Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_K8S_0028Ensure that the --insecure-port argument is set to 0KubernetesInfrastructure Security
HIGH
AC_K8S_0004Ensure that the --eventRecordQPS argument is set to 0 or a level which ensures appropriate event captureKubernetesLogging and Monitoring
LOW
AC_K8S_0103Minimize access to create podsKubernetesIdentity and Access Management
HIGH
AC_AWS_0012Ensure CloudWatch Logs are enabled for AWS API Gateway StageAWSLogging and Monitoring
MEDIUM
AC_AWS_0013Ensure SSL Client Certificate is enabled for AWS API Gateway StageAWSInfrastructure Security
MEDIUM
AC_AWS_0016Ensure Auto-scaling is configured for both index and tables in AWS DynamoDbAWSCompliance Validation
MEDIUM
AC_AWS_0062Ensure performance insights are enabled for Amazon Relational Database Service (Amazon RDS) instancesAWSLogging and Monitoring
MEDIUM
AC_AWS_0082Ensure AWS best practices are followed while deciding names for tags in AWS EBS volumesAWSCompliance Validation
LOW
AC_AWS_0104Ensure multi-az is configured for AWS ElastiCache ClustersAWSResilience
MEDIUM
AC_AWS_0105Ensure slow logs (index slow logs) are enabled for AWS ElasticSearch DomainAWSCompliance Validation
MEDIUM
AC_AWS_0124Ensure termination protection is enabled for AWS EMR clustersAWSResilience
MEDIUM
AC_AWS_0170Ensure there are no hard coded scripts used in base64 encoded value of AWS Launch ConfigurationAWSData Protection
HIGH
AC_AWS_0187Ensure copy tags to snapshots feature is enabled for Amazon Relational Database Service (Amazon RDS) clustersAWSCompliance Validation
LOW
AC_AWS_0188Ensure deletion protection is enabled for Amazon Relational Database Service (Amazon RDS) clustersAWSData Protection
MEDIUM
AC_AWS_0190Ensure backtracking is enabled for Amazon Relational Database Service (Amazon RDS) clusterAWSCompliance Validation
MEDIUM
AC_AWS_0191Ensure default ports are not used by Amazon Relational Database Service (Amazon RDS) instancesAWSInfrastructure Security
MEDIUM
AC_AWS_0389Ensure feature to compress objects automatically is configured for AWS CloudfrontAWSCompliance Validation
LOW
AC_AWS_0430Ensure there are no unnamed AWS EC2 instancesAWSCompliance Validation
LOW
AC_AWS_0456Ensure IMDSv1 is disabled for AWS EC2 instances in AWS Launch ConfigurationAWSInfrastructure Security
HIGH
AC_AWS_0483Ensure there is no policy with an invalid principal format for Amazon Simple Notification Service (SNS) TopicAWSIdentity and Access Management
LOW
AC_AWS_0484Ensure there is no policy with an invalid principal key for Amazon Simple Notification Service (SNS) TopicAWSIdentity and Access Management
LOW
AC_AWS_0486Ensure there is no policy with an invalid principal key for Amazon Simple Queue Service (SQS) QueueAWSIdentity and Access Management
LOW
AC_AWS_0548Ensure logging is enabled for AWS CloudFrontAWSLogging and Monitoring
MEDIUM
AC_AWS_0620Ensure there is no policy with wildcards (*) used in principal for Amazon Simple Notification Service (SNS) TopicAWSIdentity and Access Management
LOW
AC_AZURE_0112Ensure Time To Live (TTL) of the DNS record is not more than 60 minutes for Azure Private DNS Cname RecordAzureSecurity Best Practices
MEDIUM
AC_AZURE_0221Ensure CORS is configured to allow only trusted clients for Azure Healthcare ServiceAzureInfrastructure Security
MEDIUM
AC_AZURE_0222Ensure failing azure functions have email alerts configured for Azure Monitor Action GroupAzureCompliance Validation
MEDIUM
AC_AZURE_0267Ensure that 'Phone number' is set for Azure Security Center ContactAzureSecurity Best Practices
MEDIUM
AC_AZURE_0269Ensure that Accelerated Networking feature is enabled for Azure virtual machines (VMs)AzureCompliance Validation
LOW
AC_AZURE_0297Ensure that Azure Files are used for Azure App ServiceAzureResilience
MEDIUM
AC_AZURE_0302Ensure read, write and delete request logging is enabled for queue service in Azure Storage AccountAzureLogging and Monitoring
MEDIUM
AC_AZURE_0306Ensures that Active Directory is used for authentication for Azure Service Fabric ClusterAzureInfrastructure Security
MEDIUM
AC_AZURE_0363Ensure ssh keys are used to auth Azure Virtual MachineAzureIdentity and Access Management
MEDIUM
AC_AZURE_0369Ensure that VM agent is installed on Azure Virtual MachineAzureCompliance Validation
LOW
AC_AZURE_0541Ensure permission type is not set to 'Admin' in oauth2_permissions for AzureAD ApplicationAzureIdentity and Access Management
HIGH
AC_GCP_0290Ensure master authorized networks config block is set for Google Container ClusterGCPInfrastructure Security
LOW
AC_K8S_0127Ensure metadata annotations are restricted in an Ingress objectKubernetesInfrastructure Security
HIGH
AC_AZURE_0127Ensure that Azure Active Directory Admin is configured for Azure MySQL Single ServerAzureIdentity and Access Management
HIGH
AC_AZURE_0040Ensure that Vulnerability Assessment (VA) setting 'Periodic recurring scans' is set to 'on' for each SQL serverAzureIdentity and Access Management
MEDIUM
AC_AZURE_0053Ensure that Microsoft Defender for SQL is set to 'On' for critical SQL ServersAzureInfrastructure Security
HIGH
AC_AWS_0606Ensure MFA Delete is enabled on S3 bucketsAWSSecurity Best Practices
HIGH
AC_AWS_0432Ensure IAM Users Receive Permissions Only Through GroupsAWSIdentity and Access Management
MEDIUM
AC_K8S_0086The default namespace should not be usedKubernetesSecurity Best Practices
LOW
AC_AZURE_0235Ensure SQL Server Threat Detection Retention is set to a value greater than 90 days for Azure SQL DatabaseAzureLogging and Monitoring
MEDIUM
AC_AZURE_0001Ensure SQL Server Threat Detection Retention is set to a value greater than 90 days for Azure SQL DatabaseAzureLogging and Monitoring
MEDIUM
AC_GCP_0315Ensure 'Log_hostname' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'on'GCPCompliance Validation
LOW
AC_K8S_0039Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriateKubernetesData Protection
MEDIUM
AC_K8S_0038Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriateKubernetesData Protection
MEDIUM
AC_K8S_0041Ensure that the --etcd-cafile argument is set as appropriateKubernetesData Protection
MEDIUM
AC_AWS_0081Ensure AWS EBS Volume has a corresponding AWS EBS SnapshotAWSData Protection
HIGH