Skip to main content

πŸ’Ό Secure Access

  • Contextual name: πŸ’Ό Secure Access
  • ID: /frameworks/cloudaware/resource-security/secure-access
  • Located in: πŸ’Ό Resource Security

Description​

Policies for identifying resources that do not follow data access best practices for private access.

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (43)​

PolicyLogic CountFlags
πŸ“ AWS Account IAM Access Analyzer is not enabled for all regions 🟒1🟒 x6
πŸ“ AWS API Gateway API Route Authorization Type is not configured 🟒1🟒 x6
πŸ“ AWS EC2 Default Security Group does not restrict all traffic 🟒1🟒 x6
πŸ“ AWS EC2 Instance IAM role is not attached 🟒1🟒 x6
πŸ“ AWS EC2 Instance IMDSv2 is not enabled 🟒1🟒 x6
πŸ“ AWS RDS Aurora Cluster access is not consistent 🟒1🟒 x6
πŸ“ AWS VPC Route Table for VPC Peering does not follow the least privilege principle 🟒🟒 x3
πŸ“ Azure App Service Authentication is disabled and Basic Authentication is enabled 🟒1🟒 x6
πŸ“ Azure App Service Basic Authentication is enabled 🟒🟒 x3
πŸ“ Azure App Service is not registered with Microsoft Entra ID 🟒1🟒 x6
πŸ“ Azure Cosmos DB Account Private Endpoints are not used 🟒1🟒 x6
πŸ“ Azure Cosmos DB Entra ID Client Authentication is not used 🟒🟒 x3
πŸ“ Azure Key Vault Private Endpoints are not used 🟒1🟒 x6
πŸ“ Azure Key Vault Role Based Access Control is not enabled 🟒1🟒 x6
πŸ“ Azure Managed Disk Data Access Auth Mode is not set to Azure Active Directory 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services 🟒1🟒 x6
πŸ“ Azure SQL Server Microsoft Entra authentication is not configured 🟒1🟒 x6
πŸ“ Azure Storage Account Access Key Rotation Reminders are not enabled 🟒🟒 x3
πŸ“ Azure Storage Account Access Keys are not regenerated periodically 🟒🟒 x3
πŸ“ Azure Storage Account Private Endpoints are not used 🟒1🟒 x6
πŸ“ Azure Storage Account Shared Access Signature Tokens do not expire within 1 hour 🟒🟒 x3
πŸ“ Azure Storage Account Trusted Azure Services are not enabled as networking exceptions 🟒1🟒 x6
πŸ“ Azure Subscription Bastion Host does not exist 🟒1🟠 x1, 🟒 x5
πŸ“ Google Access Approval is not enabled 🟒1🟒 x6
πŸ“ Google Cloud Function Environment Variables store confidential data 🟒🟒 x3
πŸ“ Google Cloud MySQL Instance allows anyone to connect with administrative privileges 🟒🟒 x3
πŸ“ Google Cloud MySQL Instance Skip_show_database Database Flag is not set to on 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance SSL Connections are not enforced 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance contained database authentication Database Flag is set to on 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance remote access Database Flag is not set to off 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance user options Database Flag is configured 🟒1🟒 x6
πŸ“ Google Dataproc Cluster is not encrypted using Customer-Managed Encryption Key 🟒1🟒 x6
πŸ“ Google GCE Instance Block Project-Wide SSH Keys is not enabled 🟒1🟒 x6
πŸ“ Google GCE Instance Enable Connecting to Serial Ports is not disabled 🟒1🟒 x6
πŸ“ Google GCE Instance is configured to use the Default Service Account 🟒1🟒 x6
πŸ“ Google GCE Instance is configured to use the Default Service Account with full access to all Cloud APIs 🟒1🟒 x6
πŸ“ Google GCE Instance IP Forwarding is not disabled. 🟒1🟒 x6
πŸ“ Google GCE Instance OS Login is not enabled 🟒1🟒 x6
πŸ“ Google GCE Network has Firewall Rules which allow unrestricted RDP access from the Internet 🟒1🟒 x6
πŸ“ Google GCE Network has Firewall Rules which allow unrestricted SSH access from the Internet 🟒1🟒 x6
πŸ“ Google Identity Aware Proxy (IAP) is not used to enforce access controls 🟒🟒 x3
πŸ“ Google Project has a default network 🟒1🟒 x6
πŸ“ Google Storage Bucket Uniform Bucket-Level Access is not enabled 🟒1🟒 x6