π AWS Account IAM Access Analyzer is not enabled for all regions π’ | 1 | π’ x6 |
π AWS Account IAM Password Policy Number of passwords to remember is not set to 24 π’ | 1 | π’ x6 |
π AWS Account Object-level CloudTrail Logging for Read Events for S3 Buckets is not enabled π’ | 1 | π’ x6 |
π AWS Account Object-level CloudTrail Logging for Write Events for S3 Buckets is not enabled π’ | 1 | π’ x6 |
π AWS Account Root User credentials were used is the last 30 days π΄π’ | 1 | π΄ x1, π’ x6 |
π AWS Account Root User has active access keys π’ | 1 | π’ x6 |
π AWS API Gateway API Route Authorization Type is not configured π’ | 1 | π’ x6 |
π AWS EC2 Instance IAM role is not attached π’ | 1 | π’ x6 |
π AWS EC2 Instance IMDSv2 is not enabled π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted CIFS traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted DNS traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted FTP traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted ICMP traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted NetBIOS traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted RPC traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted SMTP traffic π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted traffic to MongoDB π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted traffic to MSSQL π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted traffic to MySQL π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS π’ | 1 | π’ x6 |
π AWS EC2 Security Group allows unrestricted traffic to PostgreSQL π’ | 1 | π’ x6 |
π AWS IAM Policy allows full administrative privileges π’ | 1 | π’ x6 |
π AWS IAM Server Certificate is expired π’ | 1 | π’ x6 |
π AWS IAM User Access Keys are not rotated every 90 days or less π’ | 1 | π’ x6 |
π AWS IAM User has inline or directly attached policies π’ | 1 | π x1, π’ x5 |
π AWS IAM User has more than one active access key π’ | 1 | π’ x6 |
π AWS IAM User MFA is not enabled for all users with console password π’ | 1 | π’ x6 |
π AWS IAM User with console and programmatic access set during the initial creation π’ | | π’ x3 |
π AWS IAM User with credentials unused for 45 days or more is not disabled π’ | 1 | π’ x6 |
π AWS KMS Symmetric CMK Rotation is not enabled π’ | 1 | π’ x6 |
π AWS RDS Instance is publicly accessible and in an unrestricted public subnet π’ | 1 | π’ x6 |
π AWS RDS Snapshot is publicly accessible π’ | 1 | π’ x6 |
π AWS S3 Bucket is not configured to block public access π’ | 1 | π’ x6 |
π AWS S3 Bucket MFA Delete is not enabled π π’ | 1 | π x1, π’ x6 |
π AWS S3 Bucket Object Lock is not enabled π π’ | 1 | π x1, π’ x6 |
π Azure App Service Authentication is disabled and Basic Authentication is enabled π’ | 1 | π’ x6 |
π Azure App Service Basic Authentication is enabled π’ | | π’ x3 |
π Azure App Service is not registered with Microsoft Entra ID π’ | 1 | π’ x6 |
π Azure Cosmos DB Account Private Endpoints are not used π’ | 1 | π’ x6 |
π Azure Cosmos DB Account Virtual Network Filter is not enabled π’ | 1 | π’ x6 |
π Azure Cosmos DB Entra ID Client Authentication is not used π’ | | π’ x3 |
π Azure Key Vault Soft Delete and Purge Protection functions are not enabled π’ | 1 | π’ x6 |
π Azure Network Security Group allows unrestricted HTTP(S) access from the Internet π’ | 1 | π’ x6 |
π Azure Network Security Group allows unrestricted RDP access from the Internet π’ | 1 | π’ x6 |
π Azure Network Security Group allows unrestricted SSH access from the Internet π’ | 1 | π’ x6 |
π Azure Network Security Group allows unrestricted UDP access from the Internet π’ | 1 | π’ x6 |
π Azure Non-RBAC Key Vault stores Keys without expiration date π’ | 1 | π’ x6 |
π Azure Non-RBAC Key Vault stores Secrets without expiration date π’ | 1 | π’ x6 |
π Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services π’ | 1 | π’ x6 |
π Azure RBAC Key Vault stores Keys without expiration date π’ | 1 | π’ x6 |
π Azure RBAC Key Vault stores Secrets without expiration date π’ | 1 | π’ x6 |
π Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP) π’ | 1 | π’ x6 |
π Azure Storage Account Allow Blob Anonymous Access is set enabled π’ | 1 | π’ x6 |
π Azure Storage Account Cross Tenant Replication is enabled π’ | 1 | π’ x6 |
π Azure Storage Account Trusted Azure Services are not enabled as networking exceptions π’ | 1 | π’ x6 |
π Consumer Google Accounts are used π’ | | π’ x3 |