Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_AZURE_0062Ensure that RDP access from the Internet is evaluated and restrictedAzureInfrastructure Security
HIGH
AC_AZURE_0191Ensure Web App is using the latest version of TLS encryptionAzureInfrastructure Security
MEDIUM
AC_AZURE_0232Ensure the Storage Container Storing the Activity Logs is not Publicly AccessibleAzureInfrastructure Security
HIGH
AC_GCP_0013Ensure '3625 (trace flag)' database flag for all Cloud SQL Server instances is set to 'on'GCPCompliance Validation
LOW
AC_AZURE_0574Ensure Web App Redirects All HTTP traffic to HTTPS in Azure App Service - azurerm_windows_web_appAzureInfrastructure Security
MEDIUM
AC_AZURE_0576Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On' - azurerm_linux_web_appAzureInfrastructure Security
MEDIUM
AC_AZURE_0588Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL Database ServerAzureLogging and Monitoring
MEDIUM
AC_GCP_0011Ensure KMS Encryption Keys Are Rotated Within a Period of 90 DaysGCPSecurity Best Practices
LOW
AC_AWS_0034Ensure CloudTrail is enabled in all regionsAWSLogging and Monitoring
MEDIUM
AC_AWS_0555Ensure IAM instance roles are used for AWS resource access from instancesAWSIdentity and Access Management
MEDIUM
AC_AWS_0570Ensure a log metric filter and alarm exist for route table changesAWSSecurity Best Practices
HIGH
AC_GCP_0278Ensure Oslogin Is Enabled for a Project - google_compute_instanceGCPSecurity Best Practices
LOW
AC_GCP_0312Ensure That Cloud DNS Logging Is Enabled for All VPC NetworksGCPLogging and Monitoring
MEDIUM
AC_GCP_0323Ensure Compute Instances Are Launched With Shielded VM EnabledGCPInfrastructure Security
LOW
AC_AWS_0033Ensure CloudTrail logs are encrypted at rest using KMS CMKsAWSLogging and Monitoring
HIGH
AC_AWS_0080Ensure EBS volume encryption is enabledAWSData Protection
HIGH
AC_AZURE_0079Ensure that 'Unattached disks' are encrypted with 'Customer Managed Key' (CMK)AzureData Protection
MEDIUM
AC_AZURE_0242Ensure Diagnostic Setting captures appropriate categoriesAzureLogging and Monitoring
MEDIUM
AC_AZURE_0333Ensure that Activity Log Alert exists for Delete Network Security GroupAzureLogging and Monitoring
MEDIUM
AC_AZURE_0397Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database ServerAzureInfrastructure Security
LOW
AC_AWS_0161Ensure deletion window for Customer Managed Keys (CMK) is enabled for AWS Key Management Service (KMS)AWSSecurity Best Practices
HIGH
AC_AZURE_0180Ensure load balancer is enabled for Azure Front DoorAzureResilience
MEDIUM
AC_AZURE_0347Ensure that automatic failover is enabled for Azure CosmosDB AccountAzureData Protection
MEDIUM
AC_GCP_0229Ensure VM Disks for Critical VMs Are Encrypted With Customer-Supplied Encryption Keys (CSEK)GCPData Protection
MEDIUM
AC_GCP_0230Ensure That BigQuery Datasets Are Not Anonymously or Publicly AccessibleGCPIdentity and Access Management
HIGH
AC_GCP_0252Ensure That the 'Log_connections' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'On'GCPCompliance Validation
LOW
AC_GCP_0258Ensure that the 'cross db ownership chaining' database flag for Cloud SQL SQL Server instance is set to 'off'GCPCompliance Validation
LOW
AC_AWS_0230Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration portsAWSInfrastructure Security
HIGH
AC_GCP_0040Ensure That Instances Are Not Configured To Use the Default Service AccountGCPIdentity and Access Management
HIGH
AC_AWS_0566Ensure a log metric filter and alarm exist for AWS Config configuration changesAWSSecurity Best Practices
HIGH
AC_AWS_0587Ensure a log metric filter and alarm exist for usage of 'root' accountAWSSecurity Best Practices
HIGH
AC_AWS_0591Ensure EBS Volume Encryption is Enabled in all RegionsAWSData Protection
HIGH
AC_AZURE_0025Ensure 'Allow Azure services on the trusted services list to access this storage account' is Enabled for Storage Account AccessAzureInfrastructure Security
HIGH
AC_AZURE_0060Ensure that UDP access from the Internet is evaluated and restrictedAzureInfrastructure Security
HIGH
AC_AZURE_0562Ensure no Azure SQL Databases allow ingress from 0.0.0.0/0 (ANY IP)AzureInfrastructure Security
HIGH
AC_AZURE_0567Ensure that Vulnerability Assessment (VA) setting 'Also send email notifications to admins and subscription owners' is set for each SQL ServerAzureIdentity and Access Management
MEDIUM
AC_AZURE_0568Ensure that Register with Azure Active Directory is enabled on App Service - azurerm_linux_web_appAzureSecurity Best Practices
MEDIUM
AC_AZURE_0582Ensure App Service Authentication is set up for apps in Azure App Service - azurerm_windows_web_appAzureIdentity and Access Management
MEDIUM
AC_GCP_0262Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configuredGCPCompliance Validation
LOW
AC_GCP_0263Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative PrivilegesGCPCompliance Validation
LOW
AC_GCP_0273Ensure That RSASHA1 Is Not Used for the Key-Signing Key in Cloud DNS DNSSECGCPInfrastructure Security
MEDIUM
AC_GCP_0279Ensure That the Log Metric Filter and Alerts Exist for VPC Network ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0306Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0309Ensure That the Log Metric Filter and Alerts Exist for VPC Network Firewall Rule ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0310Ensure That the Log Metric Filter and Alerts Exist for VPC Network Route ChangesGCPLogging and Monitoring
MEDIUM
AC_AWS_0084Ensure public repositories are disabled for Amazon Elastic Container Registry (Amazon ECR)AWSIdentity and Access Management
HIGH
AC_AZURE_0086Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'AzureInfrastructure Security
MEDIUM
AC_AZURE_0122Ensure FTP deployments are Disabled - azurerm_linux_function_appAzureInfrastructure Security
MEDIUM
AC_AZURE_0131Ensure 'Enforce SSL connection' is set to 'Enabled' for Standard MySQL Database ServerAzureInfrastructure Security
HIGH
AC_AZURE_0163Ensure that the Expiration Date is set for all Secrets in RBAC Key VaultsAzureData Protection
HIGH