Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_GCP_0221Ensure Hadoop Name Node (TCP:9000) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0223Ensure Remote Desktop (TCP:3389) is not exposed to more than 32 private hosts for Google Compute FirewallGCPInfrastructure Security
LOW
S3_AWS_0002Ensure at-rest server side encryption (SSE) is enabled using default encryption keys for AWS S3 Buckets - Terraform Version 1.xAWSData Protection
HIGH
AC_AWS_0172Ensure recommended SSL/TLS protocol version is used for AWS Elastic Load Balancers (ELB)AWSInfrastructure Security
HIGH
AC_AWS_0233Ensure Cassandra Client (TCP:9042) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0508Ensure Cassandra Client (TCP:9042) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0523Ensure Cassandra Thrift (TCP:9160) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0524Ensure LDAP (TCP:389) is not exposed to entire internetAWSInfrastructure Security
HIGH
AC_AWS_0526Ensure LDAP (TCP:389) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0530Ensure Memcached SSL (TCP:11211) is not exposed to entire internetAWSInfrastructure Security
HIGH
AC_AWS_0531Ensure Memcached SSL (TCP:11211) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0532Ensure Memcached SSL (TCP:11211) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0536Ensure Oracle DB (TCP:2483) is not exposed to entire internetAWSInfrastructure Security
HIGH
AC_AWS_0537Ensure Oracle DB (TCP:2483) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0540Ensure Oracle DB (UDP:2483) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0139Ensure password policy requires rotation every 60 days or less for AWS IAM Account Password PolicyAWSCompliance Validation
LOW
AC_AWS_0132Ensure no root user account access key existsAWSIdentity and Access Management
HIGH
AC_AZURE_0409Ensure Server Parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database ServerAzureLogging and Monitoring
MEDIUM
AC_AZURE_0555Ensure 'Infrastructure double encryption' for PostgreSQL Database Server is 'Enabled'AzureData Protection
MEDIUM
AC_AZURE_0394Ensure only SSL connections are enabled for Azure Redis CacheAzureInfrastructure Security
MEDIUM
AC_AWS_0212Ensure there are no publicly writeable and readable AWS S3 BucketsAWSIdentity and Access Management
HIGH
AC_AWS_0054Ensure public access is disabled for Amazon Relational Database Service (Amazon RDS) instancesAWSInfrastructure Security
HIGH
AC_AWS_0510Ensure Cassandra Internode Communication (TCP:7000) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0513Ensure Cassandra Monitoring (TCP:7199) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0516Ensure Cassandra OpsCenter Monitoring (TCP:61620) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0519Ensure Cassandra OpsCenter Website (TCP:8888) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0520Ensure Cassandra OpsCenter Website (TCP:8888) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0521Ensure Cassandra Thrift (TCP:9160) is not exposed to entire internetAWSInfrastructure Security
HIGH
AC_AWS_0525Ensure LDAP (TCP:389) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0535Ensure Memcached SSL (UDP:11211) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0539Ensure Oracle DB (UDP:2483) is not exposed to entire internetAWSInfrastructure Security
HIGH
AC_AWS_0543Ensure Redis without SSL (TCP:6379) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0153Ensure virtual private cloud (VPC) is configured for AWS EC2 instancesAWSInfrastructure Security
MEDIUM
AC_AWS_0215Ensure bucket policy is enforced with least privileges for all AWS S3 bucketsAWSIdentity and Access Management
HIGH
AC_AWS_0227Ensure Security Groups do not have unrestricted specific ports open - (SSH,22)AWSInfrastructure Security
HIGH
AC_AWS_0229Ensure Security Groups do not have unrestricted specific ports open - (HTTPS,443)AWSInfrastructure Security
LOW
AC_AWS_0236Ensure Security Groups do not have unrestricted specific ports open - SaltStack Master (TCP,4506)AWSInfrastructure Security
HIGH
AC_AWS_0237Ensure Security Groups do not have unrestricted specific ports open - CIFS / SMB (TCP,3020)AWSInfrastructure Security
HIGH
AC_AWS_0238Ensure Security Groups do not have unrestricted specific ports open - Cassandra OpsCenter agent (TCP,61621)AWSInfrastructure Security
HIGH
AC_AWS_0242Ensure Security Groups do not have unrestricted specific ports open - Known internal web port (TCP,8080)AWSInfrastructure Security
HIGH
AC_AWS_0256Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Datagram Service (TCP,138)AWSInfrastructure Security
HIGH
AC_AWS_0259Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Session Service (UDP,139)AWSInfrastructure Security
HIGH
AC_AWS_0265Ensure Security Groups do not have unrestricted specific ports open - Puppet Master (TCP,8140)AWSInfrastructure Security
HIGH
AC_AWS_0267Ensure Security Groups do not have unrestricted specific ports open - SQL Server Analysis Service browser (TCP,2382)AWSInfrastructure Security
HIGH
AC_AWS_0282Ensure Hadoop Name Node (TCP,9000) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0285Ensure LDAP SSL (TCP,636) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0290Ensure Memcached SSL (TCP,11214) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0292Ensure Memcached SSL (UDP,11214) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0299Ensure NetBios Datagram Service (UDP,138) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0300Ensure NetBios Session Service (TCP,139) is not accessible by a CIDR block rangeAWSInfrastructure Security
MEDIUM