Name | Audit Name | Plugin | Category |
---|---|---|---|
Design Your ISMS to Protect Your Assets on AWS | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, MEDIA PROTECTION, PHYSICAL AND ENVIRONMENTAL PROTECTION, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
FireEye - YARA policy applies both customer and FireEye rules | TNS FireEye | FireEye | SECURITY ASSESSMENT AND AUTHORIZATION |
FireEye - YARA rules are enabled | TNS FireEye | FireEye | SECURITY ASSESSMENT AND AUTHORIZATION |
Mitigating and Protecting Against DoS & DDoS Attacks | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Mitigating Compromise and Abuse | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT, RISK ASSESSMENT |
Using the AWS Trusted Advisor Tool | Tenable AWS Best Practice Audit | amazon_aws | SECURITY ASSESSMENT AND AUTHORIZATION |