Skip to main content

⚪ Impossible policy

  • ID: /flags/impossible-policy

Policies (113)

PolicyLogic CountFlags
🛡️ [LEGACY] Azure Virtual Machine VHDs are not encrypted🟢⚪🟢 x2, ⚪ x1
🛡️ AWS Account Alternate Contact Information is not current🔴🟢⚪🔴 x1, 🟢 x2, ⚪ x1
🛡️ AWS Account Primary Contact Information is not current🔴🟢⚪🔴 x1, 🟢 x2, ⚪ x1
🛡️ AWS Account Root User Hardware MFA is not enabled.🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail AWS Organizations Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Config Configuration Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Configuration Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Disable CMK or Schedule CMK Deletion Events Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail IAM Policy Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Management Console Authentication Failures Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Management Console Sign-In without MFA Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Network Access Control Lists Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Network Gateways Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Root Account Usage Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Route Table Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail S3 Bucket Policy Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Security Group Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail Unauthorized API Calls Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS CloudTrail VPC Changes Monitoring is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ AWS IAM User is not managed centrally in multi-account environments🟢⚪🟢 x2, ⚪ x1
🛡️ AWS IAM User with console and programmatic access set during the initial creation🟢⚪🟢 x2, ⚪ x1
🛡️ AWS S3 Bucket sensitive data is not discovered, classified, and secured🟢⚪🟢 x2, ⚪ x1
🛡️ AWS VPC Route Table for VPC Peering does not follow the least privilege principle🟢⚪🟢 x2, ⚪ x1
🛡️ Azure App Service Basic Authentication is enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Azure App Service does not run the latest Java version🟢⚪🟢 x2, ⚪ x1
🛡️ Azure App Service does not run the latest PHP version🟢⚪🟢 x2, ⚪ x1
🛡️ Azure App Service does not run the latest Python version🟢⚪🟢 x2, ⚪ x1
🛡️ Azure App Service does not use Azure Key Vaults to store secrets🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Cosmos DB Entra ID Client Authentication is not used🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Databricks Diagnostic Log Delivery is not configured🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Databricks network security groups are not configured🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Databricks Personal Access Tokens (PATs) are not restricted and expirable🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Databricks users and groups are not synced from Microsoft Entra ID🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Databricks Unity Catalog is not configured🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Databricks Workspace traffic is not encrypted between cluster worker nodes🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Diagnostic Setting exists for Subscription Activity Logs🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Diagnostic Setting for Azure AppService HTTP logs is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Diagnostic Setting for Azure Key Vault is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Diagnostic Setting is not enabled for all services that support it🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Key Vault Managed HSM is not used whenever required🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Privileged Role Assignments are not periodically reviewed🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Public IP Addresses are not evaluated periodically🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Resource Lock is not enabled for mission-critical resources🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Storage Account Access Key Rotation Reminders are not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Storage Account Access Keys are not regenerated periodically🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Storage Account Shared Access Signature Tokens do not expire within 1 hour🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Storage Account uses Delete lock🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Storage Account uses ReadOnly lock🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Storage Account With Critical Data is not encrypted with customer managed key🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Subscription Leaving Microsoft Entra ID Directory and Subscription Entering Microsoft Entra ID Directory is not set to Permit No One🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Subscription Microsoft Defender For IoT Hub is not set to On🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Subscription Resource Lock Administrator Custom Role does not exist🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Subscription Resources Basic SKU is used for production workloads🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Subscription Security Alert Notifications for attack path with Critical severity are not configured🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Subscription Vulnerability Assessment is not auto provisioned🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Virtual Machine Endpoint Protection is not installed🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Virtual Machine Unapproved Extensions are installed🟢⚪🟢 x2, ⚪ x1
🛡️ Azure Virtual Network Flow Logs are not captured and sent to Log Analytics Workspace🟢⚪🟢 x2, ⚪ x1
🛡️ Consumer Google Accounts are used🟢⚪🟢 x2, ⚪ x1
🛡️ Google Accounts are not configured with MFA🟢⚪🟢 x2, ⚪ x1
🛡️ Google App Engine Application HTTPS Connection is not enforced🟢⚪🟢 x2, ⚪ x1
🛡️ Google API Key is not restricted for unspecified hosts and apps🟢⚪🟢 x2, ⚪ x1
🛡️ Google BigQuery Sensitive Data Protection is not in use🟢⚪🟢 x2, ⚪ x1
🛡️ Google Cloud Access Transparency is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Google Cloud Function Environment Variables store confidential data🟢⚪🟢 x2, ⚪ x1
🛡️ Google Cloud MySQL Instance allows anyone to connect with administrative privileges🟢⚪🟢 x2, ⚪ x1
🛡️ Google GCE Instance doesn't have the latest operating system updates installed🟢⚪🟢 x2, ⚪ x1
🛡️ Google HTTPS or SSL Proxy Load Balancer permits SSL policies with weak cipher suites🟢⚪🟢 x2, ⚪ x1
🛡️ Google Identity Aware Proxy (IAP) is not used to enforce access controls🟢⚪🟢 x2, ⚪ x1
🛡️ Google KMS Crypto Key is anonymously or publicly accessible🟠🟢⚪🟠 x1, 🟢 x2, ⚪ x1
🛡️ Google Organization Administrator Security Key Enforcement is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Intune logs are not captured and sent to Log Analytics🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Cloud Security Benchmark policies are disabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Defender Agentless Container Vulnerability Assessment Component is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Defender Agentless Discovery for Kubernetes Component is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Defender Agentless Scanning for Machines Component is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Defender External Attack Surface Monitoring (EASM) is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Defender File Integrity Monitoring Component is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Defender Recommendations for Apply System Updates are not completed🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Account Lockout Duration is not set 60 seconds or more🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Account Lockout Threshold is not set to 10 or less🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Admin accounts are not used for daily operations🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Allow Users To Remember MFA On Devices They Trust is enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Conditional Access By Location is not defined🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Custom Banned Password List is not enforced🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Device Code Authentication Flow is not restricted🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Diagnostic Setting does not capture Microsoft Entra activity logs🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Diagnostic Setting does not capture Microsoft Graph activity logs🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Global Administrator Role assigned to more than 4 users🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Guest Users are not reviewed on a regular basis🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID MFA For Administrators is not required🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID MFA For All Users is not required🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID MFA For Risky Sign-Ins is not required🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID MFA For Windows Azure Service Management API is not required🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID MFA to access Microsoft Admin Portals is not required🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Named Locations are not defined🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Owners Can Manage Group Membership Requests In The Access Panel is set to Yes🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Remember MFA devices setting is disabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Require MFA To Register Or Join Devices With Microsoft Entra ID is set to No🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Restrict User Ability To Access Groups Features In The Access Pane is set to No🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Security Defaults are not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID User Consent For Applications is not set to Allow From Verified Publishers🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID User Consent For Applications is not set to Do Not Allow User Consent🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID User Multi-Factor Auth Status is not enabled🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID User Notify All Admins When Other Admins Reset Their Password is set No🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID User Notify Users On Password Resets is set to No🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID User Reconfirm Authentication Information is set to 0🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID User Self-Service Password Reset does not require 2 authentication methods🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID User Settings Restrict Access To Microsoft Entra Admin Center is set to No🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Users Can Create Microsoft 365 Groups In Azure Portals, API Or PowerShell is set to Yes🟢⚪🟢 x2, ⚪ x1
🛡️ Microsoft Entra ID Users Can Create Security Groups In Azure Portals, API Or PowerShell is set to Yes🟢⚪🟢 x2, ⚪ x1
🛡️ Network Security Group Flow Logs are not captured and sent to Log Analytics Workspace🟢⚪🟢 x2, ⚪ x1
🛡️ Privileged Azure Virtual Machine is accessed by identities without MFA🟢⚪🟢 x2, ⚪ x1