| 🛡️ AWS EKS Cluster has node IAM role with AmazonEKS_CNI_Policy attached🔴🟢 | 1 | 🔴 x1, 🟢 x6 | no data |
| 🛡️ AWS EKS Cluster IAM OIDC provider is not created🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM Role unused🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Support Role is not created🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Privileged Role Assignments are not periodically reviewed🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Azure Subscription Custom Subscription Administrator Roles exist🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Subscription Resource Lock Administrator Custom Role does not exist🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Azure User Access Administrator Role has assignments🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google IAM Roles related to KMS are not assigned to separate users🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google IAM Service Account has admin privileges🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Resource Manager Organization has a Redis IAM role assigned🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google User has both Service Account Admin and Service Account User roles assigned🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Microsoft Entra ID Global Administrator Role assigned to more than 4 users🟢⚪ | | 🟢 x2, ⚪ x1 | no data |