Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_AZURE_0584Ensure FTP deployments are Disabled - azurerm_windows_web_appAzureInfrastructure Security
MEDIUM
AC_AWS_0069Ensure Multi-AZ is enabled for AWS Database Migration Service (DMS) instancesAWSCompliance Validation
MEDIUM
AC_AWS_0106Ensure public access is disabled for AWS ElasticSearch Domains - aws_elasticsearch_domainAWSIdentity and Access Management
HIGH
AC_AWS_0113Ensure Amazon cognito authentication is enabled for AWS ElasticSearch DomainAWSIdentity and Access Management
MEDIUM
AC_AWS_0119Ensure permissions are tightly controlled for AWS ElasticSearch DomainsAWSIdentity and Access Management
HIGH
AC_AZURE_0195Ensure that custom domains are configured in Azure App ServiceAzureSecurity Best Practices
LOW
AC_AZURE_0226Ensure public access is disabled for Azure Healthcare ServiceAzureInfrastructure Security
MEDIUM
AC_AZURE_0229Ensure internal load balancing is enabled for Azure App Service EnvironmentAzureResilience
MEDIUM
AC_AZURE_0244Ensure remote debugging is turned off for Azure App ServiceAzureInfrastructure Security
HIGH
AC_AZURE_0246Ensure that 'Java version' is the latest, if used to run the Web AppAzureConfiguration and Vulnerability Analysis
MEDIUM
AC_AZURE_0249Ensure that '.Net Framework' version is the latest in Azure App ServiceAzureConfiguration and Vulnerability Analysis
MEDIUM
AC_AZURE_0295Ensure that logging for detailed error messages is enabled for Azure App ServiceAzureLogging and Monitoring
LOW
AC_AZURE_0420Ensure only whitelisted IPs can use Azure Search ServiceAzureInfrastructure Security
MEDIUM
AC_AZURE_0088Ensure App Service Authentication is set up for apps in Azure App ServiceAzureIdentity and Access Management
MEDIUM
AC_AZURE_0570Ensure that 'HTTP Version' is the Latest, if Used to Run the Web App - azurerm_linux_web_appAzureInfrastructure Security
MEDIUM
AC_AZURE_0581Ensure App Service Authentication is set up for apps in Azure App Service - azurerm_linux_web_appAzureIdentity and Access Management
MEDIUM
AC_AZURE_0208Ensure that Active Azure Service Fabric clusters are automatically upgraded to latest versionAzureInfrastructure Security
MEDIUM
AC_AZURE_0209Ensure that Active Azure Service Fabric clusters are not using CVE-2022-30137 vulnerable cluster version(8.2.1124.1)AzureInfrastructure Security
MEDIUM
AC_AZURE_0306Ensures that Active Directory is used for authentication for Azure Service Fabric ClusterAzureInfrastructure Security
MEDIUM
AC_AWS_0093Ensure potential AWS_ACCESS_KEY_ID information is not disclosed in container definition for AWS ECS serviceAWSData Protection
HIGH
AC_AWS_0094Ensure potential CLIENT_ID information is not disclosed in container definition for AWS ECS serviceAWSData Protection
HIGH
AC_AWS_0159Ensure customer master key (CMK) is not disabled for AWS Key Management Service (KMS)AWSResilience
HIGH
AC_AWS_0162Ensure that access policy is updated for AWS Key Management Service (KMS) keyAWSIdentity and Access Management
HIGH
AC_AWS_0192Ensure database instances with an AWS Aurora cluster should have same accessibilityAWSCompliance Validation
MEDIUM
AC_AWS_0194Ensure latest generation of instance classes is used by Amazon Relational Database Service (Amazon RDS) instancesAWSCompliance Validation
MEDIUM
AC_AWS_0385Ensure public access is disabled for Amazon Simple Notification Service (SNS)AWSIdentity and Access Management
HIGH
AC_AWS_0491Ensure CloudTrail created sns policy have a condition key with either aws:SourceArn or aws:SourceAccount condition key used in Amazon Simple Notification Service (SNS) TopicAWSIdentity and Access Management
LOW
AC_AZURE_0160Ensure that private cluster is enabled for Azure Kubernetes ClusterAzureInfrastructure Security
MEDIUM
AC_AZURE_0187Ensure user id's are all system managed for Azure Container GroupAzureIdentity and Access Management
LOW
AC_AZURE_0223Ensure that auto-scaling is enabled for Azure Kubernetes ClusterAzureResilience
MEDIUM
AC_AWS_0095Ensure potential PASSWORD information is not disclosed in container definition for AWS ECS serviceAWSData Protection
HIGH
AC_AWS_0160Ensure rotation for customer created CMKs is enabledAWSData Protection
HIGH
AC_AWS_0399Ensure public IP address is not assigned to Amazon Elastic Container Service (ECS)AWSInfrastructure Security
HIGH
AC_AWS_0458Ensure principal is defined for every IAM policy attached to AWS Key Management Service (KMS) keyAWSIdentity and Access Management
HIGH
AC_AWS_0479Ensure there is no policy with invalid principal format for AWS Key Management Service (KMS)AWSIdentity and Access Management
LOW
AC_AWS_0602Ensure rotation for customer created symmetric CMKs is enabledAWSData Protection
HIGH
AC_AZURE_0159Ensure Azure Active Directory (Azure AD) has been enabled in Azure Kubernetes ClusterAzureCompliance Validation
MEDIUM
AC_AZURE_0290Ensure that Azure policies add-on are used for Azure Kubernetes ClusterAzureSecurity Best Practices
MEDIUM
AC_AZURE_0291Ensure that logging to Azure Monitoring is configured for Azure Kubernetes ClusterAzureLogging and Monitoring
MEDIUM
AC_AWS_0100Ensure control plane logging is enabled for all log types for AWS Elastic Kubernetes Service (EKS) clustersAWSLogging and Monitoring
MEDIUM
AC_AWS_0189Ensure Aurora Serverless AutoPause is enabled for Amazon Relational Database Service (Amazon RDS) clustersAWSCompliance Validation
MEDIUM
AC_AWS_0365Ensure Amazon Simple Queue Service (SQS) is not exposed to publicAWSIdentity and Access Management
HIGH
AC_AWS_0366Ensure Server Side Encryption (SSE) is enabled Amazon Simple Queue Service (SQS) queueAWSSecurity Best Practices
HIGH
AC_AWS_0464Ensure database retention is enabled for Amazon Relational Database Service (Amazon RDS) clusterAWSResilience
MEDIUM
AC_AWS_0551Ensure there is no policy with wildcards (*) used in principal for Amazon Simple Queue Service (SQS) QueueAWSIdentity and Access Management
LOW
AC_AWS_0603Ensure that public access is not given to Amazon Relational Database Service (Amazon RDS) InstanceAWSCompliance Validation
MEDIUM
AC_AZURE_0156Enable role-based access control (RBAC) within Azure Kubernetes ServicesAzureIdentity and Access Management
MEDIUM
AC_AZURE_0158Ensure network policy is configured for Azure Kubernetes ClusterAzureInfrastructure Security
MEDIUM
AC_AZURE_0215Ensure labels are configured to keep track of organization resources for Azure Kubernetes ClusterAzureCompliance Validation
LOW
AC_AZURE_0289Ensure HTTP application routing has been disabled for Azure Kubernetes ClusterAzureInfrastructure Security
HIGH