Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_GCP_0367Ensure API Keys Are Rotated Every 90 DaysGCPSecurity Best Practices
MEDIUM
AC_GCP_0366Ensure API Keys Are Restricted to Only APIs That Application Needs AccessGCPSecurity Best Practices
MEDIUM
AC_GCP_0337Ensure Cloud Asset Inventory Is EnabledGCPLogging and Monitoring
MEDIUM
AC_GCP_0347Ensure That 'cloudsql.enable_pgaudit' Database Flag for each Cloud Sql Postgresql Instance Is Set to 'on' For Centralized LoggingGCPCompliance Validation
LOW
AC_GCP_0300Ensure that the 'Log_min_messages' Flag for a Cloud SQL PostgreSQL Instance is set at minimum to 'Warning'GCPCompliance Validation
LOW
AC_GCP_0315Ensure 'Log_hostname' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'on'GCPCompliance Validation
LOW
AC_GCP_0259Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is set to 'off'GCPCompliance Validation
LOW
AC_GCP_0330Ensure Essential Contacts is Configured for OrganizationGCPLogging and Monitoring
LOW
AC_GCP_0005Ensure That Service Account Has No Admin Privileges - google_project_iam_memberGCPIdentity and Access Management
HIGH
AC_GCP_0307Ensure That the Log Metric Filter and Alerts Exist for Cloud Storage IAM Permission ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0311Ensure That the Log Metric Filter and Alerts Exist for SQL Instance Configuration ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0277Ensure That RSASHA1 Is Not Used for the Zone-Signing Key in Cloud DNS DNSSECGCPInfrastructure Security
MEDIUM
AC_GCP_0308Ensure That the Log Metric Filter and Alerts Exist for Custom Role ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0032Ensure Legacy Networks Do Not Exist for Older ProjectsGCPInfrastructure Security
LOW
AC_GCP_0037Ensure 'Enable Connecting to Serial Ports' Is Not Enabled for VM InstanceGCPInfrastructure Security
MEDIUM
AC_GCP_0261Ensure 'remote access' database flag for Cloud SQL SQL Server instance is set to 'off'GCPCompliance Validation
LOW
AC_GCP_0305Ensure Log Metric Filter and Alerts Exist for Project Ownership Assignments/ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0014Ensure That DNSSEC Is Enabled for Cloud DNSGCPInfrastructure Security
MEDIUM
AC_GCP_0262Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configuredGCPCompliance Validation
LOW
AC_GCP_0263Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative PrivilegesGCPCompliance Validation
LOW
AC_GCP_0273Ensure That RSASHA1 Is Not Used for the Key-Signing Key in Cloud DNS DNSSECGCPInfrastructure Security
MEDIUM
AC_GCP_0279Ensure That the Log Metric Filter and Alerts Exist for VPC Network ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0306Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0309Ensure That the Log Metric Filter and Alerts Exist for VPC Network Firewall Rule ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0310Ensure That the Log Metric Filter and Alerts Exist for VPC Network Route ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0003Ensure That Cloud SQL Database Instances Do Not Implicitly Whitelist All Public IP AddressesGCPInfrastructure Security
HIGH
AC_GCP_0250Ensure That the 'Local_infile' Database Flag for a Cloud SQL MySQL Instance Is Set to 'Off'GCPCompliance Validation
LOW
AC_GCP_0264Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting ValueGCPCompliance Validation
LOW
AC_GCP_0291Ensure oslogin is enabled for a Project - google_compute_project_metadataGCPSecurity Best Practices
LOW
AC_GCP_0001Ensure That Cloud SQL Database Instances Are Configured With Automated BackupsGCPResilience
MEDIUM
AC_GCP_0301Ensure That Instances Are Not Configured To Use the Default Service Account With Full Access to All Cloud APIsGCPIdentity and Access Management
HIGH
AC_GCP_0007Ensure That IAM Users Are Not Assigned the Service Account User or Service Account Token Creator Roles at Project Level - google_project_iam_bindingGCPIdentity and Access Management
HIGH
AC_GCP_0009Ensure That Cloud Audit Logging Is Configured ProperlyGCPLogging and Monitoring
LOW
AC_GCP_0316Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off'GCPCompliance Validation
LOW
AC_GCP_0268Ensure User-Managed/External Keys for Service Accounts Are Rotated Every 90 Days or FewerGCPIdentity and Access Management
LOW
AC_GCP_0039Ensure "Block Project-Wide SSH Keys" Is Enabled for VM InstancesGCPInfrastructure Security
LOW
AC_GCP_0225Ensure 'Skip_show_database' Database Flag for Cloud SQL MySQL Instance Is Set to 'On'GCPCompliance Validation
LOW
AC_GCP_0238Ensure That Cloud Storage Bucket Is Not Anonymously or Publicly Accessible - google_storage_bucket_iam_memberGCPIdentity and Access Management
HIGH
AC_GCP_0257Ensure That the 'Log_min_duration_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set to '-1' (Disabled)GCPCompliance Validation
LOW
AC_GCP_0239Ensure That Service Account Has No Admin Privileges - google_storage_bucket_iam_memberGCPIdentity and Access Management
HIGH
AC_GCP_0253Ensure That the 'Log_disconnections' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'On'GCPCompliance Validation
LOW
AC_GCP_0313Ensure That Cloud KMS Cryptokeys Are Not Anonymously or Publicly AccessibleGCPData Protection
MEDIUM
AC_GCP_0002Ensure That the Cloud SQL Database Instance Requires All Incoming Connections To Use SSLGCPInfrastructure Security
HIGH
AC_GCP_0232Ensure That IP Forwarding Is Not Enabled on InstancesGCPInfrastructure Security
MEDIUM
AC_GCP_0004Ensure That There Are Only GCP-Managed Service Account Keys for Each Service AccountGCPIdentity and Access Management
LOW
AC_GCP_0033Ensure that VPC Flow Logs is Enabled for Every Subnet in a VPC NetworkGCPLogging and Monitoring
MEDIUM
AC_GCP_0099Ensure 'Log_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set AppropriatelyGCPCompliance Validation
LOW
AC_GCP_0299Ensure 'Log_min_error_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'Error' or StricterGCPCompliance Validation
LOW
AC_GCP_0013Ensure '3625 (trace flag)' database flag for all Cloud SQL Server instances is set to 'on'GCPCompliance Validation
LOW
AC_GCP_0011Ensure KMS Encryption Keys Are Rotated Within a Period of 90 DaysGCPSecurity Best Practices
LOW