1":"Backups of data, applications and settings are retained in a secure and resilient manner.","2":"Backups of data, applications and settings are retained in a secure and resilient manner.","3":"Backups of data, applications and settings are retained in a secure and resilient manner."},"1515":{"1":"Restoration of data, applications and settings from backups to a common point in time is tested as part of disaster recovery exercises.","2":"Restoration of data, applications and settings from backups to a common point in time is tested as part of disaster recovery exercises.","3":"Restoration of data, applications and settings from backups to a common point in time is tested as part of disaster recovery exercises."},"1812":{"1":"Unprivileged accounts cannot access backups belonging to other accounts.","2":"Unprivileged accounts cannot access backups belonging to other accounts.","3":"Unprivileged accounts cannot access backups belonging to other accounts."},"1814":{"1":"Unprivileged accounts are prevented from modifying and deleting backups.","2":"Unprivileged accounts are prevented from modifying and deleting backups.","3":"Unprivileged accounts are prevented from modifying and deleting backups."},"1705":{"2":"Privileged accounts (excluding backup administrator accounts) cannot access backups belonging to other accounts.","3":"Privileged accounts (excluding backup administrator accounts) cannot access backups belonging to other accounts."},"1707":{"2":"Privileged accounts (excluding backup administrator accounts) are prevented from modifying and deleting backups.","3":"Privileged accounts (excluding backup administrator accounts) are prevented from modifying and deleting backups."},"1813":{"3":"Unprivileged accounts cannot access their own backups."},"1706":{"3":"Privileged accounts (excluding backup administrator accounts) cannot access their own backups."},"1708":{"3":"Backup administrator accounts are prevented from modifying and deleting backups during their retention period."}}}