Skip to main content

🟒 Impossible policy

  • Contextual name: 🟒 Impossible policy
  • ID: IMPOSSIBLE_POLICY

Policies (97)​

PolicyLogic CountFlags
πŸ“ [LEGACY] Azure Virtual Machine VHDs are not encrypted 🟒🟒 x3
πŸ“ AWS Account Alternate Contact Information is not current πŸ”΄πŸŸ’πŸ”΄ x1, 🟒 x3
πŸ“ AWS Account Primary Contact Information is not current πŸ”΄πŸŸ’πŸ”΄ x1, 🟒 x3
πŸ“ AWS Account Root User Hardware MFA is not enabled. 🟒🟒 x3
πŸ“ AWS CloudTrail AWS Organizations Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Config Configuration Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Configuration Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Disable CMK or Schedule CMK Deletion Events Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail IAM Policy Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Management Console Authentication Failures Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Management Console Sign-In without MFA Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Network Access Control Lists Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Network Gateways Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Root Account Usage Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Route Table Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail S3 Bucket Policy Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Security Group Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Unauthorized API Calls Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail VPC Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS IAM User is not managed centrally in multi-account environments 🟒🟒 x3
πŸ“ AWS IAM User with console and programmatic access set during the initial creation 🟒🟒 x3
πŸ“ AWS S3 Bucket sensitive data is not discovered, classified, and secured 🟒🟒 x3
πŸ“ AWS VPC Route Table for VPC Peering does not follow the least privilege principle 🟒🟒 x3
πŸ“ Azure App Service Basic Authentication is enabled 🟒🟒 x3
πŸ“ Azure App Service does not run the latest Java version 🟒🟒 x3
πŸ“ Azure App Service does not run the latest PHP version 🟒🟒 x3
πŸ“ Azure App Service does not run the latest Python version 🟒🟒 x3
πŸ“ Azure App Service does not use Azure Key Vaults to store secrets 🟒🟒 x3
πŸ“ Azure Cosmos DB Entra ID Client Authentication is not used 🟒🟒 x3
πŸ“ Azure Diagnostic Setting exists for Subscription Activity Logs 🟒🟒 x3
πŸ“ Azure Diagnostic Setting for Azure AppService HTTP logs is not enabled 🟒🟒 x3
πŸ“ Azure Diagnostic Setting for Azure Key Vault is not enabled 🟒🟒 x3
πŸ“ Azure Diagnostic Setting is not enabled for all services that support it 🟒🟒 x3
πŸ“ Azure Public IP Addresses are not evaluated periodically 🟒🟒 x3
πŸ“ Azure Storage Account Access Key Rotation Reminders are not enabled 🟒🟒 x3
πŸ“ Azure Storage Account Access Keys are not regenerated periodically 🟒🟒 x3
πŸ“ Azure Storage Account Shared Access Signature Tokens do not expire within 1 hour 🟒🟒 x3
πŸ“ Azure Storage Account With Critical Data is not encrypted with customer managed key 🟒🟒 x3
πŸ“ Azure Subscription Leaving Microsoft Entra ID Directory and Subscription Entering Microsoft Entra ID Directory is not set to Permit No One 🟒🟒 x3
πŸ“ Azure Subscription Microsoft Defender For IoT Hub is not set to On 🟒🟒 x3
πŸ“ Azure Subscription Resource Lock Administrator Custom Role does not exist 🟒🟒 x3
πŸ“ Azure Subscription Resources Basic SKU is used for production workloads 🟒🟒 x3
πŸ“ Azure Subscription Vulnerability Assessment is not auto provisioned 🟒🟒 x3
πŸ“ Azure Virtual Machine Endpoint Protection is not installed 🟒🟒 x3
πŸ“ Azure Virtual Machine Unapproved Extensions are installed 🟒🟒 x3
πŸ“ Consumer Google Accounts are used 🟒🟒 x3
πŸ“ Google Accounts are not configured with MFA 🟒🟒 x3
πŸ“ Google App Engine Application HTTPS Connection is not enforced 🟒🟒 x3
πŸ“ Google API Key is not restricted for unspecified hosts and apps 🟒🟒 x3
πŸ“ Google BigQuery Sensitive Data Protection is not in use 🟒🟒 x3
πŸ“ Google Cloud Access Transparency is not enabled 🟒🟒 x3
πŸ“ Google Cloud Function Environment Variables store confidential data 🟒🟒 x3
πŸ“ Google Cloud MySQL Instance allows anyone to connect with administrative privileges 🟒🟒 x3
πŸ“ Google GCE Instance doesn't have the latest operating system updates installed 🟒🟒 x3
πŸ“ Google HTTPS or SSL Proxy Load Balancer permits SSL policies with weak cipher suites 🟒🟒 x3
πŸ“ Google Identity Aware Proxy (IAP) is not used to enforce access controls 🟒🟒 x3
πŸ“ Google KMS Crypto Key is anonymously or publicly accessible 🟠🟒🟠 x1, 🟒 x3
πŸ“ Google Organization Administrator Security Key Enforcement is not enabled 🟒🟒 x3
πŸ“ Microsoft Cloud Security Benchmark policies are disabled 🟒🟒 x3
πŸ“ Microsoft Defender Agentless Container Vulnerability Assessment Component is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender Agentless Discovery for Kubernetes Component is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender Agentless Scanning for Machines Component is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender External Attack Surface Monitoring (EASM) is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender File Integrity Monitoring Component is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender Recommendations for Apply System Updates are not completed 🟒🟒 x3
πŸ“ Microsoft Entra ID Account Lockout Duration is not set 60 seconds or more 🟒🟒 x3
πŸ“ Microsoft Entra ID Account Lockout Threshold is not set to 10 or less 🟒🟒 x3
πŸ“ Microsoft Entra ID Allow Users To Remember MFA On Devices They Trust is enabled 🟒🟒 x3
πŸ“ Microsoft Entra ID Conditional Access By Location is not defined 🟒🟒 x3
πŸ“ Microsoft Entra ID Custom Banned Password List is not enforced 🟒🟒 x3
πŸ“ Microsoft Entra ID Device Code Authentication Flow is not restricted 🟒🟒 x3
πŸ“ Microsoft Entra ID Global Administrator Role assigned to more than 4 users 🟒🟒 x3
πŸ“ Microsoft Entra ID Guest Users are not reviewed on a regular basis 🟒🟒 x3
πŸ“ Microsoft Entra ID MFA For Administrators is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID MFA For All Users is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID MFA For Risky Sign-Ins is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID MFA For Windows Azure Service Management API is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID MFA to access Microsoft Admin Portals is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID Named Locations are not defined 🟒🟒 x3
πŸ“ Microsoft Entra ID Non-Privileged User Multi-Factor Auth Status is not enabled 🟒🟒 x3
πŸ“ Microsoft Entra ID Owners Can Manage Group Membership Requests In The Access Panel is set to Yes 🟒🟒 x3
πŸ“ Microsoft Entra ID Privileged User Multi-Factor Auth Status is not enabled 🟒🟒 x3
πŸ“ Microsoft Entra ID Require MFA To Register Or Join Devices With Microsoft Entra ID is set to No 🟒🟒 x3
πŸ“ Microsoft Entra ID Restrict User Ability To Access Groups Features In The Access Pane is set to No 🟒🟒 x3
πŸ“ Microsoft Entra ID Security Defaults are not enabled 🟒🟒 x3
πŸ“ Microsoft Entra ID User Consent For Applications is not set to Allow From Verified Publishers 🟒🟒 x3
πŸ“ Microsoft Entra ID User Consent For Applications is not set to Do Not Allow User Consent 🟒🟒 x3
πŸ“ Microsoft Entra ID User Notify All Admins When Other Admins Reset Their Password is set No 🟒🟒 x3
πŸ“ Microsoft Entra ID User Notify Users On Password Resets is set to No 🟒🟒 x3
πŸ“ Microsoft Entra ID User Reconfirm Authentication Information is set to 0 🟒🟒 x3
πŸ“ Microsoft Entra ID User Self-Service Password Reset does not require 2 authentication methods 🟒🟒 x3
πŸ“ Microsoft Entra ID User Settings Restrict Access To Microsoft Entra Admin Center is set to No 🟒🟒 x3
πŸ“ Microsoft Entra ID Users Can Create Microsoft 365 Groups In Azure Portals, API Or PowerShell is set to Yes 🟒🟒 x3
πŸ“ Microsoft Entra ID Users Can Create Security Groups In Azure Portals, API Or PowerShell is set to Yes 🟒🟒 x3
πŸ“ Mission-Critical Azure Resources do not use Resource Locks 🟒🟒 x3
πŸ“ Network Security Group Flow Logs are not captured and sent to Log Analytics Workspace 🟒🟒 x3
πŸ“ Privileged Azure Virtual Machine is accessed by identities without MFA 🟒🟒 x3