Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_AZURE_0021Ensure Soft Delete is Enabled for Azure Containers and Blob StorageAzureData Protection
MEDIUM
AC_AZURE_0061Ensure that SSH access from the Internet is evaluated and restrictedAzureInfrastructure Security
HIGH
AC_AZURE_0062Ensure that RDP access from the Internet is evaluated and restrictedAzureInfrastructure Security
HIGH
AC_AZURE_0191Ensure Web App is using the latest version of TLS encryptionAzureInfrastructure Security
MEDIUM
AC_AZURE_0232Ensure the Storage Container Storing the Activity Logs is not Publicly AccessibleAzureInfrastructure Security
HIGH
AC_GCP_0013Ensure '3625 (trace flag)' database flag for all Cloud SQL Server instances is set to 'on'GCPCompliance Validation
LOW
S3_AWS_0009Ensure that Object-level logging for read events is enabled for S3 bucket - Terraform Version 1.xAWSIdentity and Access Management
HIGH
AC_AWS_0171Ensure weak ciphers are removed for AWS Elastic Load Balancers (ELB)AWSInfrastructure Security
HIGH
AC_K8S_0067Ensure Kubernetes dashboard is not deployedKubernetesData Protection
MEDIUM
AC_AZURE_0254Ensure public network access is disabled for Azure Cognitive AccountAzureInfrastructure Security
MEDIUM
AC_AZURE_0258Ensure default connection policy is not in use for Azure SQL ServerAzureCompliance Validation
LOW
AC_AZURE_0266Ensure managed virtual networks are in use for Azure Synapse WorkspaceAzureInfrastructure Security
LOW
AC_AZURE_0307Ensure public access is disabled for Azure Search ServiceAzureInfrastructure Security
HIGH
AC_AZURE_0313Ensure that virtual networks are in use for Azure API ManagementAzureInfrastructure Security
MEDIUM
AC_GCP_0284Ensure datastore storage resource does not have access policy set to 'Public' for Google App Engine ApplicationGCPInfrastructure Security
MEDIUM
AC_GCP_0286Ensure compatibility firestore storage resource does not have access policy set to 'Public' for Google App Engine ApplicationGCPInfrastructure Security
MEDIUM
AC_K8S_0121Ensure default-deny patterns are defined for Istio Authorization PolicyKubernetesInfrastructure Security
HIGH
AC_AWS_0001Ensure AWS ACM only has certificates with single domain names, and none with wildcard domain namesAWSCompliance Validation
LOW
AC_AWS_0083Ensure scan on push is enabled on Amazon Elastic Container Registry (Amazon ECR) repositoryAWSConfiguration and Vulnerability Analysis
MEDIUM
AC_AWS_0118Ensure public access is disabled for AWS ElasticSearch Domains - aws_elasticsearch_domain_policyAWSIdentity and Access Management
HIGH
AC_AWS_0149Ensure no user can assume the role without MFA is specified in the condition parameter of AWS IAM User PolicyAWSCompliance Validation
LOW
AC_AWS_0217Ensure 'allow all actions from all principals' is disabled for AWS S3 BucketsAWSIdentity and Access Management
HIGH
AC_AZURE_0100Ensure that the attribute 'ip_filter_deny_all' in Defender for IoT is not set to falseAzureInfrastructure Security
MEDIUM
AC_AZURE_0149Ensure anti-malware protection is enabled with real time protection for Azure Linux Virtual Machine Scale SetAzureConfiguration and Vulnerability Analysis
MEDIUM
AC_AZURE_0204Ensure Synapse Workspace is not accessible to public via Azure Synapse Firewall RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0207Ensure cross account access is disabled for Azure Redis CacheAzureIdentity and Access Management
MEDIUM
AC_AZURE_0574Ensure Web App Redirects All HTTP traffic to HTTPS in Azure App Service - azurerm_windows_web_appAzureInfrastructure Security
MEDIUM
AC_AZURE_0576Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On' - azurerm_linux_web_appAzureInfrastructure Security
MEDIUM
AC_AZURE_0588Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL Database ServerAzureLogging and Monitoring
MEDIUM
AC_GCP_0011Ensure KMS Encryption Keys Are Rotated Within a Period of 90 DaysGCPSecurity Best Practices
LOW
AC_AWS_0034Ensure CloudTrail is enabled in all regionsAWSLogging and Monitoring
MEDIUM
AC_AWS_0555Ensure IAM instance roles are used for AWS resource access from instancesAWSIdentity and Access Management
MEDIUM
AC_AWS_0570Ensure a log metric filter and alarm exist for route table changesAWSSecurity Best Practices
HIGH
AC_GCP_0278Ensure Oslogin Is Enabled for a Project - google_compute_instanceGCPSecurity Best Practices
LOW
AC_GCP_0312Ensure That Cloud DNS Logging Is Enabled for All VPC NetworksGCPLogging and Monitoring
MEDIUM
AC_GCP_0323Ensure Compute Instances Are Launched With Shielded VM EnabledGCPInfrastructure Security
LOW
AC_AZURE_0282Ensure Owner roles are not assigned to any principal using Azure Role AssignmentAzureIdentity and Access Management
HIGH
AC_AZURE_0355Ensure DDoS protection standard is enabled for Azure Virtual NetworkAzureInfrastructure Security
MEDIUM
AC_AZURE_0392Ensure firewall rules reject internet access for Azure Redis CacheAzureInfrastructure Security
HIGH
AC_AZURE_0404Ensure public access is disabled for Azure PostgreSQL ServerAzureInfrastructure Security
MEDIUM
AC_AZURE_0425Ensure VNC Listener (TCP:5500) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0430Ensure Telnet (TCP:23) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0433Ensure SaltStack Master (TCP:4506) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0445Ensure SNMP (Udp:161) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0447Ensure SMTP (TCP:25) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0449Ensure Puppet Master (TCP:8140) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0450Ensure Puppet Master (TCP:8140) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0452Ensure web port (TCP:3000) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0459Ensure PostgreSQL (TCP:5432) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0466Ensure Oracle DB SSL (Udp:2484) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH