| 🛡️ AWS Account EBS Volume Encryption Attribute is not enabled in all regions🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Account IAM Access Analyzer is not enabled for all regions🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Account Root User credentials were used is the last 30 days🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS Account Root User has active access keys🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS API Gateway REST API Stage is not configured to use an SSL certificate for authentication🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudFront Web Distribution Cache Behaviors allow unencrypted traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudFront Web Distribution does not encrypt traffic to Custom Origins🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudFront Web Distribution uses default SSL/TLS certificate🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudFront Web Distribution uses Dedicated IP for SSL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudFront Web Distribution uses outdated SSL protocols with Custom Origins🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudTrail is not encrypted with KMS CMK🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS CloudTrail Log File Validation is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS DAX Cluster Server-Side Encryption is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS DMS Endpoint doesn't use SSL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS DMS Replication Instance Auto Minor Version Upgrade is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS DMS Replication Instance is publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS DynamoDB Table Point In Time Recovery is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EBS Attached Volume is not encrypted🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EBS Snapshot is publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Auto Scaling Group behind ELB assigns public IP to instances🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Default Security Group does not restrict all traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Instance with an auto-assigned public IP address is in a default subnet🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted CIFS traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted DNS traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted FTP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted ICMP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted NetBIOS traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted RPC traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted SMTP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted traffic to MongoDB🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted traffic to MSSQL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted traffic to MySQL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted traffic to PostgreSQL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EC2 Security Group allows unrestricted Telnet traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS EFS File System encryption is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS ElastiCache Redis Cluster automatic backups are not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS GuardDuty is not enabled in all regions🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM Policy allows full administrative privileges🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM Server Certificate is expired🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User Access Keys are not rotated every 90 days or less🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User has inline or directly attached policies🟢 | 1 | 🟠 x1, 🟢 x5 | no data |
| 🛡️ AWS IAM User has more than one active access key🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User with console and programmatic access set during the initial creation🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ AWS KMS Symmetric CMK Rotation is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Instance automated backups are not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Instance Auto Minor Version Upgrade is not enabled🟠🟢 | 1 | 🟠 x1, 🟢 x6 | no data |
| 🛡️ AWS RDS Instance Encryption is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Instance is publicly accessible and in an unrestricted public subnet🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Instance uses default endpoint port🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS RDS Snapshot is publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS S3 Bucket is not configured to block public access🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS S3 Bucket Lifecycle Configuration is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS S3 Bucket Policy is not set to deny HTTP requests🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS S3 Bucket Versioning is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS VPC is not configured with a VPC Endpoint for Amazon EC2 service🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS VPC Network ACL exposes admin ports to public internet ports🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS VPC Subnet Map Public IP On Launch is enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS WAF Rule Group has no WAF Rules🟢 | 1 | 🟠 x1, 🟢 x5 | no data |
| 🛡️ AWS WAF Web ACL has no WAF Rules or WAF Rule Groups🟢 | 1 | 🟠 x1, 🟢 x5 | no data |
| 🛡️ Azure App Service Authentication is disabled and Basic Authentication is enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure App Service Basic Authentication is enabled🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Azure App Service does not run the latest Java version🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Azure App Service does not run the latest PHP version🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Azure App Service does not run the latest Python version🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Azure App Service FTP deployments are not disabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure App Service HTTPS Only configuration is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Cosmos DB Account Private Endpoints are not used🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Cosmos DB Account Virtual Network Filter is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Cosmos DB Entra ID Client Authentication is not used🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Azure Diagnostic Setting Logs export to Storage Account not encrypted with Customer-managed key🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Key Vault Soft Delete and Purge Protection functions are not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Network Security Group allows public access to HTTP(S) ports🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Network Security Group allows public access to RDP port🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Network Security Group allows public access to SSH port🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Non-RBAC Key Vault stores Keys without expiration date🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Non-RBAC Key Vault stores Secrets without expiration date🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure PostgreSQL Single Server Infrastructure Double Encryption is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure RBAC Key Vault stores Keys without expiration date🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure RBAC Key Vault stores Secrets without expiration date🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP)🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure SQL Server Transparent Data Encryption Protector is not encrypted with Customer-managed key🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Storage Account Allow Blob Anonymous Access is enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Storage Account Require Infrastructure Encryption is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Storage Account Secure Transfer Required is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Storage Account Trusted Azure Services are not enabled as networking exceptions🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Storage Account With Critical Data is not encrypted with customer managed key🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Azure Subscription Microsoft Defender For (Managed Instance) Azure SQL Databases is not set to On🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Subscription Microsoft Defender For App Services is not set to On🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Subscription Microsoft Defender For Containers is not set to On🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Subscription Microsoft Defender For Key Vault is not set to On🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Subscription Microsoft Defender For Servers is not set to On🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Subscription Microsoft Defender For SQL Servers On Machines is not set to On🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Subscription Microsoft Defender For Storage is not set to On🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Unattached Managed Disk is not encrypted with Customer-managed key🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Azure Virtual Machine OS and Data disks are not encrypted with Customer-managed key🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Consumer Google Accounts are used🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Google BigQuery Dataset is anonymously or publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google BigQuery Dataset is not encrypted with Customer-Managed Encryption Key (CMEK)🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google BigQuery Table is not encrypted with Customer-Managed Encryption Key (CMEK)🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud DNS Managed Zone DNSSEC is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud MySQL Instance allows anyone to connect with administrative privileges🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Google Cloud SQL Instance Automated Backups are not configured🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud SQL Instance External Authorized Networks whitelists all public IP addresses🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud SQL Instance SSL Connections are not enforced🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud SQL Server Instance external scripts enabled Database Flag is not set to off🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Dataproc Cluster is not encrypted using Customer-Managed Encryption Key🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Disk for critical VMs is not encrypted with Customer-Supplied Encryption Key (CSEK)🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Firewall Rule logging is disabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Instance Confidential Compute is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Instance has a public IP address🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Instance is configured to use the Default Service Account with full access to all Cloud APIs🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Instance IP Forwarding is not disabled.🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted CiscoSecure/WebSM traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted DNS traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted FTP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted HTTP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted LDAP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted NetBIOS traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted POP3 traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted SMTP traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted SSH traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted traffic to Cassandra🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted traffic to Directory services"🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted traffic to Elasticsearch🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted traffic to Memcached🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted traffic to MongoDB🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted traffic to MySQL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted traffic to OracleDB🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted traffic to PostgreSQL🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted traffic to Redis🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Network allows unrestricted Telnet traffic🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Subnetwork Flow Logs are not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GKE Cluster Network policy is disabled.🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GKE Cluster Node Pool uses default Service account🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google HTTPS or SSL Proxy Load Balancer permits SSL policies with weak cipher suites🟢⚪ | | 🟢 x2, ⚪ x1 | no data |
| 🛡️ Google IAM Policy Binding Member (User) is assigned a basic role🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Project with KMS keys has a principal with Owner role🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Resource Manager Organization has a Redis IAM role assigned🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Storage Bucket is anonymously or publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google User has both Service Account Admin and Service Account User roles assigned🟢 | 1 | 🟢 x6 | no data |