AC_AZURE_0261 | Ensure public network access is disabled for Azure Data Factory | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0353 | Ensure a site-to-site VPN functionality by making use of Azure Virtual WAN | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0374 | Ensure a firewall is attached to Azure SQL Server | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0383 | Ensure that 'Threat Detection' is enabled for Azure SQL Database | Azure | Logging and Monitoring | MEDIUM |
AC_GCP_0248 | Ensure default service account is not used at organization level for Google Cloud | GCP | Identity and Access Management | HIGH |
AC_K8S_0049 | Ensure ALLOW-with-positive-matching exist for Istio Authorization Object | Kubernetes | Infrastructure Security | MEDIUM |
AC_K8S_0097 | Ensure CPU request is set for Kubernetes workloads | Kubernetes | Security Best Practices | MEDIUM |
AC_K8S_0118 | Ensure overly broad host configuration is not allowed for Istio Gateway | Kubernetes | Infrastructure Security | HIGH |
AC_AZURE_0308 | Ensure public access is disabled for Azure MySQL Single Server | Azure | Infrastructure Security | HIGH |
AC_GCP_0271 | Ensure Secure Boot for Shielded GKE Nodes is Enabled | GCP | Infrastructure Security | LOW |
AC_AWS_0142 | Ensure IAM password policy requires minimum length of 14 or greater | AWS | Compliance Validation | MEDIUM |
AC_AZURE_0044 | Ensure that Azure Active Directory Admin is Configured for SQL Servers | Azure | Identity and Access Management | HIGH |
AC_K8S_0062 | Ensure that the --peer-client-cert-auth argument is set to true | Kubernetes | Infrastructure Security | MEDIUM |
AC_K8S_0063 | Ensure that the --peer-auto-tls argument is not set to true | Kubernetes | Infrastructure Security | MEDIUM |
AC_AZURE_0332 | Ensure that Auto provisioning of 'Log Analytics agent for Azure VMs' is Set to 'On' | Azure | Compliance Validation | MEDIUM |
AC_GCP_0336 | Ensure That Separation of Duties Is Enforced While Assigning Service Account Related Roles to Users | GCP | Identity and Access Management | LOW |
AC_AWS_0428 | Ensure that S3 Buckets are configured with 'Block public access (bucket settings)' | AWS | Infrastructure Security | MEDIUM |
AC_AZURE_0375 | Ensure that 'Auditing' Retention is 'greater than 90 days' | Azure | Compliance Validation | LOW |
AC_K8S_0090 | Ensure that the --basic-auth-file argument is not set | Kubernetes | Identity and Access Management | MEDIUM |
AC_GCP_0025 | Ensure use of VPC-native clusters | GCP | Compliance Validation | HIGH |
AC_GCP_0030 | Ensure Stackdriver Kubernetes Logging and Monitoring is Enabled | GCP | Logging and Monitoring | HIGH |
AC_GCP_0337 | Ensure Cloud Asset Inventory Is Enabled | GCP | Logging and Monitoring | MEDIUM |
AC_AWS_0199 | Ensure public access is disabled for AWS Redshift Clusters | AWS | Infrastructure Security | HIGH |
AC_AWS_0234 | Ensure Security Groups do not have unrestricted specific ports open - Elasticsearch (TCP,9200) | AWS | Infrastructure Security | HIGH |
AC_AWS_0239 | Ensure Security Groups do not have unrestricted specific ports open - Cassandra (TCP,7001) | AWS | Infrastructure Security | HIGH |
AC_AWS_0243 | Ensure Security Groups do not have unrestricted specific ports open - LDAP SSL (TCP,636) | AWS | Infrastructure Security | HIGH |
AC_AWS_0247 | Ensure Security Groups do not have unrestricted specific ports open - MSSQL Server (TCP,1433) | AWS | Infrastructure Security | HIGH |
AC_AWS_0252 | Ensure Security Groups do not have unrestricted specific ports open - Mongo Web Portal (TCP,27018) | AWS | Infrastructure Security | HIGH |
AC_AWS_0254 | Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Name Service (TCP,137) | AWS | Infrastructure Security | HIGH |
AC_AWS_0262 | Ensure Security Groups do not have unrestricted specific ports open - Postgres SQL (TCP,5432) | AWS | Infrastructure Security | HIGH |
AC_AWS_0269 | Ensure Security Groups do not have unrestricted specific ports open - SaltStack Master (TCP,4505) | AWS | Infrastructure Security | HIGH |
AC_AWS_0272 | Ensure Security Groups do not have unrestricted specific ports open - SMTP (TCP,25) | AWS | Infrastructure Security | HIGH |
AC_AWS_0276 | Ensure Unknown Port is not exposed to the entire internet | AWS | Infrastructure Security | HIGH |
AC_AWS_0280 | Ensure Cassandra OpsCenter agent port (TCP,61621) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0284 | Ensure Known internal web port (TCP,8080) is not accessible by a CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0289 | Ensure MSSQL Server (TCP,1433) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0294 | Ensure Mongo Web Portal (TCP,27018) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0298 | Ensure NetBios Datagram Service (TCP,138) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0303 | Ensure Oracle DB SSL (UDP,2484) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0305 | Ensure Postgres SQL (UDP,5432) is not accessible by a CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0326 | Ensure Security Groups Unrestricted Specific Ports CassandraOpsCenteragent (TCP,61621) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0329 | Ensure Security Groups Unrestricted Specific Ports MSSQLBrowserService (UDP,1434) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0330 | Ensure Security Groups Unrestricted Specific Ports MSSQLDebugger (TCP,135) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0340 | Ensure Knowninternalwebport' (TCP,8000) not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0347 | Ensure NetBIOSSessionService' (TCP,139) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0349 | Ensure OracleDBSSL' (TCP,2484) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0350 | Ensure OracleDBSSL' (UDP,2484) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0351 | Ensure PostgresSQL' (TCP,5432) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0358 | Ensure OracleDatabaseServer' (TCP,521) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0363 | Ensure Elasticsearch' (TCP,9300) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |