Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_AZURE_0092Ensure shared access policies are not used for IoT Hub Device Provisioning Service (DPS)AzureInfrastructure Security
HIGH
AC_AZURE_0098Ensure that the attribute 'permissive_output_firewall_rules' in Defender for IoT is not set to falseAzureInfrastructure Security
MEDIUM
AC_AZURE_0101Ensure that the attribute 'shared_credentials' in Defender for IoT is not set to falseAzureInfrastructure Security
HIGH
AC_AZURE_0102Ensure that the attribute 'ip_filter_permissive_rule' in Defender for IoT is not set to falseAzureInfrastructure Security
MEDIUM
AC_AZURE_0109Ensure public IP addresses are not assigned to Azure Linux Virtual MachinesAzureSecurity Best Practices
HIGH
AC_AZURE_0206Ensure cross account access is disabled for Azure SQL Firewall RuleAzureIdentity and Access Management
MEDIUM
AC_AZURE_0261Ensure public network access is disabled for Azure Data FactoryAzureInfrastructure Security
MEDIUM
AC_AZURE_0353Ensure a site-to-site VPN functionality by making use of Azure Virtual WANAzureInfrastructure Security
MEDIUM
AC_AZURE_0374Ensure a firewall is attached to Azure SQL ServerAzureInfrastructure Security
MEDIUM
AC_AZURE_0383Ensure that 'Threat Detection' is enabled for Azure SQL DatabaseAzureLogging and Monitoring
MEDIUM
AC_GCP_0248Ensure default service account is not used at organization level for Google CloudGCPIdentity and Access Management
HIGH
AC_K8S_0049Ensure ALLOW-with-positive-matching exist for Istio Authorization ObjectKubernetesInfrastructure Security
MEDIUM
AC_K8S_0118Ensure overly broad host configuration is not allowed for Istio GatewayKubernetesInfrastructure Security
HIGH
AC_AZURE_0308Ensure public access is disabled for Azure MySQL Single ServerAzureInfrastructure Security
HIGH
AC_AWS_0058Ensure storage encryption at rest is enabled for Amazon Relational Database Service (Amazon RDS) instancesAWSData Protection
HIGH
AC_AWS_0067Ensure Amazon Relational Database Service (Amazon RDS) instances are not open to a public scopeAWSInfrastructure Security
HIGH
AC_GCP_0317Ensure 'log_statement_stats' database flag for Cloud SQL PostgreSQL instance is set to 'off'GCPCompliance Validation
LOW
AC_AWS_0211Ensure AWS S3 Buckets are not listable for Authenticated users groupAWSIdentity and Access Management
HIGH
AC_AZURE_0337Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall RuleAzureLogging and Monitoring
MEDIUM
AC_AWS_0199Ensure public access is disabled for AWS Redshift ClustersAWSInfrastructure Security
HIGH
AC_AWS_0234Ensure Security Groups do not have unrestricted specific ports open - Elasticsearch (TCP,9200)AWSInfrastructure Security
HIGH
AC_AWS_0239Ensure Security Groups do not have unrestricted specific ports open - Cassandra (TCP,7001)AWSInfrastructure Security
HIGH
AC_AWS_0243Ensure Security Groups do not have unrestricted specific ports open - LDAP SSL (TCP,636)AWSInfrastructure Security
HIGH
AC_AWS_0247Ensure Security Groups do not have unrestricted specific ports open - MSSQL Server (TCP,1433)AWSInfrastructure Security
HIGH
AC_AWS_0252Ensure Security Groups do not have unrestricted specific ports open - Mongo Web Portal (TCP,27018)AWSInfrastructure Security
HIGH
AC_AWS_0254Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Name Service (TCP,137)AWSInfrastructure Security
HIGH
AC_AWS_0262Ensure Security Groups do not have unrestricted specific ports open - Postgres SQL (TCP,5432)AWSInfrastructure Security
HIGH
AC_AWS_0269Ensure Security Groups do not have unrestricted specific ports open - SaltStack Master (TCP,4505)AWSInfrastructure Security
HIGH
AC_AWS_0272Ensure Security Groups do not have unrestricted specific ports open - SMTP (TCP,25)AWSInfrastructure Security
HIGH
AC_AWS_0276Ensure Unknown Port is not exposed to the entire internetAWSInfrastructure Security
HIGH
AC_AWS_0280Ensure Cassandra OpsCenter agent port (TCP,61621) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0284Ensure Known internal web port (TCP,8080) is not accessible by a CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0289Ensure MSSQL Server (TCP,1433) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0294Ensure Mongo Web Portal (TCP,27018) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0298Ensure NetBios Datagram Service (TCP,138) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0303Ensure Oracle DB SSL (UDP,2484) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0305Ensure Postgres SQL (UDP,5432) is not accessible by a CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0326Ensure Security Groups Unrestricted Specific Ports CassandraOpsCenteragent (TCP,61621) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0329Ensure Security Groups Unrestricted Specific Ports MSSQLBrowserService (UDP,1434) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0330Ensure Security Groups Unrestricted Specific Ports MSSQLDebugger (TCP,135) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0340Ensure Knowninternalwebport' (TCP,8000) not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0347Ensure NetBIOSSessionService' (TCP,139) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0349Ensure OracleDBSSL' (TCP,2484) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0350Ensure OracleDBSSL' (UDP,2484) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0351Ensure PostgresSQL' (TCP,5432) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0358Ensure OracleDatabaseServer' (TCP,521) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0363Ensure Elasticsearch' (TCP,9300) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AZURE_0351Ensure Azure Web Application Firewall Policy is enabledAzureInfrastructure Security
MEDIUM
AC_AZURE_0381Ensure access to Azure SQL Servers is restricted within Azure Infrastructure via Azure SQL Firewall RuleAzureInfrastructure Security
HIGH
AC_AZURE_0391Ensure that firewall rules does not allow unrestricted access to Azure Redis Cache from other Azure sourcesAzureInfrastructure Security
HIGH