📝 AWS Account IAM Access Analyzer is not enabled for all regions 🟢 | 1 | 🟢 x6 |
📝 AWS Account Root User credentials were used is the last 30 days 🟢 | 1 | 🟢 x6 |
📝 AWS Account Root User has active access keys 🟢 | 1 | 🟢 x6 |
📝 AWS DMS Replication Instance is publicly accessible 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted CIFS traffic 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted DNS traffic 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted FTP traffic 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted ICMP traffic 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted NetBIOS traffic 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted RPC traffic 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted SMTP traffic 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted traffic to MongoDB 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted traffic to MSSQL 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted traffic to MySQL 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS 🟢 | 1 | 🟢 x6 |
📝 AWS EC2 Security Group allows unrestricted traffic to PostgreSQL 🟢 | 1 | 🟢 x6 |
📝 AWS IAM Policy allows full administrative privileges 🟢 | 1 | 🟢 x6 |
📝 AWS IAM User has inline or directly attached policies 🟢 | 1 | 🟠 x1, 🟢 x5 |
📝 AWS RDS Instance is publicly accessible and in an unrestricted public subnet 🟢 | 1 | 🟢 x6 |
📝 AWS RDS Snapshot is publicly accessible 🟢 | 1 | 🟢 x6 |
📝 AWS S3 Bucket is not configured to block public access 🟢 | 1 | 🟢 x6 |
📝 Azure App Service Authentication is disabled and Basic Authentication is enabled 🟢 | 1 | 🟢 x6 |
📝 Azure App Service Basic Authentication is enabled 🟢 | | 🟢 x3 |
📝 Azure Cosmos DB Account Private Endpoints are not used 🟢 | 1 | 🟢 x6 |
📝 Azure Cosmos DB Account Virtual Network Filter is not enabled 🟢 | 1 | 🟢 x6 |
📝 Azure Cosmos DB Entra ID Client Authentication is not used 🟢 | | 🟢 x3 |
📝 Azure Network Security Group allows public access to HTTP(S) ports 🟢 | 1 | 🟢 x6 |
📝 Azure Network Security Group allows public access to RDP port 🟢 | 1 | 🟢 x6 |
📝 Azure Network Security Group allows public access to SSH port 🟢 | 1 | 🟢 x6 |
📝 Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services 🟢 | 1 | 🟢 x6 |
📝 Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP) 🟢 | 1 | 🟢 x6 |
📝 Azure Storage Account Allow Blob Anonymous Access is enabled 🟢 | 1 | 🟢 x6 |
📝 Azure Storage Account Trusted Azure Services are not enabled as networking exceptions 🟢 | 1 | 🟢 x6 |
📝 Consumer Google Accounts are used 🟢 | | 🟢 x3 |
📝 Google BigQuery Dataset is anonymously or publicly accessible 🟢 | 1 | 🟢 x6 |
📝 Google Cloud Audit Logging is not configured properly 🟢 | 1 | 🟢 x6 |
📝 Google Cloud MySQL Instance allows anyone to connect with administrative privileges 🟢 | | 🟢 x3 |
📝 Google Cloud MySQL Instance Skip_show_database Database Flag is not set to on 🟢 | 1 | 🟢 x6 |
📝 Google Cloud SQL Instance External Authorized Networks do not whitelist all public IP addresses 🟢 | 1 | 🟢 x6 |
📝 Google Cloud SQL Instance has public IP addresses 🟢 | 1 | 🟢 x6 |
📝 Google Cloud SQL Server Instance cross db ownership chaining Database Flag is not set to off 🟢 | 1 | 🟢 x6 |
📝 Google GCE Instance has a public IP address 🟢 | 1 | 🟢 x6 |
📝 Google GCE Instance is configured to use the Default Service Account with full access to all Cloud APIs 🟢 | 1 | 🟢 x6 |
📝 Google IAM Service Account has admin privileges 🟢 | 1 | 🟢 x6 |
📝 Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level 🟢 | 1 | 🟢 x6 |
📝 Google KMS Crypto Key is anonymously or publicly accessible 🟠🟢 | | 🟠 x1, 🟢 x3 |
📝 Google Logging Log Sink exports logs to a Storage Bucket without Bucket Lock 🟢 | 1 | 🟢 x6 |
📝 Google Storage Bucket is anonymously or publicly accessible 🟢 | 1 | 🟢 x6 |
📝 Google Storage Bucket Uniform Bucket-Level Access is not enabled 🟢 | 1 | 🟢 x6 |
📝 Google User has both Service Account Admin and Service Account User roles assigned 🟢 | 1 | 🟢 x6 |