Tenable Cloud Security Policies

Search

IDNameCSPDomainSeverity
AC_AWS_0153Ensure virtual private cloud (VPC) is configured for AWS EC2 instancesAWSInfrastructure Security
MEDIUM
AC_AWS_0154Ensure IMDSv1 is disabled for AWS EC2 instancesAWSInfrastructure Security
HIGH
AC_AWS_0155Ensure at-rest server side encryption (SSE) is enabled for data stored in AWS Kinesis ServerAWSData Protection
HIGH
AC_AWS_0156Ensure cross-zone load balancing is enabled for AWS LB (Load Balancer)AWSResilience
MEDIUM
AC_AWS_0157Ensure KMS customer managed keys are used for encryption in AWS Kinesis StreamsAWSData Protection
HIGH
AC_AWS_0158Ensure sufficient data retention period is set for AWS Kinesis StreamsAWSResilience
MEDIUM
AC_AWS_0159Ensure customer master key (CMK) is not disabled for AWS Key Management Service (KMS)AWSResilience
HIGH
AC_AWS_0160Ensure rotation for customer created CMKs is enabledAWSData Protection
HIGH
AC_AWS_0161Ensure deletion window for Customer Managed Keys (CMK) is enabled for AWS Key Management Service (KMS)AWSSecurity Best Practices
HIGH
AC_AWS_0162Ensure that access policy is updated for AWS Key Management Service (KMS) keyAWSIdentity and Access Management
HIGH
AC_AWS_0163Ensure tracing is enabled for AWS Lambda FunctionsAWSLogging and Monitoring
LOW
AC_AWS_0164Ensure VPC access is enabled for AWS Lambda FunctionsAWSInfrastructure Security
MEDIUM
AC_AWS_0165Ensure environment variables do not use AWS secret keys, access keys, or access tokens for AWS Lambda FunctionsAWSIdentity and Access Management
HIGH
AC_AWS_0166Ensure at-rest data encryption is enabled for AWS ECS clustersAWSData Protection
LOW
AC_AWS_0167Ensure at-rest data encryption is enabled for AWS EBS Root Block clusterAWSData Protection
HIGH
AC_AWS_0168Ensure there are no hard coded keys used in base64 encoded value of AWS Launch ConfigurationAWSData Protection
HIGH
AC_AWS_0169Ensure there are no URL references used in base64 encoded value of AWS Launch ConfigurationAWSData Protection
HIGH
AC_AWS_0170Ensure there are no hard coded scripts used in base64 encoded value of AWS Launch ConfigurationAWSData Protection
HIGH
AC_AWS_0171Ensure weak ciphers are removed for AWS Elastic Load Balancers (ELB)AWSInfrastructure Security
HIGH
AC_AWS_0172Ensure recommended SSL/TLS protocol version is used for AWS Elastic Load Balancers (ELB)AWSInfrastructure Security
HIGH
AC_AWS_0173Ensure a default root object is configured for AWS Cloudfront DistributionAWSInfrastructure Security
MEDIUM
AC_AWS_0174Ensure log exports is enabled for AWS MQ BrokersAWSLogging and Monitoring
LOW
AC_AWS_0175Ensure public access is disabled for AWS MQ BrokersAWSSecurity Best Practices
MEDIUM
AC_AWS_0176Ensure active/standby deployment mode is used for AWS MQ BrokersAWSResilience
MEDIUM
AC_AWS_0177Ensure latest engine version is used for AWS MQ BrokersAWSSecurity Best Practices
MEDIUM
AC_AWS_0178Ensure customer owned KMS key is used for encrypting AWS MQ BrokersAWSData Protection
HIGH
AC_AWS_0179Ensure auto minor version upgrade is enabled for AWS MQ BrokersAWSSecurity Best Practices
MEDIUM
AC_AWS_0180Ensure inter-cluster encryption is enabled for AWS MSK clusterAWSData Protection
HIGH
AC_AWS_0181Ensure that TLS-Only communication should be allowed between AWS MSK client and brokerAWSInfrastructure Security
HIGH
AC_AWS_0182Ensure storage encryption is enabled for AWS Neptune clusterAWSData Protection
HIGH
AC_AWS_0183Ensure IAM database authentication has been enabled for AWS Neptune clusterAWSIdentity and Access Management
MEDIUM
AC_AWS_0184Ensure deletion protection is enabled for AWS QLDB LedgerAWSResilience
MEDIUM
AC_AWS_0185Ensure external principals are allowed for AWS RAM resourcesAWSData Protection
MEDIUM
AC_AWS_0186Ensure that encryption is enabled for Amazon Relational Database Service (Amazon RDS) InstancesAWSData Protection
HIGH
AC_AWS_0187Ensure copy tags to snapshots feature is enabled for Amazon Relational Database Service (Amazon RDS) clustersAWSCompliance Validation
LOW
AC_AWS_0188Ensure deletion protection is enabled for Amazon Relational Database Service (Amazon RDS) clustersAWSData Protection
MEDIUM
AC_AWS_0189Ensure Aurora Serverless AutoPause is enabled for Amazon Relational Database Service (Amazon RDS) clustersAWSCompliance Validation
MEDIUM
AC_AWS_0190Ensure backtracking is enabled for Amazon Relational Database Service (Amazon RDS) clusterAWSCompliance Validation
MEDIUM
AC_AWS_0191Ensure default ports are not used by Amazon Relational Database Service (Amazon RDS) instancesAWSInfrastructure Security
MEDIUM
AC_AWS_0192Ensure database instances with an AWS Aurora cluster should have same accessibilityAWSCompliance Validation
MEDIUM
AC_AWS_0193Ensure Auto Minor Version Upgrade feature is Enabled for Amazon Relational Database Service (Amazon RDS) InstancesAWSCompliance Validation
MEDIUM
AC_AWS_0194Ensure latest generation of instance classes is used by Amazon Relational Database Service (Amazon RDS) instancesAWSCompliance Validation
MEDIUM
AC_AWS_0195Ensure policy with iam:Passrole/* action and NotResource attributes is not usedAWSIdentity and Access Management
HIGH
AC_AWS_0196Ensure IAM Policy does not Allow with NotPrincipalAWSIdentity and Access Management
HIGH
AC_AWS_0197Ensure KMS customer managed key (CMK) for encryption of AWS Redshift clustersAWSSecurity Best Practices
HIGH
AC_AWS_0198Ensure encryption is enabled for AWS Redshift clustersAWSData Protection
MEDIUM
AC_AWS_0199Ensure public access is disabled for AWS Redshift ClustersAWSInfrastructure Security
HIGH
AC_AWS_0200Ensure audit logging feature is enabled for AWS Redshift clustersAWSLogging and Monitoring
LOW
AC_AWS_0201Ensure allow version upgrade is enabled for AWS Redshift ClustersAWSSecurity Best Practices
LOW
AC_AWS_0202Ensure AWS Redshift Cluster should not be using the default port (5439)AWSInfrastructure Security
MEDIUM