AC_AWS_0486 | Ensure there is no policy with an invalid principal key for Amazon Simple Queue Service (SQS) Queue | AWS | Identity and Access Management | LOW |
AC_AWS_0548 | Ensure logging is enabled for AWS CloudFront | AWS | Logging and Monitoring | MEDIUM |
AC_AWS_0620 | Ensure there is no policy with wildcards (*) used in principal for Amazon Simple Notification Service (SNS) Topic | AWS | Identity and Access Management | LOW |
AC_AZURE_0112 | Ensure Time To Live (TTL) of the DNS record is not more than 60 minutes for Azure Private DNS Cname Record | Azure | Security Best Practices | MEDIUM |
AC_AZURE_0127 | Ensure that Azure Active Directory Admin is configured for Azure MySQL Single Server | Azure | Identity and Access Management | HIGH |
AC_AZURE_0221 | Ensure CORS is configured to allow only trusted clients for Azure Healthcare Service | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0222 | Ensure failing azure functions have email alerts configured for Azure Monitor Action Group | Azure | Compliance Validation | MEDIUM |
AC_AZURE_0267 | Ensure that 'Phone number' is set for Azure Security Center Contact | Azure | Security Best Practices | MEDIUM |
AC_AZURE_0269 | Ensure that Accelerated Networking feature is enabled for Azure virtual machines (VMs) | Azure | Compliance Validation | LOW |
AC_AZURE_0297 | Ensure that Azure Files are used for Azure App Service | Azure | Resilience | MEDIUM |
AC_AZURE_0302 | Ensure read, write and delete request logging is enabled for queue service in Azure Storage Account | Azure | Logging and Monitoring | MEDIUM |
AC_AZURE_0306 | Ensures that Active Directory is used for authentication for Azure Service Fabric Cluster | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0363 | Ensure ssh keys are used to auth Azure Virtual Machine | Azure | Identity and Access Management | MEDIUM |
AC_AZURE_0369 | Ensure that VM agent is installed on Azure Virtual Machine | Azure | Compliance Validation | LOW |
AC_AZURE_0541 | Ensure permission type is not set to 'Admin' in oauth2_permissions for AzureAD Application | Azure | Identity and Access Management | HIGH |
AC_GCP_0283 | Ensure KMS customer managed keys are used in Google Dataflow Job | GCP | Data Protection | MEDIUM |
AC_GCP_0290 | Ensure master authorized networks config block is set for Google Container Cluster | GCP | Infrastructure Security | LOW |
AC_K8S_0127 | Ensure metadata annotations are restricted in an Ingress object | Kubernetes | Infrastructure Security | HIGH |
AC_AWS_0166 | Ensure at-rest data encryption is enabled for AWS ECS clusters | AWS | Data Protection | LOW |
AC_AWS_0167 | Ensure at-rest data encryption is enabled for AWS EBS Root Block cluster | AWS | Data Protection | HIGH |
AC_AWS_0228 | Ensure Security Groups do not have unrestricted specific ports open - (HTTP,80) | AWS | Infrastructure Security | HIGH |
AC_AWS_0231 | Ensure no security groups allow ingress from 0.0.0.0/0 to ALL ports and protocols | AWS | Infrastructure Security | HIGH |
AC_AWS_0248 | Ensure Security Groups do not have unrestricted specific ports open - Memcached SSL (TCP,11214) | AWS | Infrastructure Security | HIGH |
AC_AWS_0257 | Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Datagram Service (UDP,138) | AWS | Infrastructure Security | HIGH |
AC_AWS_0258 | Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Session Service (TCP,139) | AWS | Infrastructure Security | HIGH |
AC_AWS_0263 | Ensure Security Groups do not have unrestricted specific ports open - Postgres SQL (UDP,5432) | AWS | Infrastructure Security | HIGH |
AC_AWS_0264 | Ensure Security Groups do not have unrestricted specific ports open - Prevalent known internal port (TCP,3000) | AWS | Infrastructure Security | HIGH |
AC_AWS_0268 | Ensure Security Groups do not have unrestricted specific ports open - SQL Server Analysis Services (TCP,2383) | AWS | Infrastructure Security | HIGH |
AC_AWS_0278 | Ensure SaltStack Master (TCP,4506) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0287 | Ensure MSSQL Browser Service (UDP,1434) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0288 | Ensure MSSQL Debugger (TCP,135) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0295 | Ensure MySQL (TCP,3306) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0304 | Ensure Postgres SQL (TCP,5432) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0308 | Ensure SNMP (UDP,161) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0313 | Ensure Telnet (TCP,23) is not accessible by a public CIDR block range | AWS | Infrastructure Security | HIGH |
AC_AWS_0320 | Ensure Security Groups Unrestricted Specific Ports SSH (TCP,22) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0327 | Ensure Security Groups Unrestricted Specific Ports Knowninternalwebport (TCP,8080) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0331 | Ensure Security Groups Unrestricted Specific Ports MSSQLServer (TCP,1433) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0348 | Ensure NetBIOSSessionService' (UDP,139) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0354 | Ensure PuppetMaster' (TCP,8140) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0361 | Ensure CIFSforfile/printer' (TCP,445) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0365 | Ensure Amazon Simple Queue Service (SQS) is not exposed to public | AWS | Identity and Access Management | HIGH |
AC_AWS_0366 | Ensure Server Side Encryption (SSE) is enabled Amazon Simple Queue Service (SQS) queue | AWS | Security Best Practices | HIGH |
AC_AZURE_0158 | Ensure network policy is configured for Azure Kubernetes Cluster | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0189 | Ensure Web Application Firewall(WAF) is enabled for Azure Application Gateway | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0282 | Ensure Owner roles are not assigned to any principal using Azure Role Assignment | Azure | Identity and Access Management | HIGH |
AC_AZURE_0355 | Ensure DDoS protection standard is enabled for Azure Virtual Network | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0392 | Ensure firewall rules reject internet access for Azure Redis Cache | Azure | Infrastructure Security | HIGH |
AC_AZURE_0404 | Ensure public access is disabled for Azure PostgreSQL Server | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0425 | Ensure VNC Listener (TCP:5500) is not exposed to more than 32 private hosts for Azure Network Security Rule | Azure | Infrastructure Security | LOW |