Skip to main content

🟒 Policy with type

  • Contextual name: 🟒 Policy with type
  • ID: POLICY_WITH_TYPE

Policies (355)​

PolicyLogic CountFlags
πŸ“ [LEGACY] Azure Subscription Microsoft Defender For DNS is not set to On 🟒1🟒 x6
πŸ“ [LEGACY] Azure Virtual Machine VHDs are not encrypted 🟒🟒 x3
πŸ“ AWS Account Alternate Contact Information is not current πŸ”΄πŸŸ’πŸ”΄ x1, 🟒 x3
πŸ“ AWS Account Config is not enabled in all regions 🟒1🟒 x6
πŸ“ AWS Account EBS Volume Encryption Attribute is not enabled in all regions 🟒1🟒 x6
πŸ“ AWS Account IAM Access Analyzer is not enabled for all regions 🟒1🟒 x6
πŸ“ AWS Account IAM Password Policy minimum password length is 14 characters or less 🟒1🟒 x6
πŸ“ AWS Account IAM Password Policy Number of passwords to remember is not set to 24 🟒1🟒 x6
πŸ“ AWS Account Multi-Region CloudTrail is not enabled 🟒1🟒 x6
πŸ“ AWS Account Object-level CloudTrail Logging for Read Events for S3 Buckets is not enabled 🟒1🟒 x6
πŸ“ AWS Account Object-level CloudTrail Logging for Write Events for S3 Buckets is not enabled 🟒1🟒 x6
πŸ“ AWS Account Primary Contact Information is not current πŸ”΄πŸŸ’πŸ”΄ x1, 🟒 x3
πŸ“ AWS Account Root User credentials were used is the last 30 days πŸ”΄πŸŸ’1πŸ”΄ x1, 🟒 x6
πŸ“ AWS Account Root User has active access keys 🟒1🟒 x6
πŸ“ AWS Account Root User Hardware MFA is not enabled. 🟒🟒 x3
πŸ“ AWS Account Root User MFA is not enabled. 🟒1🟒 x6
πŸ“ AWS Account Security Hub is not enabled 🟒1🟠 x1, 🟒 x5
πŸ“ AWS ACM Certificate expires in the next 7 days 🟒1🟒 x6
πŸ“ AWS ACM Certificate Expired 🟒1🟒 x6
πŸ“ AWS ACM Certificate with Wildcard Domain Name 🟒1🟒 x6
πŸ“ AWS ACM RSA Certificate key length is less than 2048 bits 🟒1🟒 x6
πŸ“ AWS API Gateway API Access Logging in CloudWatch is not enabled 🟒1🟠 x1, 🟒 x5
πŸ“ AWS API Gateway API Execution Logging in CloudWatch is not enabled 🟒1🟒 x6
πŸ“ AWS API Gateway API Route Authorization Type is not configured 🟒1🟒 x6
πŸ“ AWS API Gateway REST API Stage is not associated with a WAF Web ACL 🟒1🟒 x6
πŸ“ AWS API Gateway REST API Stage is not configured to use an SSL certificate for authentication 🟒1🟒 x6
πŸ“ AWS API Gateway REST API Stage X-Ray Tracing is not enabled 🟒1🟒 x6
πŸ“ AWS Athena Workgroup CloudWatch Metrics are not enabled 🟒1🟒 x6
πŸ“ AWS CloudTrail AWS Organizations Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Config Configuration Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Configuration Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Disable CMK or Schedule CMK Deletion Events Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail is not encrypted with KMS CMK 🟒1🟒 x6
πŸ“ AWS CloudTrail IAM Policy Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Log File Validation is not enabled 🟒1🟒 x6
πŸ“ AWS CloudTrail Management Console Authentication Failures Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Management Console Sign-In without MFA Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Network Access Control Lists Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Network Gateways Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Root Account Usage Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Route Table Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail S3 Bucket Access Logging is not enabled. 🟒1🟒 x6
πŸ“ AWS CloudTrail S3 Bucket Policy Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Security Group Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail Unauthorized API Calls Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS CloudTrail VPC Changes Monitoring is not enabled 🟒🟒 x3
πŸ“ AWS EC2 Auto Scaling Group and Classic Load Balancer AZs are inconsistent 🟠🟒1🟠 x1, 🟒 x6
πŸ“ AWS EC2 Auto Scaling Group behind ELB doesn't use ELB health check 🟒1🟒 x6
πŸ“ AWS EC2 Default Security Group does not restrict all traffic 🟒1🟒 x6
πŸ“ AWS EC2 Instance Detailed Monitoring is not enabled 🟒1🟒 x6
πŸ“ AWS EC2 Instance is idle 🟒1🟒 x6
πŸ“ AWS EC2 Instance is overutilized 🟒1🟒 x6
πŸ“ AWS EC2 Instance is underutilized 🟒1🟒 x6
πŸ“ AWS EC2 Instance IAM role is not attached 🟒1🟒 x6
πŸ“ AWS EC2 Instance IMDSv2 is not enabled 🟒1🟒 x6
πŸ“ AWS EC2 Instance Should Have Breeze Agent Installed 🟒1🟒 x6
πŸ“ AWS EC2 Instance without a public IP address is in a public subnet 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv4 (0.0.0.0/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows public IPv6 (::/0) access to admin ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted CIFS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted DNS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted FTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted ICMP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted NetBIOS traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted RPC traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted SMTP traffic 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to all ports 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MongoDB 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MSSQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to MySQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted traffic to PostgreSQL 🟒1🟒 x6
πŸ“ AWS EC2 Security Group allows unrestricted Telnet traffic 🟒1🟒 x6
πŸ“ AWS EFS File System encryption is not enabled 🟒1🟒 x6
πŸ“ AWS EKS Cluster Should Have Breeze Agent Installed 🟒1🟒 x6
πŸ“ AWS IAM AWSCloudShellFullAccess Policy is attached 🟒1🟒 x6
πŸ“ AWS IAM Policy allows full administrative privileges 🟒1🟒 x6
πŸ“ AWS IAM Role unused 🟒1🟒 x6
πŸ“ AWS IAM Server Certificate is expired 🟒1🟒 x6
πŸ“ AWS IAM User Access Keys are not rotated every 90 days or less 🟒1🟒 x6
πŸ“ AWS IAM User has inline or directly attached policies 🟒1🟠 x1, 🟒 x5
πŸ“ AWS IAM User has more than one active access key 🟒1🟒 x6
πŸ“ AWS IAM User is not managed centrally in multi-account environments 🟒🟒 x3
πŸ“ AWS IAM User MFA is not enabled for all users with console password 🟒1🟒 x6
πŸ“ AWS IAM User with console and programmatic access set during the initial creation 🟒🟒 x3
πŸ“ AWS IAM User with credentials unused for 45 days or more is not disabled 🟒1🟒 x6
πŸ“ AWS KMS Symmetric CMK Rotation is not enabled 🟒1🟒 x6
πŸ“ AWS RDS Aurora Cluster access is not consistent 🟒1🟒 x6
πŸ“ AWS RDS Instance Auto Minor Version Upgrade is not enabled 🟠🟒1🟠 x1, 🟒 x6
πŸ“ AWS RDS Instance Encryption is not enabled 🟒1🟒 x6
πŸ“ AWS RDS Instance is publicly accessible and in an unrestricted public subnet 🟒1🟒 x6
πŸ“ AWS RDS Instance Multi-AZ Deployment is not enabled 🟒1🟒 x6
πŸ“ AWS RDS Instance uses default endpoint port 🟒1🟒 x6
πŸ“ AWS RDS Snapshot is publicly accessible 🟒1🟒 x6
πŸ“ AWS S3 Bucket is not configured to block public access 🟒1🟒 x6
πŸ“ AWS S3 Bucket Lifecycle Configuration is not enabled 🟒1🟒 x6
πŸ“ AWS S3 Bucket MFA Delete is not enabled 🟠🟒1🟠 x1, 🟒 x6
πŸ“ AWS S3 Bucket Object Lock is not enabled 🟠🟒1🟠 x1, 🟒 x6
πŸ“ AWS S3 Bucket Policy is not set to deny HTTP requests 🟒1🟒 x6
πŸ“ AWS S3 Bucket sensitive data is not discovered, classified, and secured 🟒🟒 x3
πŸ“ AWS S3 Bucket Server Access Logging is not enabled 🟒1🟒 x6
πŸ“ AWS S3 Bucket Versioning is not enabled 🟒1🟒 x6
πŸ“ AWS Support Role is not created 🟒1🟒 x6
πŸ“ AWS VPC Flow Logs are not enabled 🟒1🟠 x1, 🟒 x5
πŸ“ AWS VPC Network ACL exposes admin ports to public internet ports 🟒1🟒 x6
πŸ“ AWS VPC Route Table for VPC Peering does not follow the least privilege principle 🟒🟒 x3
πŸ“ Azure Active Directory Device Should Have Breeze Agent Installed 🟒1🟒 x6
πŸ“ Azure AKS Cluster Should Have Breeze Agent Installed 🟒1🟒 x6
πŸ“ Azure App Service Authentication is disabled and Basic Authentication is enabled 🟒1🟒 x6
πŸ“ Azure App Service Basic Authentication is enabled 🟒🟒 x3
πŸ“ Azure App Service does not run the latest HTTP version 🟒1🟒 x6
πŸ“ Azure App Service does not run the latest Java version 🟒🟒 x3
πŸ“ Azure App Service does not run the latest PHP version 🟒🟒 x3
πŸ“ Azure App Service does not run the latest Python version 🟒🟒 x3
πŸ“ Azure App Service does not use Azure Key Vaults to store secrets 🟒🟒 x3
πŸ“ Azure App Service FTP deployments are not disabled 🟒1🟒 x6
πŸ“ Azure App Service HTTPS Only configuration is not enabled 🟒1🟒 x6
πŸ“ Azure App Service is not registered with Microsoft Entra ID 🟒1🟒 x6
πŸ“ Azure App Service Minimum TLS Version is not set to TLS 1.2 or higher 🟒1🟒 x6
πŸ“ Azure App Service Remote Debugging is not disabled 🟒1🟒 x6
πŸ“ Azure Cosmos DB Account Private Endpoints are not used 🟒1🟒 x6
πŸ“ Azure Cosmos DB Account Virtual Network Filter is not enabled 🟒1🟒 x6
πŸ“ Azure Cosmos DB Entra ID Client Authentication is not used 🟒🟒 x3
πŸ“ Azure Diagnostic Setting captures Administrative, Alert, Policy, and Security categories 🟒1🟒 x6
πŸ“ Azure Diagnostic Setting exists for Subscription Activity Logs 🟒🟒 x3
πŸ“ Azure Diagnostic Setting for Azure AppService HTTP logs is not enabled 🟒🟒 x3
πŸ“ Azure Diagnostic Setting for Azure Key Vault is not enabled 🟒🟒 x3
πŸ“ Azure Diagnostic Setting is not enabled for all services that support it 🟒🟒 x3
πŸ“ Azure Diagnostic Setting Logs export to Storage Account not encrypted with Customer-managed key 🟒1🟒 x6
πŸ“ Azure Key Vault Automatic Key Rotation is not enabled 🟠🟒1🟠 x1, 🟒 x5
πŸ“ Azure Key Vault Private Endpoints are not used 🟒1🟒 x6
πŸ“ Azure Key Vault Role Based Access Control is not enabled 🟒1🟒 x6
πŸ“ Azure Key Vault Soft Delete and Purge Protection functions are not enabled 🟒1🟒 x6
πŸ“ Azure Managed Disk Data Access Auth Mode is not set to Azure Active Directory 🟒1🟒 x6
πŸ“ Azure Managed Disk Public Network Access is not disabled 🟒1🟒 x6
πŸ“ Azure MySQL Flexible Server audit_log_enabled Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure MySQL Flexible Server audit_log_events Parameter is not set with the CONNECTION event 🟒1🟒 x6
πŸ“ Azure MySQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure MySQL Flexible Server TLS Version is not set to TLS 1.2 🟒1🟒 x6
πŸ“ Azure Network Security Group allows unrestricted HTTP(S) access from the Internet 🟒1🟒 x6
πŸ“ Azure Network Security Group allows unrestricted RDP access from the Internet 🟒1🟒 x6
πŸ“ Azure Network Security Group allows unrestricted SSH access from the Internet 🟒1🟒 x6
πŸ“ Azure Network Security Group allows unrestricted UDP access from the Internet 🟒1🟒 x6
πŸ“ Azure Network Security Group Flow Logs retention period is less than 90 days 🟒1🟒 x6
πŸ“ Azure Non-RBAC Key Vault stores Keys without expiration date 🟒1🟒 x6
πŸ“ Azure Non-RBAC Key Vault stores Secrets without expiration date 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server connection_throttle.enable Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server Firewall Rules allow access to Azure services 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server log_checkpoints Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server log_retention_days Parameter is less than 4 days 🟒1🟒 x6
πŸ“ Azure PostgreSQL Flexible Server require_secure_transport Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Enforce SSL Connection is not set enabled 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server Infrastructure Double Encryption is not enabled 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server log_connections Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure PostgreSQL Single Server log_disconnections Parameter is not set to ON 🟒1🟒 x6
πŸ“ Azure Public IP Addresses are not evaluated periodically 🟒🟒 x3
πŸ“ Azure RBAC Key Vault stores Keys without expiration date 🟒1🟒 x6
πŸ“ Azure RBAC Key Vault stores Secrets without expiration date 🟒1🟒 x6
πŸ“ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP) 🟒1🟒 x6
πŸ“ Azure SQL Database Transparent Data Encryption is not enabled 🟒1🟒 x6
πŸ“ Azure SQL Server Auditing is not enabled 🟒1🟒 x6
πŸ“ Azure SQL Server Auditing Retention is less than 90 days 🟒1🟒 x6
πŸ“ Azure SQL Server Microsoft Entra authentication is not configured 🟒1🟒 x6
πŸ“ Azure SQL Server Public Network Access is not disabled 🟒1🟒 x6
πŸ“ Azure SQL Server Transparent Data Encryption Protector is not encrypted with Customer-managed key 🟒1🟒 x6
πŸ“ Azure Storage Account Access Key Rotation Reminders are not enabled 🟒🟒 x3
πŸ“ Azure Storage Account Access Keys are not regenerated periodically 🟒🟒 x3
πŸ“ Azure Storage Account Allow Blob Anonymous Access is set enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Cross Tenant Replication is enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Default Network Access Rule is not set to Deny 🟒1🟒 x6
πŸ“ Azure Storage Account Minimum TLS Version is not set to TLS 1.2 or higher 🟒1🟒 x6
πŸ“ Azure Storage Account Private Endpoints are not used 🟒1🟒 x6
πŸ“ Azure Storage Account Public Network Access is not disabled 🟒1🟒 x6
πŸ“ Azure Storage Account Require Infrastructure Encryption is not enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Secure Transfer Required is not enabled 🟒1🟒 x6
πŸ“ Azure Storage Account Shared Access Signature Tokens do not expire within 1 hour 🟒🟒 x3
πŸ“ Azure Storage Account Trusted Azure Services are not enabled as networking exceptions 🟒1🟒 x6
πŸ“ Azure Storage Account With Critical Data is not encrypted with customer managed key 🟒🟒 x3
πŸ“ Azure Storage Blob Containers Soft Delete is not enabled 🟒1🟒 x6
πŸ“ Azure Storage Blob Logging is not enabled for Read, Write, and Delete requests 🟒1🟒 x6
πŸ“ Azure Storage Queue Logging is not enabled for Read, Write, and Delete requests 🟒1🟒 x6
πŸ“ Azure Storage Table Logging is not enabled for Read, Write, and Delete requests 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Create or Update Network Security Group does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Create or Update Public IP Address Rule does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Create or Update Security Solution does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Create or Update SQL Server Firewall Rule does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Create Policy Assignment does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Delete Network Security Group does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Delete Policy Assignment does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Delete Public IP Address Rule does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Delete Security Solution does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Activity Log Alert for Delete SQL Server Firewall Rule does not exist 🟒1🟒 x6
πŸ“ Azure Subscription Application Insights are not configured 🟒1🟠 x1, 🟒 x5
πŸ“ Azure Subscription Bastion Host does not exist 🟒1🟠 x1, 🟒 x5
πŸ“ Azure Subscription Custom Subscription Administrator Roles exist 🟒1🟒 x6
πŸ“ Azure Subscription Leaving Microsoft Entra ID Directory and Subscription Entering Microsoft Entra ID Directory is not set to Permit No One 🟒🟒 x3
πŸ“ Azure Subscription Log Analytics Agent is not auto provisioned 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For (Managed Instance) Azure SQL Databases is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For App Services is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For Azure Cosmos DB is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For Containers is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For IoT Hub is not set to On 🟒🟒 x3
πŸ“ Azure Subscription Microsoft Defender For Key Vault is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For Open-Source Relational Databases is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For Resource Manager is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For Servers is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For SQL Servers On Machines is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Microsoft Defender For Storage is not set to On 🟒1🟒 x6
πŸ“ Azure Subscription Network Watcher is not enabled in every available region 🟒1πŸ”΄ x1, 🟒 x5
πŸ“ Azure Subscription Resource Lock Administrator Custom Role does not exist 🟒🟒 x3
πŸ“ Azure Subscription Resources Basic SKU is used for production workloads 🟒🟒 x3
πŸ“ Azure Subscription Security Alert Notifications additional email address is not configured 🟒1🟒 x6
πŸ“ Azure Subscription Security Alert Notifications for alerts with High severity are not configured 🟒1🟒 x6
πŸ“ Azure Subscription Security Alert Notifications to subscription owners are not configured 🟒1🟒 x6
πŸ“ Azure Subscription Vulnerability Assessment is not auto provisioned 🟒🟒 x3
πŸ“ Azure Virtual Machine Endpoint Protection is not installed 🟒🟒 x3
πŸ“ Azure Virtual Machine is not utilizing Managed Disks 🟒1🟒 x6
πŸ“ Azure Virtual Machine OS and Data disks are not encrypted with Customer-managed key 🟒1🟒 x6
πŸ“ Azure Virtual Machine Should Have Breeze Agent Installed 🟒1🟒 x6
πŸ“ Azure Virtual Machine Trusted Launch is not enabled 🟒1🟒 x6
πŸ“ Azure Virtual Machine Unapproved Extensions are installed 🟒🟒 x3
πŸ“ Azure VM Scale Set Instance Should Have Breeze Agent Installed 🟒1🟒 x6
πŸ“ Consumer Google Accounts are used 🟒🟒 x3
πŸ“ Google Access Approval is not enabled 🟒1🟒 x6
πŸ“ Google Accounts are not configured with MFA 🟒🟒 x3
πŸ“ Google App Engine Application HTTPS Connection is not enforced 🟒🟒 x3
πŸ“ Google API Key is not restricted for unspecified hosts and apps 🟒🟒 x3
πŸ“ Google API Key is not restricted for unused APIs 🟒1🟒 x6
πŸ“ Google API Key is not rotated every 90 days 🟒1🟒 x6
πŸ“ Google BigQuery Dataset is anonymously or publicly accessible 🟒1🟒 x6
πŸ“ Google BigQuery Dataset is not encrypted with Customer-Managed Encryption Key (CMEK) 🟒1🟒 x6
πŸ“ Google BigQuery Sensitive Data Protection is not in use 🟒🟒 x3
πŸ“ Google BigQuery Table is not encrypted with Customer-Managed Encryption Key (CMEK) 🟒1🟒 x6
πŸ“ Google Cloud Access Transparency is not enabled 🟒🟒 x3
πŸ“ Google Cloud Asset Inventory API is not enabled 🟒1🟒 x6
πŸ“ Google Cloud Audit Logging is not configured properly 🟒1🟒 x6
πŸ“ Google Cloud DNS Managed Zone DNSSEC is not enabled 🟒1🟒 x6
πŸ“ Google Cloud DNS Managed Zone DNSSEC Key-Signing Algorithm is RSASHA1 🟒1🟒 x6
πŸ“ Google Cloud DNS Managed Zone DNSSEC Zone-Signing Algorithm is RSASHA1 🟒1🟒 x6
πŸ“ Google Cloud Function Environment Variables store confidential data 🟒🟒 x3
πŸ“ Google Cloud MySQL Instance allows anyone to connect with administrative privileges 🟒🟒 x3
πŸ“ Google Cloud MySQL Instance Local_infile Database Flag is not set to off 🟒1🟒 x6
πŸ“ Google Cloud MySQL Instance Skip_show_database Database Flag is not set to on 🟒1🟒 x6
πŸ“ Google Cloud PostgreSQL Instance Log_error_verbosity Database Flag is not set to DEFAULT or stricter 🟒1🟒 x6
πŸ“ Google Cloud PostgreSQL Instance cloudsql.enable_pgaudit Database Flag is not set to on 🟒1🟒 x6
πŸ“ Google Cloud PostgreSQL Instance Log_connections Database Flag is not set to On 🟒1🟒 x6
πŸ“ Google Cloud PostgreSQL Instance Log_disconnections Database Flag is not set to On 🟒1🟒 x6
πŸ“ Google Cloud PostgreSQL Instance Log_min_duration_statement Database Flag is not set to -1 (Disabled) 🟒1🟒 x6
πŸ“ Google Cloud PostgreSQL Instance Log_min_error_statement Database Flag is not set to Error or stricter 🟒1🟒 x6
πŸ“ Google Cloud PostgreSQL Instance Log_min_messages Database Flag is not set at minimum to Warning 🟒1🟒 x6
πŸ“ Google Cloud PostgreSQL Instance Log_statement Database Flag is not set appropriately 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance Automated Backups are not configured 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance External Authorized Networks do not whitelist all public IP addresses 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance has public IP addresses 🟒1🟒 x6
πŸ“ Google Cloud SQL Instance SSL Connections are not enforced 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance 3625 (trace flag) Database Flag is not set to on 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance contained database authentication Database Flag is set to on 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance cross db ownership chaining Database Flag is not set to off 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance external scripts enabled Database Flag is not set to off 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance remote access Database Flag is not set to off 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance user connections Database Flag is set to a limiting (other than 0) value 🟒1🟒 x6
πŸ“ Google Cloud SQL Server Instance user options Database Flag is configured 🟒1🟒 x6
πŸ“ Google Dataproc Cluster is not encrypted using Customer-Managed Encryption Key 🟒1🟒 x6
πŸ“ Google GCE Disk for critical VMs is not encrypted with Customer-Supplied Encryption Key (CSEK) 🟒1🟒 x6
πŸ“ Google GCE Instance Block Project-Wide SSH Keys is not enabled 🟒1🟒 x6
πŸ“ Google GCE Instance Confidential Compute is not enabled 🟒1🟒 x6
πŸ“ Google GCE Instance doesn't have the latest operating system updates installed 🟒🟒 x3
πŸ“ Google GCE Instance Enable Connecting to Serial Ports is not disabled 🟒1🟒 x6
πŸ“ Google GCE Instance has a public IP address 🟒1🟒 x6
πŸ“ Google GCE Instance is configured to use the Default Service Account 🟒1🟒 x6
πŸ“ Google GCE Instance is configured to use the Default Service Account with full access to all Cloud APIs 🟒1🟒 x6
πŸ“ Google GCE Instance is launched without Shielded VM enabled 🟒1🟒 x6
πŸ“ Google GCE Instance IP Forwarding is not disabled. 🟒1🟒 x6
πŸ“ Google GCE Instance OS Login is not enabled 🟒1🟒 x6
πŸ“ Google GCE Instance Should Have Breeze Agent Installed 🟒1🟒 x6
πŸ“ Google GCE Network DNS Policy Logging is not enabled 🟒1🟒 x6
πŸ“ Google GCE Network has Firewall Rules which allow unrestricted RDP access from the Internet 🟒1🟒 x6
πŸ“ Google GCE Network has Firewall Rules which allow unrestricted SSH access from the Internet 🟒1🟒 x6
πŸ“ Google GCE Subnetwork Flow Logs are not enabled 🟒1🟒 x6
πŸ“ Google HTTP(S) Load Balancer Logging is not enabled 🟒1🟒 x6
πŸ“ Google HTTPS or SSL Proxy Load Balancer permits SSL policies with weak cipher suites 🟒🟒 x3
πŸ“ Google IAM Roles related to KMS are not assigned to separate users 🟒1🟒 x6
πŸ“ Google IAM Service Account has admin privileges 🟒1🟒 x6
πŸ“ Google IAM Service Account has User-Managed Keys 🟒1🟒 x6
πŸ“ Google IAM Service Account User-Managed Key is not rotated every 90 days 🟒1🟒 x6
πŸ“ Google IAM Users are assigned the Service Account User or Service Account Token Creator roles at Project level 🟒1🟒 x6
πŸ“ Google Identity Aware Proxy (IAP) is not used to enforce access controls 🟒🟒 x3
πŸ“ Google KMS Crypto Key is anonymously or publicly accessible 🟠🟒🟠 x1, 🟒 x3
πŸ“ Google KMS Crypto Key is not rotated every 90 days 🟒1🟒 x6
πŸ“ Google Logging Log Metric Filter and Alerts Cloud Storage IAM Permission Changes do not exist 🟒1🟒 x6
πŸ“ Google Logging Log Metric Filter and Alerts for Audit Configuration Changes do not exist 🟒1🟒 x6
πŸ“ Google Logging Log Metric Filter and Alerts for Custom Role Changes do not exist 🟒1🟒 x6
πŸ“ Google Logging Log Metric Filter and Alerts for Project Ownership Assignments Changes do not exist 🟒1🟒 x6
πŸ“ Google Logging Log Metric Filter and Alerts for SQL Instance Configuration Changes do not exist 🟒1🟒 x6
πŸ“ Google Logging Log Metric Filter and Alerts for VPC Network Changes do not exist 🟒1🟒 x6
πŸ“ Google Logging Log Metric Filter and Alerts for VPC Network Firewall Rule Changes do not exist 🟒1🟒 x6
πŸ“ Google Logging Log Metric Filter and Alerts for VPC Network Route Changes do not exist 🟒1🟒 x6
πŸ“ Google Logging Log Sink exports logs to a Storage Bucket without Bucket Lock 🟒1🟒 x6
πŸ“ Google Logging Log Sink for All Log Entries is not configured 🟒1🟒 x6
πŸ“ Google Organization Administrator Security Key Enforcement is not enabled 🟒🟒 x3
πŸ“ Google Organization Essential Contacts is not configured 🟒1🟒 x6
πŸ“ Google Project has a default network 🟒1🟒 x6
πŸ“ Google Project has a legacy network 🟒1🟒 x6
πŸ“ Google Project has API Keys 🟒1🟠 x1, 🟒 x5
πŸ“ Google Storage Bucket is anonymously or publicly accessible 🟒1🟒 x6
πŸ“ Google Storage Bucket Uniform Bucket-Level Access is not enabled 🟒1🟒 x6
πŸ“ Google User has both Service Account Admin and Service Account User roles assigned 🟒1🟒 x6
πŸ“ Microsoft Cloud Security Benchmark policies are disabled 🟒🟒 x3
πŸ“ Microsoft Defender Agentless Container Vulnerability Assessment Component is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender Agentless Discovery for Kubernetes Component is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender Agentless Scanning for Machines Component is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender External Attack Surface Monitoring (EASM) is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender File Integrity Monitoring Component is not enabled 🟒🟒 x3
πŸ“ Microsoft Defender For Cloud Integration With Microsoft Defender For Cloud Apps is not enabled 🟒1🟒 x6
πŸ“ Microsoft Defender For Cloud Integration With Microsoft Defender For Endpoint is not enabled 🟒1🟒 x6
πŸ“ Microsoft Defender Recommendations for Apply System Updates are not completed 🟒🟒 x3
πŸ“ Microsoft Entra ID Account Lockout Duration is not set 60 seconds or more 🟒🟒 x3
πŸ“ Microsoft Entra ID Account Lockout Threshold is not set to 10 or less 🟒🟒 x3
πŸ“ Microsoft Entra ID Allow Users To Remember MFA On Devices They Trust is enabled 🟒🟒 x3
πŸ“ Microsoft Entra ID Conditional Access By Location is not defined 🟒🟒 x3
πŸ“ Microsoft Entra ID Custom Banned Password List is not enforced 🟒🟒 x3
πŸ“ Microsoft Entra ID Device Code Authentication Flow is not restricted 🟒🟒 x3
πŸ“ Microsoft Entra ID Global Administrator Role assigned to more than 4 users 🟒🟒 x3
πŸ“ Microsoft Entra ID Guest Invite Settings is not set to Only Users Assigned To Specific Admin Roles Can Invite Guest Users 🟒1🟒 x6
πŸ“ Microsoft Entra ID Guest Users are not reviewed on a regular basis 🟒🟒 x3
πŸ“ Microsoft Entra ID Guest Users restricted to their own directory objects 🟒1🟒 x6
πŸ“ Microsoft Entra ID MFA For Administrators is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID MFA For All Users is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID MFA For Risky Sign-Ins is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID MFA For Windows Azure Service Management API is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID MFA to access Microsoft Admin Portals is not required 🟒🟒 x3
πŸ“ Microsoft Entra ID Named Locations are not defined 🟒🟒 x3
πŸ“ Microsoft Entra ID Non-Privileged User Multi-Factor Auth Status is not enabled 🟒🟒 x3
πŸ“ Microsoft Entra ID Owners Can Manage Group Membership Requests In The Access Panel is set to Yes 🟒🟒 x3
πŸ“ Microsoft Entra ID Privileged User Multi-Factor Auth Status is not enabled 🟒🟒 x3
πŸ“ Microsoft Entra ID Require MFA To Register Or Join Devices With Microsoft Entra ID is set to No 🟒🟒 x3
πŸ“ Microsoft Entra ID Restrict User Ability To Access Groups Features In The Access Pane is set to No 🟒🟒 x3
πŸ“ Microsoft Entra ID Security Defaults are not enabled 🟒🟒 x3
πŸ“ Microsoft Entra ID Tenant Creation is set to Yes 🟒1🟒 x6
πŸ“ Microsoft Entra ID User Consent For Applications is not set to Allow From Verified Publishers 🟒🟒 x3
πŸ“ Microsoft Entra ID User Consent For Applications is not set to Do Not Allow User Consent 🟒🟒 x3
πŸ“ Microsoft Entra ID User Notify All Admins When Other Admins Reset Their Password is set No 🟒🟒 x3
πŸ“ Microsoft Entra ID User Notify Users On Password Resets is set to No 🟒🟒 x3
πŸ“ Microsoft Entra ID User Reconfirm Authentication Information is set to 0 🟒🟒 x3
πŸ“ Microsoft Entra ID User Self-Service Password Reset does not require 2 authentication methods 🟒🟒 x3
πŸ“ Microsoft Entra ID User Settings Restrict Access To Microsoft Entra Admin Center is set to No 🟒🟒 x3
πŸ“ Microsoft Entra ID Users Can Create Microsoft 365 Groups In Azure Portals, API Or PowerShell is set to Yes 🟒🟒 x3
πŸ“ Microsoft Entra ID Users Can Create Security Groups In Azure Portals, API Or PowerShell is set to Yes 🟒🟒 x3
πŸ“ Microsoft Entra ID Users Can Register Applications is set to Yes 🟒1🟒 x6
πŸ“ Mission-Critical Azure Resources do not use Resource Locks 🟒🟒 x3
πŸ“ Network Security Group Flow Logs are not captured and sent to Log Analytics Workspace 🟒🟒 x3
πŸ“ Physical Server Should Have Breeze Agent Installed 🟒1🟒 x6
πŸ“ Privileged Azure Virtual Machine is accessed by identities without MFA 🟒🟒 x3
πŸ“ Unattached Azure Managed Disk is not encrypted with Customer-managed key 🟒1🟒 x6
πŸ“ vCenter Virtual Machine Should Have Breeze Agent Installed 🟒1🟒 x6