| 🛡️ AWS Account IAM Access Analyzer is not enabled for all regions🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Account Object-level CloudTrail Logging for Read Events for S3 Buckets is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Account Object-level CloudTrail Logging for Write Events for S3 Buckets is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Account Root User has active access keys🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS API Gateway API Route Authorization Type is not configured🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudFront Web Distribution Cache Behaviors allow unencrypted traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudFront Web Distribution does not encrypt traffic to Custom Origins🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudFront Web Distribution Default Root Object is not configured🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudTrail Log File Validation is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS DMS Replication Instance is publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EBS Snapshot is publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Auto Scaling Group behind ELB assigns public IP to instances🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Auto Scaling Group Launch Template is not configured to require IMDSv2🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Instance IAM role is not attached🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Instance IMDSv2 is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Instance with an auto-assigned public IP address is in a default subnet🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted DNS traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted FTP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted ICMP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted NetBIOS traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted RPC traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted SMTP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted traffic to MSSQL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted traffic to MySQL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted traffic to PostgreSQL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM Policy allows full administrative privileges🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User has inline or directly attached policies🟢 | 1 | 🟠 x1, 🟢 x5 | no data |
| 🛡️ AWS IAM User with credentials unused for 45 days or more is not disabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Instance is publicly accessible and in an unrestricted public subnet🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Snapshot is publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS S3 Bucket is not configured to block public access🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS S3 Bucket Object Lock is not enabled🟠🟢 | 1 | 🟠 x1, 🟢 x6 | no data |
| 🛡️ AWS S3 Bucket Policy is not set to deny HTTP requests🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS VPC is not configured with a VPC Endpoint for Amazon EC2 service🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS VPC Subnet Map Public IP On Launch is enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure App Service FTP deployments are not disabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure App Service HTTPS Only configuration is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Cosmos DB Account Private Endpoints are not used🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Cosmos DB Account Virtual Network Filter is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Cosmos DB Entra ID Client Authentication is not used🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Azure Diagnostic Setting Logs export to Storage Account not encrypted with Customer-managed key🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Network Security Group allows public access to RDP port🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Network Security Group allows public access to SSH port🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure SQL Database Transparent Data Encryption is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure SQL Server Microsoft Entra authentication is not configured🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Storage Account Allow Blob Anonymous Access is enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Storage Account Cross Tenant Replication is enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Storage Account Secure Transfer Required is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Storage Account Trusted Azure Services are not enabled as networking exceptions🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google BigQuery Dataset is anonymously or publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud MySQL Instance Skip_show_database Database Flag is not set to on🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud SQL Instance External Authorized Networks whitelists all public IP addresses🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud SQL Instance has public IP addresses🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud SQL Server Instance cross db ownership chaining Database Flag is not set to off🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Instance has a public IP address🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google KMS Crypto Key is anonymously or publicly accessible🟠🟢⚪ | | 🟠 x1, 🟢 x2, ⚪ x1 | no data |
| 🛡️ Google Logging Log Sink exports logs to a Storage Bucket without Bucket Lock🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Project with KMS keys has a principal with Owner role🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Storage Bucket is anonymously or publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Storage Bucket Uniform Bucket-Level Access is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google User has both Service Account Admin and Service Account User roles assigned🟢 | 1 | 🟢 x6 | no data |