| 🛡️ AWS IAM Policy allows full administrative privileges🟢 | 1 | 🟢 x6 | no data |
| 🛡️ AWS IAM User has inline or directly attached policies🟢 | 1 | 🟠 x1, 🟢 x5 | no data |
| 🛡️ Google BigQuery Dataset is anonymously or publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud MySQL Instance Skip_show_database Database Flag is not set to on🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud SQL Instance External Authorized Networks whitelists all public IP addresses🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud SQL Instance has public IP addresses🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Cloud SQL Server Instance cross db ownership chaining Database Flag is not set to off🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google GCE Instance has a public IP address🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google KMS Crypto Key is anonymously or publicly accessible🟠🟢⚪ | | 🟠 x1, 🟢 x2, ⚪ x1 | no data |
| 🛡️ Google Logging Log Sink exports logs to a Storage Bucket without Bucket Lock🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Project with KMS keys has a principal with Owner role🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Storage Bucket is anonymously or publicly accessible🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google Storage Bucket Uniform Bucket-Level Access is not enabled🟢 | 1 | 🟢 x6 | no data |
| 🛡️ Google User has both Service Account Admin and Service Account User roles assigned🟢 | 1 | 🟢 x6 | no data |