Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_AZURE_0545Ensure usage of names like 'Admin' are avoided for Azure SQL ServerAzureCompliance Validation
MEDIUM
AC_AZURE_0589Ensure 'log_duration' is set for Azure PostgreSQL ConfigurationAzureLogging and Monitoring
MEDIUM
AC_GCP_0003Ensure That Cloud SQL Database Instances Do Not Implicitly Whitelist All Public IP AddressesGCPInfrastructure Security
HIGH
AC_GCP_0133Ensure 'Log_error_verbosity' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'DEFAULT' or StricterGCPCompliance Validation
LOW
AC_GCP_0250Ensure That the 'Local_infile' Database Flag for a Cloud SQL MySQL Instance Is Set to 'Off'GCPCompliance Validation
LOW
AC_GCP_0264Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting ValueGCPCompliance Validation
LOW
AC_GCP_0300Ensure that the 'Log_min_messages' Flag for a Cloud SQL PostgreSQL Instance is set at minimum to 'Warning'GCPCompliance Validation
LOW
AC_GCP_0316Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off'GCPCompliance Validation
LOW
AC_GCP_0347Ensure That 'cloudsql.enable_pgaudit' Database Flag for each Cloud Sql Postgresql Instance Is Set to 'on' For Centralized LoggingGCPCompliance Validation
LOW
AC_AWS_0060Ensure that Multi-AZ is enabled for Amazon Relational Database Service (Amazon RDS) InstancesAWSCompliance Validation
MEDIUM
AC_AWS_0063Ensure delete protection is enabled for Amazon Relational Database Service (Amazon RDS) InstancesAWSResilience
MEDIUM
AC_AWS_0065Ensure Amazon Relational Database Service (Amazon RDS) instance is not open to more than 256 hostsAWSInfrastructure Security
HIGH
AC_AWS_0066Ensure Amazon Relational Database Service (Amazon RDS) instances do not have public interface definedAWSInfrastructure Security
HIGH
AC_AWS_0072Ensure backup retention period is set according to best practice for AWS DocumentDB clustersAWSData Protection
MEDIUM
AC_AWS_0073Ensure KMS customer managed keys are used for encryption of AWS DocumentDB ClustersAWSData Protection
MEDIUM
AC_AWS_0074Ensure log export is enabled for AWS DocumentDB clustersAWSLogging and Monitoring
MEDIUM
AC_AWS_0077Ensure read-write capacities are reserved for AWS DynamoDB tablesAWSCompliance Validation
MEDIUM
AC_AWS_0102Ensure redis version is compliant with AWS PCI-DSS requirements for AWS ElastiCache clustersAWSCompliance Validation
HIGH
AC_AWS_0103Ensure memcached elasticache engines are not in use in AWS PCI-DSS environments for AWS ElastiCache clustersAWSCompliance Validation
HIGH
AC_AWS_0182Ensure storage encryption is enabled for AWS Neptune clusterAWSData Protection
HIGH
AC_AWS_0189Ensure Aurora Serverless AutoPause is enabled for Amazon Relational Database Service (Amazon RDS) clustersAWSCompliance Validation
MEDIUM
AC_AWS_0383Ensure AWS Redshift database clusters are not using 'awsuser' (default master user name) for database accessAWSCompliance Validation
MEDIUM
AC_AWS_0443Ensure log exports has been enabled for AWS Neptune clusterAWSLogging and Monitoring
MEDIUM
AC_AWS_0464Ensure database retention is enabled for Amazon Relational Database Service (Amazon RDS) clusterAWSResilience
MEDIUM
AC_AWS_0603Ensure that public access is not given to Amazon Relational Database Service (Amazon RDS) InstanceAWSCompliance Validation
MEDIUM
AC_AZURE_0129Ensure 'email account admins' is enabled for Azure MySQL Database Threat Detection PolicyAzureLogging and Monitoring
MEDIUM
AC_AZURE_0207Ensure cross account access is disabled for Azure Redis CacheAzureIdentity and Access Management
MEDIUM
AC_AZURE_0258Ensure default connection policy is not in use for Azure SQL ServerAzureCompliance Validation
LOW
AC_AZURE_0260Ensure backup retention period is enabled for Azure PostgreSQL ServerAzureCompliance Validation
HIGH
AC_AZURE_0277Ensure tags are associated with Azure CosmosDB AccountAzureCompliance Validation
LOW
AC_AZURE_0375Ensure that 'Auditing' Retention is 'greater than 90 days'AzureCompliance Validation
LOW
AC_AZURE_0382Ensure SQL Server audit with selected event types is enabled and has retention period of minimum 365 days for Azure SQL DatabaseAzureLogging and Monitoring
MEDIUM
AC_AZURE_0392Ensure firewall rules reject internet access for Azure Redis CacheAzureInfrastructure Security
HIGH
AC_AZURE_0394Ensure only SSL connections are enabled for Azure Redis CacheAzureInfrastructure Security
MEDIUM
AC_AZURE_0398Ensure infrastructure encryption for Azure PostgreSQL Server is enabledAzureInfrastructure Security
MEDIUM
AC_AZURE_0399Ensure that Identity block is defined and type is set to SystemAssigned for Azure PostgreSQL ServerAzureIdentity and Access Management
LOW
AC_AZURE_0404Ensure public access is disabled for Azure PostgreSQL ServerAzureInfrastructure Security
MEDIUM
AC_AZURE_0406Ensure that Advanced Threat Protection (ATP) on a SQL Server is Set to 'Enabled'AzureInfrastructure Security
HIGH
AC_AZURE_0411Ensure 'log_duration' is set for Azure PostgreSQL ConfigurationAzureLogging and Monitoring
MEDIUM
AC_AZURE_0002Ensure notification email setting is enabled for Azure SQL Database Threat Detection PolicyAzureLogging and Monitoring
LOW
AC_AZURE_0131Ensure 'Enforce SSL connection' is set to 'Enabled' for Standard MySQL Database ServerAzureInfrastructure Security
HIGH
AC_AZURE_0397Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database ServerAzureInfrastructure Security
LOW
AC_AZURE_0408Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database ServerAzureInfrastructure Security
HIGH
AC_AZURE_0560Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All NetworksAzureConfiguration and Vulnerability Analysis
MEDIUM
AC_AZURE_0562Ensure no Azure SQL Databases allow ingress from 0.0.0.0/0 (ANY IP)AzureInfrastructure Security
HIGH
AC_AZURE_0567Ensure that Vulnerability Assessment (VA) setting 'Also send email notifications to admins and subscription owners' is set for each SQL ServerAzureIdentity and Access Management
MEDIUM
AC_GCP_0099Ensure 'Log_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set AppropriatelyGCPCompliance Validation
LOW
AC_GCP_0259Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is set to 'off'GCPCompliance Validation
LOW
AC_GCP_0262Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configuredGCPCompliance Validation
LOW
AC_GCP_0263Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative PrivilegesGCPCompliance Validation
LOW