Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_GCP_0247Ensure IAM roles do not impersonate or manage service accounts used at organization level for Google CloudGCPIdentity and Access Management
HIGH
AC_GCP_0285Ensure firestore storage resource does not have access policy set to 'Public' for Google App Engine ApplicationGCPInfrastructure Security
MEDIUM
AC_AWS_0032Ensure a web application firewall is enabled for AWS CloudFront distributionAWSInfrastructure Security
MEDIUM
AC_AWS_0078Ensure customer managed keys (CMK) are used for server side encryption (SSE) of AWS DyanamoDB tablesAWSData Protection
MEDIUM
AC_AWS_0101Ensure public access is disabled for AWS Elastic Kubernetes Service (EKS) API serversAWSInfrastructure Security
MEDIUM
AC_AWS_0106Ensure public access is disabled for AWS ElasticSearch Domains - aws_elasticsearch_domainAWSIdentity and Access Management
HIGH
AC_AWS_0232Ensure insecure SSL protocols are not configured for AWS CloudFront originAWSInfrastructure Security
MEDIUM
AC_AWS_0384Ensure data encryption is enabled for AWS SageMaker Notebook instancesAWSData Protection
HIGH
AC_AWS_0391Ensure 'public IP on launch' is not enabled for AWS SubnetsAWSInfrastructure Security
MEDIUM
AC_AWS_0396Ensure requests greater than 8 KB are blocked by AWS Web Application FirewallAWSSecurity Best Practices
HIGH
AC_AWS_0424Ensure direct access from the internet is disabled for AWS SageMaker Notebook instancesAWSData Protection
HIGH
AC_AWS_0438Ensure that there are no orphan in AWS IAM groupsAWSCompliance Validation
LOW
AC_AWS_0549Ensure geo-restriction is enabled for AWS CloudFrontAWSInfrastructure Security
LOW
AC_AZURE_0003Ensure that 'Threat Detection' is enabled for Azure SQL DatabaseAzureLogging and Monitoring
MEDIUM
AC_AZURE_0099Ensure that the attribute 'privileged_docker_options' in Defender for IoT is not set to falseAzureInfrastructure Security
HIGH
AC_AZURE_0104Ensure that the attribute 'edge_logging_option' in Defender for IoT is not set to falseAzureInfrastructure Security
MEDIUM
AC_AZURE_0108Ensure public IP addresses are not assigned to Azure Windows Virtual MachinesAzureSecurity Best Practices
HIGH
AC_AWS_0166Ensure at-rest data encryption is enabled for AWS ECS clustersAWSData Protection
LOW
AC_AWS_0167Ensure at-rest data encryption is enabled for AWS EBS Root Block clusterAWSData Protection
HIGH
AC_AWS_0228Ensure Security Groups do not have unrestricted specific ports open - (HTTP,80)AWSInfrastructure Security
HIGH
AC_AWS_0231Ensure no security groups allow ingress from 0.0.0.0/0 to ALL ports and protocolsAWSInfrastructure Security
HIGH
AC_AWS_0248Ensure Security Groups do not have unrestricted specific ports open - Memcached SSL (TCP,11214)AWSInfrastructure Security
HIGH
AC_AWS_0257Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Datagram Service (UDP,138)AWSInfrastructure Security
HIGH
AC_AWS_0258Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Session Service (TCP,139)AWSInfrastructure Security
HIGH
AC_AWS_0263Ensure Security Groups do not have unrestricted specific ports open - Postgres SQL (UDP,5432)AWSInfrastructure Security
HIGH
AC_AWS_0264Ensure Security Groups do not have unrestricted specific ports open - Prevalent known internal port (TCP,3000)AWSInfrastructure Security
HIGH
AC_AWS_0268Ensure Security Groups do not have unrestricted specific ports open - SQL Server Analysis Services (TCP,2383)AWSInfrastructure Security
HIGH
AC_AWS_0278Ensure SaltStack Master (TCP,4506) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0287Ensure MSSQL Browser Service (UDP,1434) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0288Ensure MSSQL Debugger (TCP,135) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0295Ensure MySQL (TCP,3306) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0304Ensure Postgres SQL (TCP,5432) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0308Ensure SNMP (UDP,161) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0313Ensure Telnet (TCP,23) is not accessible by a public CIDR block rangeAWSInfrastructure Security
HIGH
AC_AWS_0320Ensure Security Groups Unrestricted Specific Ports SSH (TCP,22) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0327Ensure Security Groups Unrestricted Specific Ports Knowninternalwebport (TCP,8080) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0331Ensure Security Groups Unrestricted Specific Ports MSSQLServer (TCP,1433) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0348Ensure NetBIOSSessionService' (UDP,139) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0354Ensure PuppetMaster' (TCP,8140) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0361Ensure CIFSforfile/printer' (TCP,445) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0365Ensure Amazon Simple Queue Service (SQS) is not exposed to publicAWSIdentity and Access Management
HIGH
AC_AWS_0366Ensure Server Side Encryption (SSE) is enabled Amazon Simple Queue Service (SQS) queueAWSSecurity Best Practices
HIGH
AC_AZURE_0158Ensure network policy is configured for Azure Kubernetes ClusterAzureInfrastructure Security
MEDIUM
AC_AZURE_0189Ensure Web Application Firewall(WAF) is enabled for Azure Application GatewayAzureInfrastructure Security
MEDIUM
AC_AZURE_0282Ensure Owner roles are not assigned to any principal using Azure Role AssignmentAzureIdentity and Access Management
HIGH
AC_AZURE_0355Ensure DDoS protection standard is enabled for Azure Virtual NetworkAzureInfrastructure Security
MEDIUM
AC_AZURE_0392Ensure firewall rules reject internet access for Azure Redis CacheAzureInfrastructure Security
HIGH
AC_AZURE_0404Ensure public access is disabled for Azure PostgreSQL ServerAzureInfrastructure Security
MEDIUM
AC_AZURE_0425Ensure VNC Listener (TCP:5500) is not exposed to more than 32 private hosts for Azure Network Security RuleAzureInfrastructure Security
LOW
AC_AZURE_0430Ensure Telnet (TCP:23) is not exposed to entire internet for Azure Network Security RuleAzureInfrastructure Security
HIGH