π [LEGACY] Azure Virtual Machine VHDs are not encrypted π’ | | π’ x3 |
π AWS Account Alternate Contact Information is not current π΄π’ | | π΄ x1, π’ x3 |
π AWS Account Primary Contact Information is not current π΄π’ | | π΄ x1, π’ x3 |
π AWS Account Root User Hardware MFA is not enabled. π’ | | π’ x3 |
π AWS CloudTrail AWS Organizations Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Config Configuration Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Configuration Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Disable CMK or Schedule CMK Deletion Events Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail IAM Policy Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Management Console Authentication Failures Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Management Console Sign-In without MFA Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Network Access Control Lists Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Network Gateways Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Root Account Usage Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Route Table Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail S3 Bucket Policy Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Security Group Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail Unauthorized API Calls Monitoring is not enabled π’ | | π’ x3 |
π AWS CloudTrail VPC Changes Monitoring is not enabled π’ | | π’ x3 |
π AWS IAM User is not managed centrally in multi-account environments π’ | | π’ x3 |
π AWS IAM User with console and programmatic access set during the initial creation π’ | | π’ x3 |
π AWS S3 Bucket sensitive data is not discovered, classified, and secured π’ | | π’ x3 |
π AWS VPC Route Table for VPC Peering does not follow the least privilege principle π’ | | π’ x3 |
π Azure App Service Basic Authentication is enabled π’ | | π’ x3 |
π Azure App Service does not run the latest Java version π’ | | π’ x3 |
π Azure App Service does not run the latest PHP version π’ | | π’ x3 |
π Azure App Service does not run the latest Python version π’ | | π’ x3 |
π Azure App Service does not use Azure Key Vaults to store secrets π’ | | π’ x3 |
π Azure Cosmos DB Entra ID Client Authentication is not used π’ | | π’ x3 |
π Azure Diagnostic Setting exists for Subscription Activity Logs π’ | | π’ x3 |
π Azure Diagnostic Setting for Azure AppService HTTP logs is not enabled π’ | | π’ x3 |
π Azure Diagnostic Setting for Azure Key Vault is not enabled π’ | | π’ x3 |
π Azure Diagnostic Setting is not enabled for all services that support it π’ | | π’ x3 |
π Azure Public IP Addresses are not evaluated periodically π’ | | π’ x3 |
π Azure Storage Account Access Key Rotation Reminders are not enabled π’ | | π’ x3 |
π Azure Storage Account Access Keys are not regenerated periodically π’ | | π’ x3 |
π Azure Storage Account Shared Access Signature Tokens do not expire within 1 hour π’ | | π’ x3 |
π Azure Storage Account With Critical Data is not encrypted with customer managed key π’ | | π’ x3 |
π Azure Subscription Leaving Microsoft Entra ID Directory and Subscription Entering Microsoft Entra ID Directory is not set to Permit No One π’ | | π’ x3 |
π Azure Subscription Microsoft Defender For IoT Hub is not set to On π’ | | π’ x3 |
π Azure Subscription Resource Lock Administrator Custom Role does not exist π’ | | π’ x3 |
π Azure Subscription Resources Basic SKU is used for production workloads π’ | | π’ x3 |
π Azure Subscription Vulnerability Assessment is not auto provisioned π’ | | π’ x3 |
π Azure Virtual Machine Endpoint Protection is not installed π’ | | π’ x3 |
π Azure Virtual Machine Unapproved Extensions are installed π’ | | π’ x3 |
π Consumer Google Accounts are used π’ | | π’ x3 |
π Google Accounts are not configured with MFA π’ | | π’ x3 |
π Google App Engine Application HTTPS Connection is not enforced π’ | | π’ x3 |
π Google API Key is not restricted for unspecified hosts and apps π’ | | π’ x3 |
π Google BigQuery Sensitive Data Protection is not in use π’ | | π’ x3 |
π Google Cloud Access Transparency is not enabled π’ | | π’ x3 |
π Google Cloud Function Environment Variables store confidential data π’ | | π’ x3 |
π Google Cloud MySQL Instance allows anyone to connect with administrative privileges π’ | | π’ x3 |
π Google GCE Instance doesn't have the latest operating system updates installed π’ | | π’ x3 |
π Google HTTPS or SSL Proxy Load Balancer permits SSL policies with weak cipher suites π’ | | π’ x3 |
π Google Identity Aware Proxy (IAP) is not used to enforce access controls π’ | | π’ x3 |
π Google KMS Crypto Key is anonymously or publicly accessible π π’ | | π x1, π’ x3 |
π Google Organization Administrator Security Key Enforcement is not enabled π’ | | π’ x3 |
π Microsoft Cloud Security Benchmark policies are disabled π’ | | π’ x3 |
π Microsoft Defender Agentless Container Vulnerability Assessment Component is not enabled π’ | | π’ x3 |
π Microsoft Defender Agentless Discovery for Kubernetes Component is not enabled π’ | | π’ x3 |
π Microsoft Defender Agentless Scanning for Machines Component is not enabled π’ | | π’ x3 |
π Microsoft Defender External Attack Surface Monitoring (EASM) is not enabled π’ | | π’ x3 |
π Microsoft Defender File Integrity Monitoring Component is not enabled π’ | | π’ x3 |
π Microsoft Defender Recommendations for Apply System Updates are not completed π’ | | π’ x3 |
π Microsoft Entra ID Account Lockout Duration is not set 60 seconds or more π’ | | |