Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_AWS_0301Ensure NetBios Session Service (UDP,139) is not accessible by a CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0302Ensure Oracle DB SSL (TCP,2484) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0307Ensure Puppet Master (TCP:8140) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0310Ensure SQL Server Analysis Services (TCP,2383) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0312Ensure Oracle Database Server (TCP,1521) is not accessible by a public CIDR block rangeAWSInfrastructure Security
HIGH
AC_AWS_0316Ensure MongoDB (TCP,27017) is not accessible by a public CIDR block rangeAWSInfrastructure Security
HIGH
AC_AWS_0317Ensure Elasticsearch (TCP,9200) is not accessible by a public CIDR block rangeAWSInfrastructure Security
HIGH
AC_AWS_0318Ensure Elasticsearch (TCP,9300) is not accessible by a public CIDR block rangeAWSInfrastructure Security
HIGH
AC_AWS_0319Ensure SSH (TCP,22) is not accessible by a public CIDR block rangeAWSInfrastructure Security
LOW
AC_AWS_0321Ensure Security Groups Unrestricted Specific Ports http (TCP,80) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0323Ensure Security Groups Unrestricted Specific Ports remote desktop port (TCP,3389) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0325Ensure Security Groups Unrestricted Specific Ports SaltStackMaster (TCP,4506) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0328Ensure Security Groups Unrestricted Specific Ports MSSQLAdmin (TCP,1434) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0333Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (TCP,11215) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0334Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (UDP,11214) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0335Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (UDP,11215) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0337Ensure CIFS/SMB' (TCP,3020) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0343Ensure NetBIOSNameService' (TCP,137) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0346Ensure NetBIOSDatagramService' (UDP,138) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0355Ensure SNMP' (UDP,161) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0357Ensure SQLServerAnalysisServices' (TCP,2383) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0360Ensure SMTP' (TCP,25) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0509Ensure Cassandra Internode Communication (TCP:7000) is not exposed to entire internetAWSInfrastructure Security
HIGH
AC_AWS_0514Ensure Cassandra Monitoring (TCP:7199) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0517Ensure Cassandra OpsCenter Monitoring (TCP:61620) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0528Ensure LDAP (UDP:389) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0529Ensure LDAP (UDP:389) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0534Ensure Memcached SSL (UDP:11211) is not exposed to publicAWSInfrastructure Security
MEDIUM
AC_AWS_0544Ensure Redis without SSL (TCP:6379) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0590Ensure the default security group of every VPC restricts all trafficAWSInfrastructure Security
MEDIUM
AC_AZURE_0045Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP)AzureInfrastructure Security
MEDIUM
AC_AZURE_0380Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP)AzureInfrastructure Security
MEDIUM
AC_AZURE_0395Ensure missing service endpoints are disabled for Azure PostgreSQL Virtual Network RuleAzureSecurity Best Practices
MEDIUM
AC_AZURE_0422Ensure VNC Server (TCP:5900) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0429Ensure Telnet (TCP:23) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0432Ensure SaltStack Master (TCP:4506) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0439Ensure SQL Server Analysis (TCP:2383) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0440Ensure SQL Server Analysis (TCP:2382) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0444Ensure SNMP (Udp:161) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0446Ensure SMTP (TCP:25) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0454Ensure web port (TCP:3000) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0457Ensure PostgreSQL (Udp:5432) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0460Ensure PostgreSQL (TCP:5432) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0469Ensure Oracle DB SSL (TCP:2484) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0470Ensure NetBIOS Session Service (Udp:139) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0472Ensure NetBIOS Session Service (Udp:139) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0473Ensure NetBIOS Session Service (TCP:139) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0483Ensure NetBIOS Name Service (Udp:137) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0487Ensure NetBIOS Name Service (TCP:137) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0492Ensure Mongo Web Portal (TCP:27018) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM