Tenable Cloud Security Policies

Search

IDNameCSPDomainSeverity
AC_AZURE_0386Ensure That 'Notify about alerts with the following severity' is Set to 'High'AzureLogging and Monitoring
MEDIUM
AC_AZURE_0387Ensure That No Custom Subscription Owner Roles Are CreatedAzureIdentity and Access Management
MEDIUM
AC_AZURE_0388Ensure guest users are disabled for Azure Role AssignmentAzureIdentity and Access Management
HIGH
AC_AZURE_0389Ensure resource lock enabled for Azure Resource GroupAzureIdentity and Access Management
LOW
AC_AZURE_0390Ensure accessibility is restricted to 256 hosts for Azure Redis CacheAzureInfrastructure Security
MEDIUM
AC_AZURE_0391Ensure that firewall rules does not allow unrestricted access to Azure Redis Cache from other Azure sourcesAzureInfrastructure Security
HIGH
AC_AZURE_0392Ensure firewall rules reject internet access for Azure Redis CacheAzureInfrastructure Security
HIGH
AC_AZURE_0393Ensure regular security and operational updates are enabled for Azure Redis CacheAzureSecurity Best Practices
HIGH
AC_AZURE_0394Ensure only SSL connections are enabled for Azure Redis CacheAzureInfrastructure Security
MEDIUM
AC_AZURE_0395Ensure missing service endpoints are disabled for Azure PostgreSQL Virtual Network RuleAzureSecurity Best Practices
MEDIUM
AC_AZURE_0396Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database ServerAzureLogging and Monitoring
MEDIUM
AC_AZURE_0397Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database ServerAzureInfrastructure Security
LOW
AC_AZURE_0398Ensure infrastructure encryption for Azure PostgreSQL Server is enabledAzureInfrastructure Security
MEDIUM
AC_AZURE_0399Ensure that Identity block is defined and type is set to SystemAssigned for Azure PostgreSQL ServerAzureIdentity and Access Management
LOW
AC_AZURE_0400Ensure TLS connection is enabled for Azure PostgreSQL ServerAzureInfrastructure Security
MEDIUM
AC_AZURE_0401Ensure that Azure Active Directory Admin is configuredAzureIdentity and Access Management
HIGH
AC_AZURE_0402Ensure audit log retention period is greater than 90 days for Azure PostgreSQL ServerAzureResilience
LOW
AC_AZURE_0403Ensure email addresses are setup for Azure PostgreSQL ServerAzureCompliance Validation
LOW
AC_AZURE_0404Ensure public access is disabled for Azure PostgreSQL ServerAzureInfrastructure Security
MEDIUM
AC_AZURE_0405Ensure admin auth is properly setup for Azure PostgreSQL ServerAzureIdentity and Access Management
MEDIUM
AC_AZURE_0406Ensure that Advanced Threat Protection (ATP) on a SQL Server is Set to 'Enabled'AzureInfrastructure Security
HIGH
AC_AZURE_0407Ensure geo-redundant backups are enabled for Azure PostgreSQL ServerAzureResilience
MEDIUM
AC_AZURE_0408Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database ServerAzureInfrastructure Security
HIGH
AC_AZURE_0409Ensure Server Parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database ServerAzureLogging and Monitoring
MEDIUM
AC_AZURE_0410Ensure server parameter 'log_retention_days' is greater than 3 days for PostgreSQL Database ServerAzureResilience
MEDIUM
AC_AZURE_0411Ensure 'log_duration' is set for Azure PostgreSQL ConfigurationAzureLogging and Monitoring
MEDIUM
AC_AZURE_0412Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL Database ServerAzureLogging and Monitoring
MEDIUM
AC_AZURE_0413Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server - azurerm_postgresql_configurationAzureLogging and Monitoring
MEDIUM
AC_AZURE_0414Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server - azurerm_postgresql_configurationAzureLogging and Monitoring
MEDIUM
AC_AZURE_0415Ensure that the retention policy is enabled for Azure Network Watcher Flow LogAzureResilience
MEDIUM
AC_AZURE_0416Ensure that traffic analytics is enabled via Azure Network Watcher Flow LogAzureSecurity Best Practices
MEDIUM
AC_AZURE_0417Ensure that the latest version of NSG flow log is being used via Azure Network Watcher Flow LogAzureSecurity Best Practices
MEDIUM
AC_AZURE_0418Ensure that Network Watcher is 'Enabled'AzureLogging and Monitoring
HIGH
AC_AZURE_0419Ensure that Network Security Group Flow Log retention period is 'greater than 90 days'AzureResilience
MEDIUM
AC_AZURE_0420Ensure only whitelisted IPs can use Azure Search ServiceAzureInfrastructure Security
MEDIUM
AC_AZURE_0421Ensure server is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0422Ensure VNC Server (TCP:5900) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0423Ensure VNC Server (TCP:5900) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0424Ensure VNC Server (TCP:5900) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0425Ensure VNC Listener (TCP:5500) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0426Ensure VNC Listener (TCP:5500) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0427Ensure VNC Listener (TCP:5500) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0428Ensure Telnet (TCP:23) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0429Ensure Telnet (TCP:23) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0430Ensure Telnet (TCP:23) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0431Ensure SaltStack Master (TCP:4506) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0432Ensure SaltStack Master (TCP:4506) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM
AC_AZURE_0433Ensure SaltStack Master (TCP:4506) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH
AC_AZURE_0434Ensure SaltStack Master (TCP:4505) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0435Ensure SaltStack Master (TCP:4505) is not exposed to public for Azure Network Security RuleAzureInfrastructure Security
MEDIUM