Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

April 03 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.AS.33Ensure that Media Package Channel should have tagsLowNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.45Ensure that MediaLive Channel should have Log levelMediumNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.46Ensure that Username is set for AWS MediaLive Channel Output Destination SettingsHighNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.47Ensure that Password parameter is set for AWS MediaLive Channel Output Destination SettingsHighNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.48Ensure that MediaLive Input should have tagsLowNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.49Ensure that MediaLive Reservation should have tagsLowNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.50Ensure that MediaLive Input SecurityGroup should have tagsLowNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.51Ensure that MediaLive Input Security Groups do not implicitly whitelist all public IP addresses.HighNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.52Ensure that MediaPackage Channel should have tagsLowNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.53Ensure that ingress access logs is enabled for MediaPackage ChannelHighNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.54Ensure that egress access logs is enabled for MediaPackage ChannelHighNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.55Ensure that only successful MediaPackage Harvest jobs are availableLowNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.56Ensure that MediaPackage Origin Endpoint should have tagsLowNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.57Ensure that authorization is set for MediaPackage Origin EndpointHighNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.58Ensure that Amazon Elastic Transcoder Pipelines are encryptedHighNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.AS.59Ensure that a notification is configured for Amazon Elastic Transcoder PipelinesMediumNew
  • AWS HIPAA
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • AWS CSA CCM v4
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ENS 2022 Spain
  • AWS CMMC 2.0 v1.02
  • AWS NY DFS 23 CRR 500
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS NIST SP 800-172
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.GCP.VLN.04Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is not set to 'on'MediumModification
  • Name
  • Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is set to 'off'
  • Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is not set to 'on'
  • GCP CIS Foundations Benchmark v1.3.0
  • GCP CIS Foundations Benchmark v2.0.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Critical Security Controls v8
  • GCP ENS 2022 Spain
  • GCP RMiT Malaysia
  • GCP SOX (Section 404)
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP ISO 27002:2022
  • GCP CIS Foundations Benchmark v3.0.0
  • GCP SOC 2 (AICPA TSC 2017 Controls)
  • GCP HIPAA
  • GCP CIS Foundations Benchmark v1.1.0
  • GCP CIS Foundations Benchmark v1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.VLN.08Ensure '3625 (trace flag)' database flag for all Cloud SQL Server instances is set to 'on'MediumModification
  • Name
  • Ensure '3625 (trace flag)' database flag for Cloud SQL SQL Server instance is set to 'on'
  • Ensure '3625 (trace flag)' database flag for all Cloud SQL Server instances is set to 'on'
  • GCP CIS Foundations Benchmark v1.3.0
  • GCP NIST SP 800-53 R5
  • GCP CIS Foundations Benchmark v2.0.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Critical Security Controls v8
  • GCP ISO 27001:2022
  • GCP ENS 2022 Spain
  • GCP RMiT Malaysia
  • GCP FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP HITRUST CSF v11.2
  • GCP SOX (Section 404)
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP ISO 27002:2022
  • GCP CRI Profile v1.2
  • GCP CIS Foundations Benchmark v3.0.0
  • GCP NIST CSF v1.1
  • GCP SOC 2 (AICPA TSC 2017 Controls)
  • GCP HIPAA
  • GCP CIS Foundations Benchmark v1.2.0
  • GCP CloudGuard Best Practices
D9.AZU.IAM.46Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged UsersHighModification
  • Logic
  • User where assignedRoles with [displayName like '%admin%' or displayName like '%contributor%' or displayName like '%creator%' or displayName like '%manage%' or displayName like '%owner%'] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • User where assignmentRoles with [ roleName like '%owner%' or roleName like '%admin%' or roleName like '%contributor%' or roleName like '%creat%' or roleName like '%manage%' ] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • Azure Security Risk Management
  • Azure CIS Foundations Benchmark v1.5.0
  • Azure NIST SP 800-53 R5
  • Azure PCI DSS v4
  • Azure CIS Foundations Benchmark v2.0.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v4
  • CloudGuard Azure Default Ruleset
  • Azure ISO 27001:2022
  • Azure MLPS 2.0
  • Azure ENS 2022 Spain
  • Azure ASD Essential Eight
  • Azure CMMC 2.0 v1.02
  • Azure CRI Profile v1.2
  • Azure NIST SP 800-171 R2
  • Azure NY DFS 23 CRR 500
  • Azure RMiT Malaysia
  • Azure ACSC ISM
  • Azure CIS Critical Security Controls v8
  • Azure ISO 27017:2015
  • Azure SWIFT Customer Security Programme CSCF
  • Azure SOX (Section 404)
  • Azure Secure Controls Framework (SCF) v2023.1
  • Azure New Zealand ISM v3.6
  • Azure CIS Foundations Benchmark v2.1.0
  • Azure NIST CSF v1.1
  • Azure HIPAA
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
  • Azure Microsoft Cloud Security Benchmark (MCSB) v1
D9.AZU.IAM.47Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged UsersHighModification
  • Logic
  • User where assignedRoles isEmpty() or assignedRoles with [ displayName unlike '%admin%' and displayName unlike '%contributor%' and displayName unlike '%creator%' and displayName unlike '%manage%' and displayName unlike '%owner%' ] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • User where assignmentRoles isEmpty() or assignmentRoles with [ roleName unlike '%owner%' and roleName unlike '%admin%' and roleName unlike '%contributor%' and roleName unlike '%creat%' and roleName unlike '%manage%' ] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • Azure Security Risk Management
  • Azure CIS Foundations Benchmark v1.5.0
  • Azure NIST SP 800-53 R5
  • Azure PCI DSS v4
  • Azure CIS Foundations Benchmark v2.0.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v4
  • CloudGuard Azure Default Ruleset
  • Azure ASD Essential Eight
  • Azure CMMC 2.0 v1.02
  • Azure CRI Profile v1.2
  • Azure NIST SP 800-171 R2
  • Azure NY DFS 23 CRR 500
  • Azure RMiT Malaysia
  • Azure ACSC ISM
  • Azure CIS Critical Security Controls v8
  • Azure SWIFT Customer Security Programme CSCF
  • Azure SOX (Section 404)
  • Azure Secure Controls Framework (SCF) v2023.1
  • Azure New Zealand ISM v3.6
  • Azure CIS Foundations Benchmark v2.1.0
  • Azure NIST CSF v1.1
  • Azure HIPAA
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
  • Azure Microsoft Cloud Security Benchmark (MCSB) v1
D9.AWS.IAM.59Ensure that VPC Endpoint policy does not provide excessive permissionsHighModification
  • Logic
  • VpcEndpoint should not have policy.Statement contain [Effect='Allow' and (Action = '*' or Action contain ['%s3:*%'] or Action contain ['%dynamodb:*%'] )]
  • VpcEndpoint should have policy.Statement contain-none [ ( (not Principal) or Principal='*') and Effect='Allow' ] and policy.Statement contain-none [ Effect='Allow' and (Action = '*' or Action contain ['%s3:*%'] or Action contain ['%dynamodb:*%'] ) ]
  • AWS NIST SP 800-53 R5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI DSS v4
  • AWS HITRUST CSF v11.0
  • AWS CIS Critical Security Controls v8
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO 27001:2022
  • AWS APRA 234
  • AWS ENS 2022 Spain
  • AWS MLPS 2.0
  • AWS CMMC 2.0 v1.02
  • AWS CRI Profile v1.2
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS RMiT Malaysia
  • AWS ACSC ISM
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS ISO 27002:2022
  • AWS NIST CSF v1.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
  • AWS CloudGuard Best Practices
  • AWS HITRUST CSF v9.2
  • AWS ITSG-33 Canada
  • AWS MITRE ATT&CK Framework v10
D9.AWS.NET.1029Ensure no security group allows unrestricted inbound access to TCP etcd port (2379)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1030Ensure no security group allows unrestricted inbound access to TCP CouchDB port (5984)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1031Ensure no security group allows unrestricted inbound access to TCP Kibana port (5601)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1032Ensure no security group allows unrestricted inbound access to TCP LDAP port (389)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1033Ensure no security group allows unrestricted inbound access to TCP MaxDB port (7210)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1034Ensure no security group allows unrestricted inbound access to TCP MSSQL port (1434)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1035Ensure no security group allows unrestricted inbound access to TCP NFS port (2049)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1036Ensure no security group allows unrestricted inbound access to TCP SQL Analysis Services port (2383)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1037Ensure no security group allows unrestricted inbound access to TCP VNC port (5500)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1038Ensure no security group allows unrestricted inbound access to TCP/UDP ArangoDB port (8529)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1039Ensure no security group allows unrestricted inbound access to TCP/UDP Mini SQL port (4333)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1040Ensure no security group allows unrestricted inbound access to TCP/UDP POP3 ports (110,995)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1041Ensure no security group allows unrestricted inbound access to TCP Cassandra ports (7000, 7001, 7199, 9042, 9142, 9160)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1042Ensure no security group allows unrestricted inbound access to TCP ElasticSearch ports (9200, 9300)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1043Ensure no security group allows unrestricted inbound access to TCP MongoDB ports (27017-27020)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1044Ensure no security group allows unrestricted inbound access to TCP Oracle DB ports (1521, 1830, 2483, 8098)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1045Ensure no security group allows unrestricted inbound access to TCP Riak ports (8087, 8098)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1046Ensure no security group allows unrestricted inbound access to TCP Solr ports (7574, 8983)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
D9.AWS.NET.1047Ensure no security group allows unrestricted inbound access to TCP VNC ports (5800, 5900)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1048Ensure no security group allows unrestricted inbound access to TCP RethinkDB ports (8080, 28015, 29015) or UDP ports (28015, 29015)HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.AWS.NET.1049Ensure no security group allows unrestricted inbound access to TCP Neo4J ports (7473, 7474), or UDP port (7473) HighNew
  • AWS NIST SP 800-53 R5
  • AWS PCI DSS v4
  • CloudGuard AWS All Rules Ruleset
  • AWS CMMC 2.0 v1.02
  • AWS NIST SP 800-171 R2
  • AWS New Zealand ISM v3.6
  • AWS FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS SOC 2 (AICPA TSC 2017 Controls)
D9.GCP.LOG.31Ensure Logging is enabled for HTTP(S) Load BalancerLowModification
  • Name
  • Ensure that logging is enabled for Google Cloud load balancing backend services
  • Ensure Logging is enabled for HTTP(S) Load Balancer
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Critical Security Controls v8
  • GCP ISO 27001:2022
  • GCP APRA 234
  • GCP CSA CCM v4
  • GCP ACSC ISM
  • GCP SOX (Section 404)
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP CRI Profile v1.2
  • GCP New Zealand ISM v3.6
  • GCP CIS Foundations Benchmark v3.0.0
  • GCP HIPAA
D9.GCP.MON.06Ensure that only usable Instances are available in BigTableLowNew
  • GCP NIST SP 800-53 R5
  • GCP PCI DSS v4
  • CloudGuard GCP All Rules Ruleset
  • GCP CSA CCM v4
  • GCP ENS 2022 Spain
  • GCP ACSC ISM
  • GCP ISO 27017:2015
  • GCP SWIFT Customer Security Programme CSCF
  • GCP Secure Controls Framework (SCF) v2023.1
  • GCP ASD Essential Eight
D9.AWS.VLN.08Ensure Lambda Functions are Not Using Deprecated RuntimeHighModification
  • Name
  • Ensure Lambda functions are not using deprecated runtimes
  • Ensure Lambda Functions are Not Using Deprecated Runtime
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP)
  • AWS APRA 234
  • AWS ACSC ISM
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS CloudGuard Best Practices
D9.GCP.AS.18Ensure that only operational Firebase Realtime Databases are available.LowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.MON.04Ensure that Split Health Check is enabled for App Engine servicesMediumNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.MON.05Enable Identity-Aware Proxy (IAP) for App Engine ServicesHighNew
  • CloudGuard GCP All Rules Ruleset

March 27 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.MON.107Ensure that Azure Network Watcher is EnabledLowNew
  • Azure CIS Foundations Benchmark v1.4.0
  • Azure CIS Foundations Benchmark v1.5.0
  • Azure NIST SP 800-53 R5
  • Azure CIS Foundations Benchmark v2.0.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v4
  • Azure ISO 27001:2022
  • Azure ENS 2022 Spain
  • Azure CMMC 2.0 v1.02
  • Azure NIST SP 800-171 R2
  • Azure RMiT Malaysia
  • Azure CIS Critical Security Controls v8
  • Azure FedRAMP R5 (moderate)
  • Azure SOX (Section 404)
  • Azure Secure Controls Framework (SCF) v2023.1
  • Azure ISO 27002:2022
  • Azure New Zealand ISM v3.6
  • Azure CIS Foundations Benchmark v2.1.0
  • Azure SOC 2 (AICPA TSC 2017 Controls)
  • Azure HIPAA
  • Azure CIS Foundations Benchmark v1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations Benchmark v1.2.0
  • Azure CIS Foundations Benchmark v1.3.0
  • Azure HITRUST CSF v9.5
  • Azure CIS Foundations Benchmark v1.3.1
D9.AWS.CRY.38Ensure to update the Security Policy of the Network Load BalancerHighModification
  • Logic
  • NetworkLoadBalancer where listeners contain [ protocol='TLS' ] should have listeners contain [securityPolicy in('ELBSecurityPolicy-TLS13-1-2-2021-06', 'ELBSecurityPolicy-TLS13-1-2-FIPS-2023­-04')]
  • NetworkLoadBalancer where listeners contain [ protocol='TLS' ] should have listeners contain [securityPolicy in('ELBSecurityPolicy-TLS13-1-2-2021-06', 'ELBSecurityPolicy-TLS13-1-2-FIPS-2023-04')]
  • AWS NIST SP 800-53 R5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST CSF v11.0
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS ACSC ISM
  • AWS NIST SP 800-172
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS Well-Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM
  • AWS HITRUST CSF v9.2
  • AWS ITSG-33 Canada
  • AWS MITRE ATT&CK Framework v10
D9.ALI.CRY.10Ensure that Automatic Rotation is Enabled for KMSHighModification
  • Name
  • Ensure that Automatic Rotation is enabled for KMS
  • Ensure that Automatic Rotation is Enabled for KMS
  • CloudGuard Alibaba All Rules Ruleset
D9.AZU.NET.28Ensure that Network Watcher is 'Enabled'LowRemoval
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure ISO 27001:2022
  • Azure Esquema Nacional Seguridad (ENS) 2022
  • Azure Cybersecurity Maturity Model Certification (CMMC) 2.0
  • Azure NIST Special Publication 800-171 (Rev. 2)
  • Azure Risk Management in Technology (RMiT)
  • Azure CIS Critical Security Controls v8
  • Azure US FedRAMP R5 (moderate)
  • Azure U.S. Sarbanes-Oxley Act (Section 404)
  • Azure Secure Controls Framework (SCF)
  • Azure ISO 27002:2022
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure CIS Foundations v. 1.3.1

...