AC_AWS_0105 | Ensure slow logs (index slow logs) are enabled for AWS ElasticSearch Domain | AWS | Compliance Validation | MEDIUM |
AC_AWS_0117 | Ensure latest TLS version is used for AWS ElasticSearch Nodes | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0124 | Ensure termination protection is enabled for AWS EMR clusters | AWS | Resilience | MEDIUM |
AC_AWS_0137 | Eliminate use of the root user for administrative and daily tasks | AWS | Compliance Validation | MEDIUM |
AC_AWS_0153 | Ensure virtual private cloud (VPC) is configured for AWS EC2 instances | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0154 | Ensure IMDSv1 is disabled for AWS EC2 instances | AWS | Infrastructure Security | HIGH |
AC_AWS_0161 | Ensure deletion window for Customer Managed Keys (CMK) is enabled for AWS Key Management Service (KMS) | AWS | Security Best Practices | HIGH |
AC_AWS_0170 | Ensure there are no hard coded scripts used in base64 encoded value of AWS Launch Configuration | AWS | Data Protection | HIGH |
AC_AWS_0187 | Ensure copy tags to snapshots feature is enabled for Amazon Relational Database Service (Amazon RDS) clusters | AWS | Compliance Validation | LOW |
AC_AWS_0188 | Ensure deletion protection is enabled for Amazon Relational Database Service (Amazon RDS) clusters | AWS | Data Protection | MEDIUM |
AC_AWS_0190 | Ensure backtracking is enabled for Amazon Relational Database Service (Amazon RDS) cluster | AWS | Compliance Validation | MEDIUM |
AC_AWS_0191 | Ensure default ports are not used by Amazon Relational Database Service (Amazon RDS) instances | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0196 | Ensure IAM Policy does not Allow with NotPrincipal | AWS | Identity and Access Management | HIGH |
AC_AWS_0203 | Ensure Enhanced VPC routing should be enabled for AWS Redshift Clusters | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0215 | Ensure bucket policy is enforced with least privileges for all AWS S3 buckets | AWS | Identity and Access Management | HIGH |
AC_AWS_0219 | Ensure 'allow get actions from all principals' is disabled for AWS S3 Buckets | AWS | Identity and Access Management | HIGH |
AC_AWS_0225 | Ensure network isolation is enabled for AWS SageMaker | AWS | Security Best Practices | MEDIUM |
AC_AWS_0227 | Ensure Security Groups do not have unrestricted specific ports open - (SSH,22) | AWS | Infrastructure Security | HIGH |
AC_AWS_0229 | Ensure Security Groups do not have unrestricted specific ports open - (HTTPS,443) | AWS | Infrastructure Security | LOW |
AC_AWS_0236 | Ensure Security Groups do not have unrestricted specific ports open - SaltStack Master (TCP,4506) | AWS | Infrastructure Security | HIGH |
AC_AWS_0237 | Ensure Security Groups do not have unrestricted specific ports open - CIFS / SMB (TCP,3020) | AWS | Infrastructure Security | HIGH |
AC_AWS_0238 | Ensure Security Groups do not have unrestricted specific ports open - Cassandra OpsCenter agent (TCP,61621) | AWS | Infrastructure Security | HIGH |
AC_AWS_0242 | Ensure Security Groups do not have unrestricted specific ports open - Known internal web port (TCP,8080) | AWS | Infrastructure Security | HIGH |
AC_AWS_0256 | Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Datagram Service (TCP,138) | AWS | Infrastructure Security | HIGH |
AC_AWS_0259 | Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Session Service (UDP,139) | AWS | Infrastructure Security | HIGH |
AC_AWS_0265 | Ensure Security Groups do not have unrestricted specific ports open - Puppet Master (TCP,8140) | AWS | Infrastructure Security | HIGH |
AC_AWS_0267 | Ensure Security Groups do not have unrestricted specific ports open - SQL Server Analysis Service browser (TCP,2382) | AWS | Infrastructure Security | HIGH |
AC_AWS_0282 | Ensure Hadoop Name Node (TCP,9000) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0285 | Ensure LDAP SSL (TCP,636) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0290 | Ensure Memcached SSL (TCP,11214) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0292 | Ensure Memcached SSL (UDP,11214) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0299 | Ensure NetBios Datagram Service (UDP,138) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0300 | Ensure NetBios Session Service (TCP,139) is not accessible by a CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0301 | Ensure NetBios Session Service (UDP,139) is not accessible by a CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0302 | Ensure Oracle DB SSL (TCP,2484) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0307 | Ensure Puppet Master (TCP:8140) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0310 | Ensure SQL Server Analysis Services (TCP,2383) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0312 | Ensure Oracle Database Server (TCP,1521) is not accessible by a public CIDR block range | AWS | Infrastructure Security | HIGH |
AC_AWS_0316 | Ensure MongoDB (TCP,27017) is not accessible by a public CIDR block range | AWS | Infrastructure Security | HIGH |
AC_AWS_0317 | Ensure Elasticsearch (TCP,9200) is not accessible by a public CIDR block range | AWS | Infrastructure Security | HIGH |
AC_AWS_0318 | Ensure Elasticsearch (TCP,9300) is not accessible by a public CIDR block range | AWS | Infrastructure Security | HIGH |
AC_AWS_0319 | Ensure SSH (TCP,22) is not accessible by a public CIDR block range | AWS | Infrastructure Security | LOW |
AC_AWS_0321 | Ensure Security Groups Unrestricted Specific Ports http (TCP,80) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0323 | Ensure Security Groups Unrestricted Specific Ports remote desktop port (TCP,3389) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0325 | Ensure Security Groups Unrestricted Specific Ports SaltStackMaster (TCP,4506) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0328 | Ensure Security Groups Unrestricted Specific Ports MSSQLAdmin (TCP,1434) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0333 | Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (TCP,11215) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0334 | Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (UDP,11214) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0335 | Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (UDP,11215) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0337 | Ensure CIFS/SMB' (TCP,3020) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |