AC_GCP_0245 | Ensure IAM roles do not impersonate or manage service accounts through Google Folder IAM Binding | GCP | Identity and Access Management | LOW |
AC_K8S_0073 | Ensure AppArmor profile is not set to runtime/default in Kubernetes workload configuration | Kubernetes | Identity and Access Management | MEDIUM |
AC_K8S_0079 | Ensure containers run with a high UID usually > 1000 to avoid host conflict | Kubernetes | Infrastructure Security | MEDIUM |
AC_K8S_0099 | Ensure Memory request is set for Kubernetes workloads | Kubernetes | Security Best Practices | MEDIUM |
AC_K8S_0100 | Ensure Memory request is set for Kubernetes workloads | Kubernetes | Security Best Practices | MEDIUM |
AC_K8S_0112 | Ensure the use of externalIPs is restricted for Kubernetes service | Kubernetes | Infrastructure Security | MEDIUM |
AC_AWS_0085 | Ensure permissions are tightly controlled for Amazon Elastic Container Registry (Amazon ECR) | AWS | Identity and Access Management | HIGH |
AC_AWS_0048 | Ensure Elastic Block Store (EBS) volumes are encrypted through AWS Config | AWS | Data Protection | MEDIUM |
AC_AWS_0115 | Ensure HTTPS-only is enforced for AWS ElasticSearch Domain | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0182 | Ensure storage encryption is enabled for AWS Neptune cluster | AWS | Data Protection | HIGH |
AC_AWS_0371 | Ensure user volumes are encrypted for the AWS Workspaces | AWS | Data Protection | MEDIUM |
AC_AWS_0461 | Ensure AWS ECR Repository uses KMS for server-side encryption | AWS | Data Protection | MEDIUM |
AC_AZURE_0096 | Ensure IP addresses are masked in the logs for IoT Hub | Azure | Infrastructure Security | LOW |
AC_AZURE_0208 | Ensure that Active Azure Service Fabric clusters are automatically upgraded to latest version | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0209 | Ensure that Active Azure Service Fabric clusters are not using CVE-2022-30137 vulnerable cluster version(8.2.1124.1) | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0304 | Ensure extensions are not installed on Azure Windows Virtual Machine | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0379 | Ensure data encryption is enabled for Azure Synapse SQL Pool | Azure | Data Protection | MEDIUM |
AC_AZURE_0398 | Ensure infrastructure encryption for Azure PostgreSQL Server is enabled | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0406 | Ensure that Advanced Threat Protection (ATP) on a SQL Server is Set to 'Enabled' | Azure | Infrastructure Security | HIGH |
AC_K8S_0002 | Ensure HTTPS is enabled on Kubernetes Ingress resource | Kubernetes | Infrastructure Security | MEDIUM |
AC_K8S_0020 | Ensure kube-controller-manager (affected versions of kube-controller-manager: v1.18.0, v1.17.0 - v1.17.4, v1.16.0 - v1.16.8, and v1.15.11) are not vulnerable to CVE-2020-8555 | Kubernetes | Data Protection | MEDIUM |
AC_K8S_0071 | Ensure that the Tiller Service (Helm v2) is not deployed for Kubernetes workloads | Kubernetes | Data Protection | MEDIUM |
AC_K8S_0125 | Ensure kernel level call configurations are not vulnerable to CVE-2022-0811 in all Kubernetes workloads | Kubernetes | Identity and Access Management | HIGH |
AC_AWS_0155 | Ensure at-rest server side encryption (SSE) is enabled for data stored in AWS Kinesis Server | AWS | Data Protection | HIGH |
AC_AWS_0159 | Ensure customer master key (CMK) is not disabled for AWS Key Management Service (KMS) | AWS | Resilience | HIGH |
AC_AWS_0235 | Ensure Security Groups do not have unrestricted specific ports open - Elasticsearch (TCP,9300) | AWS | Infrastructure Security | HIGH |
AC_AWS_0250 | Ensure Security Groups do not have unrestricted specific ports open - Memcached SSL (UDP,11214) | AWS | Infrastructure Security | HIGH |
AC_AWS_0251 | Ensure Security Groups do not have unrestricted specific ports open - Memcached SSL (UDP,11215) | AWS | Infrastructure Security | HIGH |
AC_AWS_0255 | Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Name Service (UDP,137) | AWS | Infrastructure Security | HIGH |
AC_AWS_0260 | Ensure Security Groups do not have unrestricted specific ports open - Oracle DB SSL (TCP,2484) | AWS | Infrastructure Security | HIGH |
AC_AWS_0261 | Ensure Security Groups do not have unrestricted specific ports open - Oracle DB SSL (UDP,2484) | AWS | Infrastructure Security | HIGH |
AC_AWS_0266 | Ensure Security Groups do not have unrestricted specific ports open - SNMP (UDP,161) | AWS | Infrastructure Security | HIGH |
AC_AWS_0271 | Ensure Security Groups do not have unrestricted specific ports open - Telnet (TCP,23) | AWS | Infrastructure Security | HIGH |
AC_AWS_0273 | Ensure Security Groups do not have unrestricted specific ports open - CIFS for file/printer (TCP,445) | AWS | Infrastructure Security | HIGH |
AC_AWS_0277 | Ensure SaltStack Master (TCP,4505) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0279 | Ensure CIFS / SMB (TCP,3020) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0281 | Ensure Cassandra (TCP,7001) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0286 | Ensure MSSQL Admin (TCP,1434) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0291 | Ensure Memcached SSL (TCP,11215) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0296 | Ensure NetBIOS Name Service (TCP,137) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0297 | Ensure NetBIOS Name Service (UDP,137) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0309 | Ensure SQL Server Analysis Service browser (TCP,2382) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0314 | Ensure SMTP (TCP,25) is not accessible by a public CIDR block range | AWS | Infrastructure Security | HIGH |
AC_AWS_0315 | Ensure CIFS for file/printer (TCP,445) is not accessible by a public CIDR block range | AWS | Infrastructure Security | HIGH |
AC_AWS_0322 | Ensure Security Groups Unrestricted Specific Ports https (TCP,443) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0338 | Ensure Cassandra' (TCP,7001) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0339 | Ensure HadoopNameNode' (TCP,9000) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0341 | Ensure LDAPSSL' (TCP,636) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0345 | Ensure NetBIOSNameService' (TCP,137) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0352 | Ensure PostgresSQL' (UDP,5432) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |