Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_AWS_0062Ensure performance insights are enabled for Amazon Relational Database Service (Amazon RDS) instancesAWSLogging and Monitoring
MEDIUM
AC_AWS_0082Ensure AWS best practices are followed while deciding names for tags in AWS EBS volumesAWSCompliance Validation
LOW
AC_AWS_0104Ensure multi-az is configured for AWS ElastiCache ClustersAWSResilience
MEDIUM
AC_AWS_0105Ensure slow logs (index slow logs) are enabled for AWS ElasticSearch DomainAWSCompliance Validation
MEDIUM
AC_AWS_0124Ensure termination protection is enabled for AWS EMR clustersAWSResilience
MEDIUM
AC_AWS_0170Ensure there are no hard coded scripts used in base64 encoded value of AWS Launch ConfigurationAWSData Protection
HIGH
AC_AWS_0187Ensure copy tags to snapshots feature is enabled for Amazon Relational Database Service (Amazon RDS) clustersAWSCompliance Validation
LOW
AC_AWS_0188Ensure deletion protection is enabled for Amazon Relational Database Service (Amazon RDS) clustersAWSData Protection
MEDIUM
AC_AWS_0190Ensure backtracking is enabled for Amazon Relational Database Service (Amazon RDS) clusterAWSCompliance Validation
MEDIUM
AC_AWS_0191Ensure default ports are not used by Amazon Relational Database Service (Amazon RDS) instancesAWSInfrastructure Security
MEDIUM
AC_AWS_0389Ensure feature to compress objects automatically is configured for AWS CloudfrontAWSCompliance Validation
LOW
AC_AWS_0430Ensure there are no unnamed AWS EC2 instancesAWSCompliance Validation
LOW
AC_AWS_0456Ensure IMDSv1 is disabled for AWS EC2 instances in AWS Launch ConfigurationAWSInfrastructure Security
HIGH
AC_AWS_0483Ensure there is no policy with an invalid principal format for Amazon Simple Notification Service (SNS) TopicAWSIdentity and Access Management
LOW
AC_AWS_0484Ensure there is no policy with an invalid principal key for Amazon Simple Notification Service (SNS) TopicAWSIdentity and Access Management
LOW
AC_AWS_0486Ensure there is no policy with an invalid principal key for Amazon Simple Queue Service (SQS) QueueAWSIdentity and Access Management
LOW
AC_AWS_0548Ensure logging is enabled for AWS CloudFrontAWSLogging and Monitoring
MEDIUM
AC_AWS_0620Ensure there is no policy with wildcards (*) used in principal for Amazon Simple Notification Service (SNS) TopicAWSIdentity and Access Management
LOW
AC_AZURE_0112Ensure Time To Live (TTL) of the DNS record is not more than 60 minutes for Azure Private DNS Cname RecordAzureSecurity Best Practices
MEDIUM
AC_AZURE_0221Ensure CORS is configured to allow only trusted clients for Azure Healthcare ServiceAzureInfrastructure Security
MEDIUM
AC_AZURE_0222Ensure failing azure functions have email alerts configured for Azure Monitor Action GroupAzureCompliance Validation
MEDIUM
AC_AZURE_0267Ensure that 'Phone number' is set for Azure Security Center ContactAzureSecurity Best Practices
MEDIUM
AC_AZURE_0269Ensure that Accelerated Networking feature is enabled for Azure virtual machines (VMs)AzureCompliance Validation
LOW
AC_AZURE_0297Ensure that Azure Files are used for Azure App ServiceAzureResilience
MEDIUM
AC_AZURE_0302Ensure read, write and delete request logging is enabled for queue service in Azure Storage AccountAzureLogging and Monitoring
MEDIUM
AC_AZURE_0306Ensures that Active Directory is used for authentication for Azure Service Fabric ClusterAzureInfrastructure Security
MEDIUM
AC_AZURE_0363Ensure ssh keys are used to auth Azure Virtual MachineAzureIdentity and Access Management
MEDIUM
AC_AZURE_0369Ensure that VM agent is installed on Azure Virtual MachineAzureCompliance Validation
LOW
AC_AZURE_0541Ensure permission type is not set to 'Admin' in oauth2_permissions for AzureAD ApplicationAzureIdentity and Access Management
HIGH
AC_GCP_0283Ensure KMS customer managed keys are used in Google Dataflow JobGCPData Protection
MEDIUM
AC_GCP_0290Ensure master authorized networks config block is set for Google Container ClusterGCPInfrastructure Security
LOW
AC_K8S_0127Ensure metadata annotations are restricted in an Ingress objectKubernetesInfrastructure Security
HIGH
AC_AZURE_0127Ensure that Azure Active Directory Admin is configured for Azure MySQL Single ServerAzureIdentity and Access Management
HIGH
AC_AWS_0140Ensure IAM password policy prevents password reuseAWSCompliance Validation
LOW
AC_AWS_0144Ensure IAM policies that allow full "*:*" administrative privileges are not attachedAWSIdentity and Access Management
HIGH
AC_AWS_0594Ensure no 'root' user account access key existsAWSIdentity and Access Management
HIGH
AC_AWS_0601Ensure hardware MFA is enabled for the 'root' user accountAWSCompliance Validation
HIGH
AC_AWS_0432Ensure IAM Users Receive Permissions Only Through GroupsAWSIdentity and Access Management
MEDIUM
AC_AZURE_0235Ensure SQL Server Threat Detection Retention is set to a value greater than 90 days for Azure SQL DatabaseAzureLogging and Monitoring
MEDIUM
AC_AZURE_0001Ensure SQL Server Threat Detection Retention is set to a value greater than 90 days for Azure SQL DatabaseAzureLogging and Monitoring
MEDIUM
AC_AWS_0583Ensure CloudTrail is enabled in all regionsAWSLogging and Monitoring
MEDIUM
AC_K8S_0006Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriateKubernetesInfrastructure Security
MEDIUM
AC_K8S_0039Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriateKubernetesData Protection
MEDIUM
AC_AWS_0081Ensure AWS EBS Volume has a corresponding AWS EBS SnapshotAWSData Protection
HIGH
AC_AWS_0374Ensure data encryption is enabled for AWS X-RayAWSData Protection
HIGH
AC_AWS_0431Ensure cloud users don't have any direct permissions in AWS IAM PolicyAWSIdentity and Access Management
MEDIUM
AC_AWS_0445Ensure policies are used for AWS CloudFormation StacksAWSSecurity Best Practices
MEDIUM
AC_AWS_0453Ensure one target group is configured to listen on HTTPS for AWS Load BalancerAWSInfrastructure Security
HIGH
AC_AWS_0462Ensure no policy is attached that may cause privilege escalation for AWS IAM Role PolicyAWSIdentity and Access Management
HIGH
AC_AWS_0465Ensure secrets are encrypted using AWS KMS key for AWS Secrets ManagerAWSData Protection
MEDIUM