Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_AWS_0166Ensure at-rest data encryption is enabled for AWS ECS clustersAWSData Protection
LOW
AC_AWS_0167Ensure at-rest data encryption is enabled for AWS EBS Root Block clusterAWSData Protection
HIGH
AC_AWS_0169Ensure there are no URL references used in base64 encoded value of AWS Launch ConfigurationAWSData Protection
HIGH
AC_AWS_0006Ensure Amazon Machine Image (AMI) is not shared among multiple accountsAWSInfrastructure Security
MEDIUM
AC_AWS_0168Ensure there are no hard coded keys used in base64 encoded value of AWS Launch ConfigurationAWSData Protection
HIGH
AC_AWS_0392Ensure public IP address is not used AWS EC2 instancesAWSInfrastructure Security
HIGH
AC_AWS_0153Ensure virtual private cloud (VPC) is configured for AWS EC2 instancesAWSInfrastructure Security
MEDIUM
AC_AWS_0154Ensure IMDSv1 is disabled for AWS EC2 instancesAWSInfrastructure Security
HIGH
AC_AWS_0170Ensure there are no hard coded scripts used in base64 encoded value of AWS Launch ConfigurationAWSData Protection
HIGH
AC_AWS_0430Ensure there are no unnamed AWS EC2 instancesAWSCompliance Validation
LOW
AC_AWS_0456Ensure IMDSv1 is disabled for AWS EC2 instances in AWS Launch ConfigurationAWSInfrastructure Security
HIGH
AC_AWS_0005Ensure encryption is enabled for Amazon Machine Image (AMI)AWSInfrastructure Security
MEDIUM
AC_AWS_0397Ensure multiple ENI are not attached to a single AWS InstanceAWSSecurity Best Practices
LOW
AC_AWS_0455Ensure monitoring is enabled for AWS Launch ConfigurationAWSLogging and Monitoring
HIGH
AC_AWS_0459Ensure detailed monitoring is enabled for AWS EC2 instancesAWSCompliance Validation
LOW
AC_AWS_0555Ensure IAM instance roles are used for AWS resource access from instancesAWSIdentity and Access Management
MEDIUM