Tenable Cloud Security Policies

Search

IDNameCSPDomainSeverity
AC_AZURE_0210Ensure that Diagnostic Logs Are Enabled for All Services that Support itAzureLogging and Monitoring
MEDIUM
AC_AZURE_0211Ensure data backup is enabled using `backup_blob_container_uri` for Azure Analysis Services ServersAzureResilience
MEDIUM
AC_AZURE_0212Ensure the "Minimum TLS version" is set to "Version 1.2"AzureInfrastructure Security
MEDIUM
AC_AZURE_0213Ensure that members are always added for AzureAD GroupsAzureCompliance Validation
LOW
AC_AZURE_0214Ensure Azure Keyvaults are used to store secretsAzureData Protection
LOW
AC_AZURE_0215Ensure labels are configured to keep track of organization resources for Azure Kubernetes ClusterAzureCompliance Validation
LOW
AC_AZURE_0216Ensure that a 'Diagnostics Setting' existsAzureLogging and Monitoring
MEDIUM
AC_AZURE_0218Ensure that Activity Log Alert exists for Create Policy AssignmentAzureLogging and Monitoring
MEDIUM
AC_AZURE_0219Ensure that only Azure integrated certificate authorities are in use for issuing certificates used in Azure Key Vault CertificateAzureCompliance Validation
MEDIUM
AC_AZURE_0220Ensure Customer Managed Key (CMK) is configured for Azure Healthcare ServiceAzureInfrastructure Security
MEDIUM
AC_AZURE_0221Ensure CORS is configured to allow only trusted clients for Azure Healthcare ServiceAzureInfrastructure Security
MEDIUM
AC_AZURE_0222Ensure failing azure functions have email alerts configured for Azure Monitor Action GroupAzureCompliance Validation
MEDIUM
AC_AZURE_0223Ensure that auto-scaling is enabled for Azure Kubernetes ClusterAzureResilience
MEDIUM
AC_AZURE_0224Ensure latest TLS/SSL version is in use for Azure API ManagementAzureInfrastructure Security
MEDIUM
AC_AZURE_0225Ensure Power BI analysis services are defined for Azure Analysis Services ServerAzureCompliance Validation
LOW
AC_AZURE_0226Ensure public access is disabled for Azure Healthcare ServiceAzureInfrastructure Security
MEDIUM
AC_AZURE_0227Ensure advanced threat protection is enabled for Azure CosmosDB AccountAzureConfiguration and Vulnerability Analysis
MEDIUM
AC_AZURE_0228Ensure that customer managed key is used for encryption for Azure Container RegistryAzureData Protection
MEDIUM
AC_AZURE_0229Ensure internal load balancing is enabled for Azure App Service EnvironmentAzureResilience
MEDIUM
AC_AZURE_0230Ensure Developer/Premium SKUs are in use for Azure API ManagementAzureInfrastructure Security
MEDIUM
AC_AZURE_0231Ensure that request initiated from all ports (*) for all destination ports (*) is restricted from the internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0232Ensure the Storage Container Storing the Activity Logs is not Publicly AccessibleAzureInfrastructure Security
HIGH
AC_AZURE_0233Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)AzureData Protection
MEDIUM
AC_AZURE_0234Ensure that Vulnerability Assessment Setting 'Also send email notifications to admins and subscription owners' is Set for Each SQL ServerAzureIdentity and Access Management
MEDIUM
AC_AZURE_0235Ensure SQL Server Threat Detection Retention is set to a value greater than 90 days for Azure SQL DatabaseAzureLogging and Monitoring
MEDIUM
AC_AZURE_0236Ensure that VA setting 'Send scan reports to' is configured for a SQL serverAzureIdentity and Access Management
MEDIUM
AC_AZURE_0237Ensure that VA setting 'Periodic recurring scans' to 'on' for each SQL serverAzureIdentity and Access Management
MEDIUM
AC_AZURE_0238Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage AccountAzureIdentity and Access Management
MEDIUM
AC_AZURE_0239Ensure That 'All users with the following roles' is set to 'Owner'AzureLogging and Monitoring
MEDIUM
AC_AZURE_0240Ensure SQL server's TDE protector is encrypted with Customer-managed keyAzureData Protection
MEDIUM
AC_AZURE_0241Ensure that 'Data encryption' is set to 'On' on a SQL DatabaseAzureData Protection
MEDIUM
AC_AZURE_0242Ensure Diagnostic Setting captures appropriate categoriesAzureLogging and Monitoring
MEDIUM
AC_AZURE_0243Ensure that LocalGit repository folder is not set to 'wwwroot' for Azure App ServiceAzureConfiguration and Vulnerability Analysis
HIGH
AC_AZURE_0244Ensure remote debugging is turned off for Azure App ServiceAzureInfrastructure Security
HIGH
AC_AZURE_0245Ensure that 'HTTP Version' is the Latest, if Used to Run the Web AppAzureInfrastructure Security
MEDIUM
AC_AZURE_0246Ensure that 'Java version' is the latest, if used to run the Web AppAzureConfiguration and Vulnerability Analysis
MEDIUM
AC_AZURE_0247Ensure that 'Python version' is the Latest Stable Version, if Used to Run the Web AppAzureConfiguration and Vulnerability Analysis
MEDIUM
AC_AZURE_0248Ensure That 'PHP version' is the Latest, If Used to Run the Web AppAzureConfiguration and Vulnerability Analysis
MEDIUM
AC_AZURE_0249Ensure that '.Net Framework' version is the latest in Azure App ServiceAzureConfiguration and Vulnerability Analysis
MEDIUM
AC_AZURE_0250Ensure integration service environment are used for deployment of Azure Logic App WorkflowAzureSecurity Best Practices
LOW
AC_AZURE_0251Ensure key size is set on all keys for Azure Key Vault KeyAzureSecurity Best Practices
MEDIUM
AC_AZURE_0252Ensure public IP addresses are disabled in Azure Databricks WorkspacesAzureInfrastructure Security
MEDIUM
AC_AZURE_0253Ensure system-assigned managed identity authentication is used for Azure Data FactoryAzureInfrastructure Security
MEDIUM
AC_AZURE_0254Ensure public network access is disabled for Azure Cognitive AccountAzureInfrastructure Security
MEDIUM
AC_AZURE_0255Ensure virtual network configuration is added for Azure Kusto ClusterAzureInfrastructure Security
MEDIUM
AC_AZURE_0256Ensure private DNS zones are not linked to Azure Virtual NetworkAzureCompliance Validation
LOW
AC_AZURE_0257Ensure Azure Active Directory (AAD) is configured for Azure Synapse WorkspaceAzureCompliance Validation
MEDIUM
AC_AZURE_0258Ensure default connection policy is not in use for Azure SQL ServerAzureCompliance Validation
LOW
AC_AZURE_0259Ensure point-in-time-restore is enabled for Azure SQL DatabaseAzureCompliance Validation
MEDIUM
AC_AZURE_0260Ensure backup retention period is enabled for Azure PostgreSQL ServerAzureCompliance Validation
HIGH