Name | Audit Name | Plugin | Category |
---|---|---|---|
Building Threat Protection Layers | Tenable AWS Best Practice Audit | amazon_aws | PROGRAM MANAGEMENT |
Conclusion | Tenable AWS Best Practice Audit | amazon_aws | PROGRAM MANAGEMENT |
Design Your ISMS to Protect Your Assets on AWS | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, MEDIA PROTECTION, PHYSICAL AND ENVIRONMENTAL PROTECTION, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Mitigating and Protecting Against DoS & DDoS Attacks | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
Mitigating Compromise and Abuse | Tenable AWS Best Practice Audit | amazon_aws | ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT, RISK ASSESSMENT |
Test Security | Tenable AWS Best Practice Audit | amazon_aws | SECURITY ASSESSMENT AND AUTHORIZATION, MEDIA PROTECTION, PLANNING, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
Using Additional Application Security Practices | Tenable AWS Best Practice Audit | amazon_aws | PROGRAM MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |