Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 231 Next »

March 27 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.MON.107Ensure that Azure Network Watcher is EnabledLowNew
  • Azure CIS Foundations Benchmark v1.4.0
  • Azure CIS Foundations Benchmark v1.5.0
  • Azure NIST SP 800-53 R5
  • Azure CIS Foundations Benchmark v2.0.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v4
  • Azure ISO 27001:2022
  • Azure ENS 2022 Spain
  • Azure CMMC 2.0 v1.02
  • Azure NIST SP 800-171 R2
  • Azure RMiT Malaysia
  • Azure CIS Critical Security Controls v8
  • Azure FedRAMP R5 (moderate)
  • Azure SOX (Section 404)
  • Azure Secure Controls Framework (SCF) v2023.1
  • Azure ISO 27002:2022
  • Azure New Zealand ISM v3.6
  • Azure CIS Foundations Benchmark v2.1.0
  • Azure SOC 2 (AICPA TSC 2017 Controls)
  • Azure HIPAA
  • Azure CIS Foundations Benchmark v1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations Benchmark v1.2.0
  • Azure CIS Foundations Benchmark v1.3.0
  • Azure HITRUST CSF v9.5
  • Azure CIS Foundations Benchmark v1.3.1
D9.AWS.CRY.38Ensure to update the Security Policy of the Network Load BalancerHighModification
  • Logic
  • NetworkLoadBalancer where listeners contain [ protocol='TLS' ] should have listeners contain [securityPolicy in('ELBSecurityPolicy-TLS13-1-2-2021-06', 'ELBSecurityPolicy-TLS13-1-2-FIPS-2023­-04')]
  • NetworkLoadBalancer where listeners contain [ protocol='TLS' ] should have listeners contain [securityPolicy in('ELBSecurityPolicy-TLS13-1-2-2021-06', 'ELBSecurityPolicy-TLS13-1-2-FIPS-2023-04')]
  • AWS NIST SP 800-53 R5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST CSF v11.0
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS ACSC ISM
  • AWS NIST SP 800-172
  • AWS SOX (Section 404)
  • AWS Secure Controls Framework (SCF) v2023.1
  • AWS Well-Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM
  • AWS HITRUST CSF v9.2
  • AWS ITSG-33 Canada
  • AWS MITRE ATT&CK Framework v10
D9.ALI.CRY.10Ensure that Automatic Rotation is Enabled for KMSHighModification
  • Name
  • Ensure that Automatic Rotation is enabled for KMS
  • Ensure that Automatic Rotation is Enabled for KMS
  • CloudGuard Alibaba All Rules Ruleset
D9.AZU.NET.28Ensure that Network Watcher is 'Enabled'LowRemoval
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure ISO 27001:2022
  • Azure Esquema Nacional Seguridad (ENS) 2022
  • Azure Cybersecurity Maturity Model Certification (CMMC) 2.0
  • Azure NIST Special Publication 800-171 (Rev. 2)
  • Azure Risk Management in Technology (RMiT)
  • Azure CIS Critical Security Controls v8
  • Azure US FedRAMP R5 (moderate)
  • Azure U.S. Sarbanes-Oxley Act (Section 404)
  • Azure Secure Controls Framework (SCF)
  • Azure ISO 27002:2022
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure CIS Foundations v. 1.3.1

March 20 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.AS.44Ensure Resource Access Manager customer managed permissions should have tagsInformationalNew
  • AWS Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS NY Department of Financial Services (DFS) 23 CRR 500
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS U.S. Sarbanes-Oxley Act (Section 404)
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS NIST Cybersecurity Framework (CSF) v1.1
D9.AWS.DR.17Ensure AWS Elastic Block Store (EBS) volumes have recent snapshots available for point-in-time recoveryHighModification
  • Logic
  • EbsSnapshot should not have createTime before(-7, 'days')
  • Volume should have getResources('EbsSnapshot') contain [$.createTime after(-7, 'days') and $.volumeId = ~.volumeId]
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS US FedRAMP R5 (moderate)
  • AWS U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS U.S. Sarbanes-Oxley Act (Section 404)
  • AWS Secure Controls Framework (SCF)
  • AWS NIST Cybersecurity Framework (CSF) v1.1
D9.AWS.DR.19Ensure that Lightsail Relational Database has a recent snapshotHighModification
  • Logic
  • LightsailRelationalDatabase should have latestRestorableTime before(7, 'days')
  • LightsailRelationalDatabase should have latestRestorableTime after(-7, 'days')
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • CloudGuard AWS All Rules Ruleset
  • AWS US FedRAMP R5 (moderate)
  • AWS U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS U.S. Sarbanes-Oxley Act (Section 404)
  • AWS Secure Controls Framework (SCF)
  • AWS NIST Cybersecurity Framework (CSF) v1.1
D9.AWS.LOG.58Ensure that Access Logging should be enabled for AWS Elemental MediaStore ContainerMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.152Ensure that AWS Elemental MediaStore Container should be ACTIVELowNew
  • CloudGuard AWS All Rules Ruleset
D9.GCP.OPE.29Ensure that only usable Instance are available in FilestoreLowNew
  • CloudGuard GCP All Rules Ruleset
D9.ALI.CRY.08Ensure Apsara File Storage NAS are encryptedHighNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.CRY.09Ensure Apsara File Storage NAS should have Encryption Type selectedHighNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.CRY.10Ensure that Automatic Rotation is enabled for KMSHighNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.CRY.11Ensure that Deletion Protection is Enabled for KMSHighNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.CRY.12Ensure only usable Keys are in the KMSLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.OPE.03Ensure that Apsara File Storage NAS should have tagsLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.OCI.AS.08Ensure that a newly created region subscription's status is readyInformationalNew
  • CloudGuard OCI All Rules Ruleset
D9.K8S.IA.UN.5Container Image – ScanSummaryCriticalNew
  • Workload Vulnerability 2.0 with ScanSummary rule
D9.AWS.OPE.131Ensure Resource Access Manager customer managed permissions should have tagsInformationalRemoval
  • AWS Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS NY Department of Financial Services (DFS) 23 CRR 500
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS U.S. Sarbanes-Oxley Act (Section 404)
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS NIST Cybersecurity Framework (CSF) v1.1

March 13 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.GCP.CRY.01Ensure VM Disks for Critical VMs Are Encrypted With Customer-Supplied Encryption Keys (CSEK)MediumModification
  • Severity
  • High
  • Medium
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP LGPD regulation
  • GCP NIST Special Publication 800-53 (Rev. 5)
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Critical Security Controls v8
  • GCP CIS Foundations v. 1.0.0
  • GCP ISO 27001:2022
  • GCP APRA 234
  • GCP Cloud Security Alliance CCM v4
  • GCP Esquema Nacional Seguridad (ENS) 2022
  • GCP Risk Management in Technology (RMiT)
  • GCP Australian Cyber Security Centre (ACSC) Information Security Manual
  • GCP US FedRAMP R5 (moderate)
  • GCP ISO 27017:2015
  • GCP SWIFT Customer Security Programme CSCF
  • GCP NIST Special Publication 800-172
  • GCP U.S. Sarbanes-Oxley Act (Section 404)
  • GCP PCI-DSS 3.2
  • GCP Secure Controls Framework (SCF)
  • GCP ISO 27002:2022
  • GCP Cybersecurity Maturity Model Certification (CMMC) 2.0
  • GCP NIST Special Publication 800-171 (Rev. 2)
  • GCP NIST 800-53 Rev 4
  • GCP NY Department of Financial Services (DFS) 23 CRR 500
  • GCP New Zealand Information Security Manual (NZ ISM) v3.6
  • GCP ISO 27001:2013
  • GCP NIST Cybersecurity Framework (CSF) v1.1
  • GCP CloudGuard SOC2 based on AICPA TSC 2017
  • GCP Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • GCP Dashboard System Ruleset
  • GCP EU GDPR
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.AWS.IAM.190Ensure that Authorization Type in AWS Kafka Connect Connector is not set to NoneHighModification
  • Logic
  • MSKConnectConnector should not have kafkaClusterClientAuthentication.authenticationType.value!='None'
  • MSKConnectConnector should not have kafkaClusterClientAuthentication.authenticationType.value='None'
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.142Ensure that AppFlow should have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.143Ensure that MediaStoreContainer should have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.144Ensure that DataSyncStorage should have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.145Ensure that CloudTrail should have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.148Ensure that EksCluster should have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.149Ensure AWS Verified Access should have FIPS status enabledHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.150Ensure AWS Verified Access should have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.GCP.NET.80Cloud Armor Security Policy Default Rule Action should be 'Deny'HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.21Ensure that DnsManagedZone should have tagsLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.22Ensure that PubSubTopic should have tagsLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.23Ensure that VMInstance should have tagsLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.24Ensure that Filestore Instance should have tagsLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.25Ensure that DataprocCluster should have tagsLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.26Ensure that Secret should have tagsLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.27Ensure that Disk should have tagsLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.28Ensure that 'Disable Automatic IAM Grants for Default Service Accounts' policy is enforced for Google Cloud Platform (GCP) organizationsMediumNew
  • CloudGuard GCP All Rules Ruleset
D9.ALI.OPE.01Ensure that Auto Scaling Group should have Deletion Protection enabledLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.OPE.02Ensure Auto Scaling group have scaling cooldown higher than a minuteLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.OCI.OPE.05Ensure that Tenancy should have defined tagsLowNew
  • CloudGuard OCI All Rules Ruleset

March 06 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.LOG.14Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests in Monitoring (classic)LowModification
  • Name
  • Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests
  • Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests in Monitoring (classic)
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure Esquema Nacional Seguridad (ENS) 2022
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure U.S. Sarbanes-Oxley Act (Section 404)
  • Azure Secure Controls Framework (SCF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.LOG.15Ensure Storage logging is Enabled for Blob Service for 'Read', 'Write', and 'Delete' requests in Monitoring (classic)LowModification
  • Name
  • Ensure Storage logging is Enabled for Blob Service for 'Read', 'Write', and 'Delete' requests
  • Ensure Storage logging is Enabled for Blob Service for 'Read', 'Write', and 'Delete' requests in Monitoring (classic)
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure Esquema Nacional Seguridad (ENS) 2022
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure U.S. Sarbanes-Oxley Act (Section 404)
  • Azure Secure Controls Framework (SCF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.LOG.16Ensure Storage Logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' Requests in Monitoring (classic)LowModification
  • Name
  • Ensure Storage Logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' Requests
  • Ensure Storage Logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' Requests in Monitoring (classic)
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure Esquema Nacional Seguridad (ENS) 2022
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure U.S. Sarbanes-Oxley Act (Section 404)
  • Azure Secure Controls Framework (SCF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1

February 28 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.LOG.16Ensure Storage Logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' RequestsLowModification
  • Logic
  • StorageAccount should have tableServiceProperties.classicDiagnosticSettings.logging.read=true and tableServiceProperties.classicDiagnosticSettings.logging.write=true and blobServiceProperties.classicDiagnosticSettings.logging.delete=true
  • StorageAccount should have tableServiceProperties.classicDiagnosticSettings.logging.read=true and tableServiceProperties.classicDiagnosticSettings.logging.write=true and tableServiceProperties.classicDiagnosticSettings.logging.delete=true
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure Esquema Nacional Seguridad (ENS) 2022
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure U.S. Sarbanes-Oxley Act (Section 404)
  • Azure Secure Controls Framework (SCF)
  • Azure CIS Foundations v.2.1.0
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AWS.CRY.38Ensure to update the Security Policy of the Network Load BalancerHighModification
  • Logic
  • NetworkLoadBalancer should have listeners contain [securityPolicy in('ELBSecurityPolicy-2016-08', 'ELBSecurityPolicy-FS-2018-06', 'ELBSecurityPolicy-TLS13-1-2-Ext1-2021-06', 'ELBSecurityPolicy-TLS13-1-2-2021-06') ]
  • NetworkLoadBalancer where listeners contain [ protocol='TLS' ] should have listeners contain [securityPolicy in('ELBSecurityPolicy-TLS13-1-2-2021-06', 'ELBSecurityPolicy-TLS13-1-2-FIPS-2023­-04')]
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS NIST Special Publication 800-172
  • AWS U.S. Sarbanes-Oxley Act (Section 404)
  • AWS Secure Controls Framework (SCF)
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AZU.NET.35Ensure Application Gateway is using the latest version of TLS encryptionHighModification
  • Logic
  • ApplicationGateway should have sslPolicy.minProtocolVersion='1.2'
  • ApplicationGateway should have sslPolicy.minProtocolVersion='TLSv1_2'
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure ISO 27001:2022
  • Azure Esquema Nacional Seguridad (ENS) 2022
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure US FedRAMP R5 (moderate)
  • Azure U.S. Sarbanes-Oxley Act (Section 404)
  • Azure Secure Controls Framework (SCF)
  • Azure ISO 27002:2022
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure Health Insurance Portability and Accountability Act (U.S. HIPAA)
  • Azure CloudGuard Best Practices
  • Azure HITRUST v9.5.0
D9.AWS.IAM.190Ensure that Authorization Type in AWS Kafka Connect Connector is not set to NoneHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.141Ensure that the AWS Kafka Connect Connector is in a Healthy StateLowNew
  • CloudGuard AWS All Rules Ruleset
D9.GCP.CRY.24Ensure Vertex AI Notebook Instance Have Integrity Monitoring EnabledLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.CRY.26Ensure That Vertex AI Notebook Instance is encrypted with Customer-Managed Encryption Key (CMEK)HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.77Ensure GCP Vertex AI Notebook Instance secure boot feature is EnabledHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.78Ensure GCP Vertex AI Notebook Instance vTPM feature is enabledLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.79Ensure Firestore Database delete protection enabledHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.17Ensure that Vertex AI Notebook Instance has tagsLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.18Ensure that Vertex AI Notebook Instance status is healthyHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.19Ensure that Vertex AI Notebook Runtime has tagsLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.20Ensure that Vertex AI Notebook Runtime status is healthyHighNew
  • CloudGuard GCP All Rules Ruleset

February 21 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.127Ensure Athena Workgroups should be Encrypted at RestHighModification
  • Name
  • Logic
  • Ensure Athena workgroups should be encrypted at rest
  • AthenaWorkGroup should not have configuration.resultConfiguration.encryptionConfiguration.encryptionOption isEmpty()
  • Ensure Athena Workgroups should be Encrypted at Rest
  • AthenaWorkGroup where configuration.resultConfiguration.outputLocation isEmpty()=false should not have configuration.resultConfiguration.encryptionConfiguration.encryptionOption isEmpty()
  • AWS Health Insurance Portability and Accountability Act (U. S. HIPAA)
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS APRA 234
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS NY Department of Financial Services (DFS) 23 CRR 500
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP R5 (moderate)
  • AWS ISO 27017:2015
  • AWS U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS NIST Cybersecurity Framework (CSF)
D9.AZU.CRY.18Ensure that 'OS and Data' disks are encrypted with Customer Managed Key (CMK)HighModification
  • Logic
  • VirtualMachine should have (disks contain [getResource('Disk',name,'name') contain [properties.encryptionSettingsCollection.enabled=true]])
  • VirtualMachine should have disks contain [ sseType='EncryptionAtRestWithCustomerKey' ]
  • Azure CloudGuard CheckUp
  • Azure CIS Foundations v. 1.4.0
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • CIS Microsoft Azure Compute Services Benchmark v1.0.0
  • Azure APRA 234
  • AZURE MLPS 2.0
  • Azure Cybersecurity Maturity Model Certification (CMMC) 2.0
  • Azure NIST Special Publication 800-171 (Rev. 2)
  • Azure NY Department of Financial Services (DFS) 23 CRR 500
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure US FedRAMP R5 (moderate)
  • Azure ISO 27017:2015
  • Azure U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • Azure Secure Controls Framework (SCF)
  • Azure ISO 27002:2022
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure EU General Data Protection Regulation (GDPR)
  • Azure NIST Cybersecurity Framework (CSF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure Health Insurance Portability and Accountability Act (U. S. HIPAA)
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.16Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key (CMK)LowModification
  • Name
  • Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key
  • Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key (CMK)
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure Australian Signals Directorate (ASD) Essential Eight
  • Azure Cybersecurity Maturity Model Certification (CMMC) 2.0
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure NIST Special Publication 800-171 (Rev. 2)
  • Azure Risk Management in Technology (RMiT)
  • Azure CIS Critical Security Controls v8
  • Azure US FedRAMP R5 (moderate)
  • Azure ISO 27017:2015
  • Azure Secure Controls Framework (SCF)
  • Azure ISO 27002:2022
  • Azure CIS Foundations v.2.1.0
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.27Ensure Storage for Critical Data are Encrypted with Customer Managed Keys (CMK)LowModification
  • Name
  • Ensure Storage for Critical Data are Encrypted with Customer Managed Keys
  • Ensure Storage for Critical Data are Encrypted with Customer Managed Keys (CMK)
  • Azure CIS Foundations v. 1.4.0
  • Azure LGPD regulation
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure CIS Foundations v. 1.0.0
  • Azure Esquema Nacional Seguridad (ENS) 2022
  • Azure NIST Special Publication 800-171 (Rev. 2)
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure PCI-DSS 3.2
  • Azure NIST 800-53 Rev 4
  • Azure Secure Controls Framework (SCF)
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure CSA CCM v.3.0.1
  • Azure ISO 27001:2013
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure Health Insurance Portability and Accountability Act (U. S. HIPAA)
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure New Zealand Information Security Manual (NZISM) v.3.4
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.33Ensure 'TLS Version' is set to 'TLSV1.2' (or higher) for MySQL flexible Database ServerHighModification
  • Name
  • Ensure 'TLS Version' is set to 'TLSV1.2' for MySQL flexible Database Server
  • Ensure 'TLS Version' is set to 'TLSV1.2' (or higher) for MySQL flexible Database Server
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure Risk Management in Technology (RMiT)
  • Azure CIS Critical Security Controls v8
  • Azure US FedRAMP R5 (moderate)
  • Azure Secure Controls Framework (SCF)
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
D9.AZU.CRY.39Ensure that Storage Account Access Keys are Periodically RegeneratedHighModification
  • Name
  • Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported Services
  • Ensure that Storage Account Access Keys are Periodically Regenerated
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure ISO 27001:2022
  • Azure Esquema Nacional Seguridad (ENS) 2022
  • Azure Australian Signals Directorate (ASD) Essential Eight
  • Azure Cybersecurity Maturity Model Certification (CMMC) 2.0
  • Azure NIST Special Publication 800-171 (Rev. 2)
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure US FedRAMP R5 (moderate)
  • Azure ISO 27017:2015
  • Azure SWIFT Customer Security Programme CSCF
  • Azure U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • Azure NIST Special Publication 800-172
  • Azure Secure Controls Framework (SCF)
  • Azure ISO 27002:2022
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure NIST Cybersecurity Framework (CSF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.IAM.38Ensure Security Defaults is enabled on Microsoft Entra IDHighModification
  • Name
  • Ensure Security Defaults is enabled on Azure Active Directory
  • Ensure Security Defaults is enabled on Microsoft Entra ID
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure Australian Signals Directorate (ASD) Essential Eight
  • Azure Cybersecurity Maturity Model Certification (CMMC) 2.0
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure NIST Special Publication 800-171 (Rev. 2)
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure US FedRAMP R5 (moderate)
  • Azure ISO 27017:2015
  • Azure SWIFT Customer Security Programme CSCF
  • Azure U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • Azure NIST Special Publication 800-172
  • Azure Secure Controls Framework (SCF)
  • Azure ISO 27002:2022
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure NIST Cybersecurity Framework (CSF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.67Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To 'On'HighModification
  • Name
  • Ensure That Microsoft Defender for Azure SQL Databases Is Set To 'On'
  • Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To 'On'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure SWIFT Customer Security Programme CSCF
  • Azure U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • Azure Secure Controls Framework (SCF)
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure NIST Cybersecurity Framework (CSF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.IAM.47Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged UsersHighModification
  • Logic
  • User where assignedRoles with [displayName unlike '%admin%' and displayName unlike '%contributor%' and displayName unlike '%creator%' and displayName unlike '%manage%' and displayName unlike '%owner%'] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • User where assignedRoles isEmpty() or assignedRoles with [ displayName unlike '%admin%' and displayName unlike '%contributor%' and displayName unlike '%creator%' and displayName unlike '%manage%' and displayName unlike '%owner%' ] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • CloudGuard Azure Default Ruleset
  • Azure Australian Signals Directorate (ASD) Essential Eight
  • Azure Cybersecurity Maturity Model Certification (CMMC) 2.0
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure NIST Special Publication 800-171 (Rev. 2)
  • Azure NY Department of Financial Services (DFS) 23 CRR 500
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure SWIFT Customer Security Programme CSCF
  • Azure Secure Controls Framework (SCF)
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure NIST Cybersecurity Framework (CSF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
D9.AZU.MON.79[LEGACY] Ensure That Microsoft Defender for DNS Is Set To 'On'HighModification
  • Name
  • Ensure That Microsoft Defender for DNS Is Set To 'On'
  • [LEGACY] Ensure That Microsoft Defender for DNS Is Set To 'On'
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • AZURE MLPS 2.0
  • Azure Cyber Risk Institute (CRI) Profile
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure SWIFT Customer Security Programme CSCF
  • Azure U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • Azure Secure Controls Framework (SCF)
  • Azure New Zealand Information Security Manual (NZ ISM) v3.6
  • Azure CIS Foundations v.2.1.0
  • Azure NIST Cybersecurity Framework (CSF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
D9.AWS.NET.05Ensure no security groups allow unrestricted ingress (from either IPv4 or IPv6 source IP addresses) to commonly used remote server administration portsCriticalNew
  • CloudGuard AWS All Rules Ruleset

February 14 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.NET.66Ensure that 'Public access level' is Disabled for Storage Accounts with Blob ContainersCriticalModification
  • Name
  • Logic
  • Ensure Public (Anonymous) Access is disabled for Microsoft Azure Storage Accounts
  • StorageAccount should have allowBlobPublicAccess=false and publicNetworkAccessAsDisplayedInPortal like 'Disabled'
  • Ensure that 'Public access level' is Disabled for Storage Accounts with Blob Containers
  • StorageAccount should have publicNetworkAccessAsDisplayedInPortal like 'Disabled'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • CloudGuard Azure Default Ruleset
  • Azure Cybersecurity Maturity Model Certification (CMMC) 2.0
  • Azure Cyber Risk Institute Profile
  • Azure Risk Management in Technology (RMiT)
  • Azure Australian Cyber Security Centre (ACSC) Information Security Manual
  • Azure CIS Critical Security Controls v8
  • Azure NIST Special Publication 800-172
  • Azure Secure Controls Framework (SCF)
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
D9.AWS.IAM.175Ensure that Multi-Factor Authentication is Enabled for All IAM UsersHighModification
  • Name
  • MFA should be Active for All IAM Users
  • Ensure that Multi-Factor Authentication is Enabled for All IAM Users
  • AWS Security Risk Management
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard AWS All Rules Ruleset
  • AWS Australian Signals Directorate (ASD) Essential Eight
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS NY Department of Financial Services (DFS) 23 CRR 500
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS SWIFT Customer Security Programme CSCF
  • AWS Secure Controls Framework (SCF)
  • AWS NIST Cybersecurity Framework (CSF)
  • AWS Dashboard System Ruleset
D9.AWS.IAM.154Ensure that Lambda functions should not have IAM roles with permissions for destructive actions on Amazon RDS databasesHighModification
  • Logic
  • Lambda should not have roles contain [ combinedPolicies contain [ policyDocument.Statement contain [ Action contain [ $ in( 'rds:DeleteDBInstance', 'rds:DeleteDBSnapshot', 'rds:DeleteDBClusterSnapshot', 'rds:DeleteGlobalCluster' ) ] ] ] ]
  • Lambda should not have executionRole.combinedPolicies contain [ policyDocument.Statement contain [ Action contain [ $ in( 'rds:DeleteDBInstance', 'rds:DeleteDBSnapshot', 'rds:DeleteDBClusterSnapshot', 'rds:DeleteGlobalCluster' ) ] ] ]
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS Australian Signals Directorate (ASD) Essential Eight
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS NIST Cybersecurity Framework (CSF)
D9.AWS.IAM.157 Ensure that AWS Lambda function should not have org write access levelHighModification
  • Logic
  • Lambda should not have roles contain [ combinedPolicies contain [ policyDocument.Statement contain [ Action contain [ $ in($AWS_Org_Write_Permissions) ] ] ] ]
  • Lambda should not have executionRole.combinedPolicies contain [ policyDocument.Statement contain [ Action contain [ $ in($AWS_Org_Write_Permissions) ] ] ]
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard AWS All Rules Ruleset
  • AWS Australian Signals Directorate (ASD) Essential Eight
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS NIST Cybersecurity Framework (CSF)
D9.AWS.IAM.158Ensure that AWS Lambda function should not have IAM write access levelHighModification
  • Logic
  • Lambda should not have roles contain [ combinedPolicies contain [ policyDocument.Statement contain [ Action contain [ $ in($AWS_IAM_Write_Permissions) ] ] ] ]
  • Lambda should not have executionRole.combinedPolicies contain [ policyDocument.Statement contain [ Action contain [ $ in($AWS_IAM_Write_Permissions) ] ] ]
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS Australian Signals Directorate (ASD) Essential Eight
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS NIST Cybersecurity Framework (CSF)
D9.AWS.IAM.167Ensure that AWS Lambda IAM policy should not be overly permissive to all trafficHighModification
  • Logic
  • Lambda should not have roles contain [ combinedPolicies contain [ policyDocument.Statement contain [ Effect='Allow' and Action ='*' ] ] ]
  • Lambda should not have executionRole.combinedPolicies contain [ policyDocument.Statement contain [ Effect='Allow' and Action contain ['*'] ] ]
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS Australian Signals Directorate (ASD) Essential Eight
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS NIST Cybersecurity Framework (CSF)
D9.AWS.VLN.16Ensure that Shield Advanced is in UseHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.AS.18Ensure that a Virtual WAN P2s VPN Gateway has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.AS.20Ensure that VMware Solution has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.84Ensure that Azure VMware Solution has encryption enabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.73Ensure Anonymous Access is Not Turned On for Blob Containers in Microsoft Azure Storage AccountsHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.114Ensure that all Virtual WAN P2s VPN Gateway Connection Configurations have Internet Security enabledHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.65Ensure that DevTest Lab has TagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.69Ensure that a Virtual WAN P2s VPN Gateway is not in a 'Failed' stateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.70Ensure that all Virtual WAN P2s VPN Gateway Connection Configurations are not in a 'Failed' stateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.76Ensure that VMware Solution's status is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.77Ensure that Virtual WAN VPN Server has TagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.78Ensure that Provisioning Status of Configuration Policy Group for Virtual WAN VPN Server is not FailedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.79Ensure that P2S VPN Gateways's Provisioning Status for Virtual WAN VPN Server is not FailedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.80Ensure that Provisioning Status of P2S Connection Configuration for Virtual WAN VPN Server is not FailedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.81Ensure that Virtual WAN VPN Server's Status is not FailedHighNew
  • CloudGuard Azure All Rules Ruleset

February 07 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.77Ensure rotation for customer-created symmetric CMKs is enabledHighModification
  • Name
  • Ensure rotation for customer created symmetric CMKs is enabled
  • Ensure rotation for customer-created symmetric CMKs is enabled
  • AWS Health Insurance Portability and Accountability Act (U. S. HIPAA)
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS APRA 234
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS NY Department of Financial Services (DFS) 23 CRR 500
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
  • AWS SWIFT Customer Security Programme CSCF
  • AWS NIST Special Publication 800-172
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS CIS Benchmark 3.0.0
  • AWS NIST Cybersecurity Framework (CSF)
  • AWS CloudGuard Best Practices
D9.AWS.CRY.12ALB secured listener certificate expires in one weekHighModification
  • Logic
  • ApplicationLoadBalancer where region unlike 'cn%' should not have listeners contain [ certificates contain [ expiration before(7, 'days') ] ]
  • ApplicationLoadBalancer should not have listeners contain [ certificates contain [ expiration before(7, 'days') ] ]
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS ENS 2022
  • AWS MLPS 2.0
  • AWS PCI-DSS 3.2
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS CSA CCM v.3.0.1
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS ISO 27001:2013
  • AWS NIST Cybersecurity Framework (CSF)
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.LOG.24Ensure that Object-level logging for read events is Enabled for S3 bucketHighModification
  • Name
  • Ensure Object-level Logging of Read Events is Enabled for S3 Buckets
  • Ensure that Object-level logging for read events is Enabled for S3 bucket
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS ENS 2022
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS NY Department of Financial Services (DFS) 23 CRR 500
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS CIS Benchmark 3.0.0
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.3.0
  • AWS CIS Foundations v. 1.4.0
D9.AWS.LOG.45Ensure usage of 'root' account is monitoredHighModification
  • Name
  • Ensure Root Account Usage is being monitored using CloudWatch alarms
  • Ensure usage of 'root' account is monitored
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS Australian Signals Directorate (ASD) Essential Eight
  • AWS Cybersecurity Maturity Model Certification (CMMC) 2.0
  • AWS NIST Special Publication 800-172
  • AWS Secure Controls Framework (SCF)
  • AWS CIS Benchmark 3.0.0
D9.AWS.NET.141Ensure no security groups allow ingress from ::/0 to remote server administration portsCriticalNew
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS CIS Foundations v. 1.5.0
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CIS Critical Security Controls v8
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS ENS 2022
  • AWS Cyber Risk Institute Profile
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Risk Management in Technology (RMiT)
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
  • AWS U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS CIS Benchmark 3.0.0
  • AWS NIST Cybersecurity Framework (CSF)
  • AWS CloudGuard Best Practices
D9.AWS.NET.91Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration portsCriticalModification
  • Name
  • Logic
  • Ensure no security groups allow unrestricted ingress to commonly used remote server administration ports
  • SecurityGroup should not have inboundRules with [ (scope='::/0' or scope='0.0.0.0/0') and ( ( port<=22 and portTo>=22) or ( port<=3389 and portTo>=3389 ) ) ]
  • Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports
  • SecurityGroup should not have inboundRules with [ scope='0.0.0.0/0' and ( ( port<=22 and portTo>=22) or ( port<=3389 and portTo>=3389 ) ) ]
  • AWS NIST Special Publication 800-53 (Rev. 5)
  • AWS CIS Foundations v. 1.5.0
  • AWS Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CIS Critical Security Controls v8
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS EU GDPR
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS ENS 2022
  • AWS Cyber Risk Institute Profile
  • AWS NIST Special Publication 800-171 (Rev. 2)
  • AWS New Zealand Information Security Manual (NZ ISM) v3.6
  • AWS Risk Management in Technology (RMiT)
  • AWS Australian Cyber Security Centre (ACSC) Information Security Manual
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
  • AWS U. S. FFIEC Cybersecurity Assessment Tool (CAT)
  • AWS Secure Controls Framework (SCF)
  • AWS ISO 27002:2022
  • AWS CIS Benchmark 3.0.0
  • AWS NIST Cybersecurity Framework (CSF)
  • AWS CloudGuard Best Practices
D9.AZU.CRY.59Ensure Azure Container Instance should use Secure Values for environment variablesLowModification
  • Name
  • Ensure Azure Container Instance environment variable
  • Ensure Azure Container Instance should use Secure Values for environment variables
  • Azure NIST Special Publication 800-53 (Rev. 5)
  • Azure Payment Card Industry Data Security Standard (PCI DSS) v4.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure APRA 234
  • Azure ISO 27001:2022
  • AZURE MLPS 2.0
  • Azure ENS 2022
  • Azure Cybersecurity Maturity Model Certification (CMMC) 2.0
  • Azure NIST Special Publication 800-171 (Rev. 2)
  • Azure FedRAMP R5 (moderate)
  • Azure Secure Controls Framework (SCF)
  • Azure ISO 27002:2022
  • Azure Health Insurance Portability and Accountability Act (U. S. HIPAA)
D9.AWS.CRY.151Ensure that Log groups in AWS Cloud Watch are encrypted using Customer Managed KeysLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.30Ensure CloudWatch Logs is enabled for Prometheus Workspace LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.120Ensure that Log groups in AWS Cloud Watch should have tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.121Ensure that Prometheus Workspace should have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.123Ensure that Grafana Workspace should have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.AS.19Ensure that Azure Virtual Desktop App Group has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.73Ensure that Azure Virtual Desktop App Group has locksLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.74Ensure that Azure Private Link Service's status is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.75Ensure that Azure Private Link Service has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.GCP.NET.75Ensure Public Cloud NAT Gateway should have automatic NAT IP address allocation enabledInformationalNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.76Ensure Public NAT Gateway should have dynamic port allocation enabledInformationalNew
  • CloudGuard GCP All Rules Ruleset
D9.OCI.CRY.07Ensure Encryption in Transit is Enabled for Custom Images in Oracle CloudHighNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.DR.01Ensure Automated Backups are Enabled for MySQL Database SystemsLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.DR.02Ensure that Backup Retention Period is Set for Oracle MySQL DatabaseLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.29Ensure Load Balancer should have Delete Protection EnabledLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.OPE.04Ensure that Custom Images in Oracle Cloud should have TagsLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.VLN.01Ensure Detector Recipe should contain Detector's RulesLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.VLN.02Ensure Responder Recipe should contain Responder's RulesLowNew
  • CloudGuard OCI All Rules Ruleset

January 31 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.NET.66Ensure Public (Anonymous) Access is disabled for Microsoft Azure Storage AccountsCriticalModification
  • Name
  • Logic
  • Ensure that 'Public access level' is disabled for storage accounts with blob containers
  • StorageAccount should have allowBlobPublicAccess=false and publicNetworkAccess like 'Disabled'
  • Ensure Public (Anonymous) Access is disabled for Microsoft Azure Storage Accounts
  • StorageAccount should have allowBlobPublicAccess=false and publicNetworkAccessAsDisplayedInPortal like 'Disabled'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • CloudGuard Azure Default Ruleset
  • Azure Cybersecurity Capability Maturity Model (CMMC 2.0)
  • Azure Cyber Risk Institute Profile
  • Azure NIST Special Publication 800-171
  • Azure Risk Management in Technology (RMiT)
  • Azure NIST Cybersecurity Framework v1.1
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure HIPAA
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
D9.AWS.CRY.150Ensure that Bedrock Custom Model is encrypted using CMKLowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS US FedRAMP (moderate)
  • AWS ISO 27017:2015
D9.AWS.NET.1028Ensure that Bedrock Model Customization Job is using a VPCLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.139Ensure that Bedrock Custom Model has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO 27017:2015
D9.AWS.OPE.140Ensure that Bedrock Model Customization Job has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO 27017:2015
D9.AZU.AS.17Ensure that Azure Confidential Ledger has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.AS.16Ensure that Video Indexer has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.83Ensure that Azure Confidential Ledger certificate exists and is attachedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.DR.07Ensure Azure Event Hub Namespace is zone redundantLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.72Ensure Azure cognitive services (AI Service) should use managed identityLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.118Ensure that 'Public network access' is set to 'Disabled' for Event Hubs NamespaceLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.115Ensure Azure Route Table does not utilise default routeLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.116Ensure that Azure Cognitive Service (AI Service), does not allow public network accessHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.67Ensure that the status of Azure Confidential Ledger is healthyHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.68Ensure that Azure Confidential Ledger has locksLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.66Ensure that Video Indexer Experiment's status is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.71Ensure that Route Table should have tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.72Ensure that Event Hubs Namespace should have tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.K8S.IA.UN.3Container Image - MalwareHighModification
  • Name
  • Logic
  • Severity
  • Container Image - Malware of Critical Severity
  • Malware where scannedAsset.entityType in('KubernetesImage', 'ContainerRegistryImage', 'ShiftLeftImage', 'EcsImage') should not have severity='Critical'
  • Critical
  • Container Image - Malware
  • Malware where scannedAsset.entityType in('KubernetesImage', 'ContainerRegistryImage', 'ShiftLeftImage', 'EcsImage') should fail
  • High
  • Workload Vulnerability Default 2.0
D9.K8S.IA.UN.4Container Image – Insecure ContentLowModification
  • Name
  • Logic
  • Severity
  • Container Image - Malware of High Severity
  • Malware where scannedAsset.entityType in('KubernetesImage', 'ContainerRegistryImage', 'ShiftLeftImage', 'EcsImage') should not have severity='High'
  • High
  • Container Image – Insecure Content
  • InsecureContent where scannedAsset.entityType in('KubernetesImage', 'ContainerRegistryImage', 'ShiftLeftImage', 'EcsImage') should fail
  • Low
  • Workload Vulnerability Default 2.0
D9.K8S.IA.UN.5Container Image - Insecure Content of Critical SeverityCriticalRemoval
  • Workload Vulnerability Default 2.0
D9.K8S.IA.UN.6Container Image - Insecure Content of High SeverityHighRemoval
  • Workload Vulnerability Default 2.0

January 24 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.NET.62Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All NetworksHighModification
  • Name
  • Ensure that public network access to Cosmos DB accounts is disabled
  • Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • CloudGuard Azure Default Ruleset
  • Azure Cybersecurity Capability Maturity Model (CMMC 2.0)
  • Azure Cyber Risk Institute Profile
  • Azure NIST Special Publication 800-171
  • Azure NY - Cybersecurity Requirements for Financial Services Companies
  • Azure Risk Management in Technology (RMiT)
  • Azure NIST Cybersecurity Framework v1.1
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure HITRUST v9.5.0
D9.AZU.AS.14Ensure that Azure Cassandra Cluster has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.AS.15Ensure that Azure DDoS Protection Plan has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.LOG.21Ensure that Logs are enabled for Azure Cassandra ClusterLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.61Ensure that the status of Azure Cassandra Cluster is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.62Ensure that Azure Cassandra Cluster is authenticated properlyHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.63Ensure that Azure DDoS Protection Plan has locksLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.64Ensure that the status of Azure DDoS Protection Plan is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.GCP.NET.62Ensure GCP Private Service Connect Network Attachment only accept allowed connectionsHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.74Ensure that Google Cloud VPN tunnels use IKE version 2 protocolLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.16Ensure Google Folder is not unused in last 180 daysLowNew
  • CloudGuard GCP All Rules Ruleset
D9.K8S.IA.UN.1Container Image - Package of Critical SeverityCriticalNew
  • Workload Vulnerability Default 2.0
D9.K8S.IA.UN.2Container Image - Package of High SeverityHighNew
  • Workload Vulnerability Default 2.0
D9.K8S.IA.UN.3Container Image - Malware of Critical SeverityCriticalNew
  • Workload Vulnerability Default 2.0
D9.K8S.IA.UN.4Container Image - Malware of High SeverityHighNew
  • Workload Vulnerability Default 2.0
D9.K8S.IA.UN.5Container Image - Insecure Content of Critical SeverityCriticalNew
  • Workload Vulnerability Default 2.0
D9.K8S.IA.UN.6Container Image - Insecure Content of High SeverityHighNew
  • Workload Vulnerability Default 2.0

January 17 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.OCI.IAM.05Ensure user API keys rotate within 90 daysHighModification
  • Name
  • Ensure user API keys rotate within 90 days or less
  • Ensure user API keys rotate within 90 days
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
  • OCI CIS Foundations v2.0.0
D9.OCI.IAM.06Ensure user customer secret keys rotate every 90 days or lessLowModification
  • Name
  • Ensure user customer secret keys rotate within 90 days or less
  • Ensure user customer secret keys rotate every 90 days or less
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
  • OCI CIS Foundations v2.0.0
D9.OCI.LOG.13Ensure a notification is configured for network security group changesLowModification
  • Name
  • Ensure a notification is configured for network security group changes
  • Ensure a notification is configured for network security group changes
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
  • OCI CIS Foundations v2.0.0
D9.OCI.LOG.14Ensure a notification is configured for changes to network gatewaysLowModification
  • Name
  • Ensure a notification is configured for changes to network gateways
  • Ensure a notification is configured for changes to network gateways
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
  • OCI CIS Foundations v2.0.0
D9.AWS.AS.11Identify and remove any unused AWS DynamoDB tables to optimize AWS costsHighModification
  • Logic
  • DynamoDBTable should not have itemCount=0
  • DynamoDbTable should not have itemCount=0
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.88Ensure that Nimble Studio status is healthyHighModification
  • Logic
  • NimbleStudio should not have status code in ('DELETE_FAILED','CREATE_FAILED','UPDATE_FAILED')
  • NimbleStudio should not have statusCode in ('DELETE_FAILED','CREATE_FAILED','UPDATE_FAILED')
  • CloudGuard AWS All Rules Ruleset
D9.AZU.AS.09Ensure that Data Migration has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.AS.10Ensure that Data Migration Classic has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.AS.08Ensure that Virtual WAN has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.AS.11Ensure that Static Web App Site has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.AS.13Ensure that a DNS Zone has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.81Ensure that Virtual WAN should have VPN encryptionHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.82Ensure that HPC Cache rotates to latest key versionMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.71Ensure that Static Web App Site template properties are privateMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.113Ensure that Static Web App Site is limited to use selected networks based on trust instead of all networksMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.46Ensure that Data Migration's status is not failedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.47Ensure that Data Migration Classic's status is not failedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.44Ensure that Virtual WAN Experiment's status is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.45Ensure that Static Web App Site config file cannot be updatedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.48Ensure that Static Web App Site private endpoint connections have no errorsHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.49Ensure that Static Web App Site Enterprise Grade CDN Status is EnabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.52Ensure that HPC Cache's state is healthyHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.53Ensure that HPC Cache's provisioning state is healthyHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.54Ensure that HPC Cache has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.55Ensure LoadTest has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.57Ensure Load Test is in healthy stateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.58Ensure that Azure Email Communication has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.59Ensure that Azure Email Communication Domain has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.60Ensure that Azure Virtual Machine Image Template has tagsLowNew
  • CloudGuard Azure All Rules Ruleset

January 10 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.03Ensure that S3 Buckets are encrypted with CMKMediumModification
  • Severity
  • High
  • Medium
  • CloudGuard AWS Dashboards
  • AWS LGPD regulation
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS ENS 2022
  • AWS MLPS 2.0
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS Dashboard System Ruleset
  • AWS CCPA Framework
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.50Ensure that AWS Secrets Manager service enforces data-at-rest encryption using KMS CMKsHighModification
  • Logic
  • SecretManager should not have kmsKeyId isEmpty()
  • SecretManager should have encryptionKey.isCustomerManaged=true
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS ENS 2022
  • AWS Cyber Risk Institute Profile
  • AWS NIST Cybersecurity Framework v1.1
  • AWS CloudGuard Best Practices
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AZU.NET.62Ensure that public network access to Cosmos DB accounts is disabledHighModification
  • Name
  • Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks
  • Ensure that public network access to Cosmos DB accounts is disabled
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • CloudGuard Azure Default Ruleset
  • Azure Cybersecurity Capability Maturity Model (CMMC 2.0)
  • Azure Cyber Risk Institute Profile
  • Azure NIST Special Publication 800-171
  • Azure NY - Cybersecurity Requirements for Financial Services Companies
  • Azure NIST Cybersecurity Framework v1.1
  • Azure CloudGuard SOC 2 based on AICPA TSC 2017
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark [earlier, the Azure Security Benchmark v3, now MCSB v1]
  • Azure HITRUST v9.5.0
D9.AWS.DR.23Ensure Termination Protection feature is enabled for CloudFormation StackHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.AS.12Ensure that Storage Mover has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.AS.07Ensure that Azure Elastic Monitor has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.AS.06Ensure that Elastic SAN has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.76Ensure that the encryption key for the batch account comes from Microsoft KeyVaultLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.80Ensure that Elastic SAN volume is encrypted with Customer Managed Key (CMK)LowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.70Ensure that the authentication mode for the batch account is set to 'AAD' and no other modes are allowedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.111Ensure that public network access is disabled for batch accountMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.112Ensure that public IP addresses are not assigned to batch poolsMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.34Ensure that Azure Batch Account is in a healthy stateLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.35Ensure that Azure Batch Account has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.50Ensure that the status of Azure Storage Mover is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.51Ensure that the status of Azure Storage Mover's Endpoint is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.42Ensure that the status of Azure Elastic Monitor is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.43Ensure that the monitoring status of Azure Elastic Monitor is not disabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.39Ensure that Elastic SAN is in operational stateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.40Ensure that Elastic SAN volumes do not have failed network ACL rulesHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.41Ensure that Elastic SAN volumes are operationalHighNew
  • CloudGuard Azure All Rules Ruleset

January 03 2024

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.12ALB secured listener certificate expires in one weekHighModification
  • Logic
  • ApplicationLoadBalancer should not have listeners contain [ certificates contain [ expiration before(7, 'days') ] ]
  • ApplicationLoadBalancer where region unlike 'cn%' should not have listeners contain [ certificates contain [ expiration before(7, 'days') ] ]
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS ENS 2022
  • AWS MLPS 2.0
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.93Ensure that ECR Registry-level configuration is enabled for image scanningHighModification
  • Logic
  • EcrRegistryScanningConfig should have scanningConfiguration.rules contain-all [ scanFrequency.value like 'CONTINUOUS_SCAN'] and scanningConfiguration.scanType.value='ENHANCED'
  • EcrRegistryScanningConfig where scanningConfiguration.rules should have scanningConfiguration.rules contain-all [ scanFrequency.value like 'CONTINUOUS_SCAN'] and scanningConfiguration.scanType.value='ENHANCED'
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AZU.AS.05Ensure that Virtual Machine Image has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.77Ensure that Azure Cognitive Search, or Azure AI Search Service, is enforcing encryption with Customer Managed Key (CMK)LowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.78Ensure that Virtual Machine Image is using hyper-V Generation V2LowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.79Ensure that Virtual Machine Image OS Disk is encrypted with Customer Managed Key (CMK)HighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.DR.06Ensure that Virtual Machine Image is zone resilientLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.110Ensure that Cognitive Search, or AI Search Service, does not allow public network accessHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.30Ensure that Azure Cognitive Search, or Azure AI Search Service, has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.31Ensure that Azure Cognitive Search, or Azure AI Search Service, has locksLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.32Ensure that the status of Azure Cognitive Search, or Azure AI Search Service, is not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.33Ensure statuses for Azure Cognitive Search, or Azure AI Search, Service's privateEndpointConnections and sharedPrivateLinks are not failedHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.36Ensure that Virtual Machine Image is in succeeded stateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.37Ensure that Virtual Machine Image OS Disk caching is enabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.38Ensure that Virtual Machine Image Data Disk caching is enabledLowNew
  • CloudGuard Azure All Rules Ruleset

December 27 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.100Ensure that the AWS region's Amazon Glue Data Catalog objects and connection passwords are encryptedHighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS APRA 234
D9.AWS.CRY.117Ensure HealthLake Datastore has data-at-rest encryption using KMS CMKsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.123Ensure that Amazon Translate custom terminology is encrypted using KMS CMKsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.23Ensure that Multi-Factor Authentication (MFA) is enabled for your AWS Cognito User PoolHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.124Ensure that Gateway Load Balancer should have tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.125Ensure cross-zone load balancing is enabled for Gateway Load BalancerMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.138Ensure that the Gateway Load Balancers status is AvailableLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.131Ensure Resource Access Manager customer managed permissions should have tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.132Ensure shared AWS resources under Resource Access Manager should have tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.134Ensure Amazon Outposts should have tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.135Serverless Application Repositories should have labelsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.136Ensure Cognito Identity Pool should have tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.137Ensure Cognito User Pool should have tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.133Ensure HealthLake Datastore should have tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.AS.04Ensure that a NetApp Files Account has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.67Synapse Workspace should have double encryption enabledHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.68Encryption in transit is enabled for HD Insight clustersHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.69Ensure that Enable Infrastructure Encryption is set for Azure Databricks workspaceHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.70Ensure that NetApp account active directories are using LDAP signingHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.71Ensure that Azure Log Analytics Cluster has double encryption enabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.72Ensure that Azure Log Analytics Cluster is encrypted using a CMKLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.73Ensure that in Azure NetApp Files 'AES encryption' is set to 'Enabled' on any active directoriesHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.74Ensure that in Azure NetApp Files 'encryptDCConnections' is not disabled on any active directoriesHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.75Ensure that in Azure NetApp Files 'ldapOverTLS' is not disabled on amy active directoriesHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.103SynapseWorkspace should not allow public network accessHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.104Ensure that Load Balancer should have tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.105Ensure that Load Balancer should not have Public IPHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.106Ensure that Regional WAF should have TagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.107Ensure that Regional Web Application Firewall (WAF) is EnabledHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.108Ensure that Global Web Application Firewall (WAF) is EnabledHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.109Ensure that Azure SQL Managed Instance public access is disabledHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.19Ensure that Synapse Workspace should have tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.20Ensure that HD Insight should have TagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.21Ensure that Azure SQL Managed Instance should have tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.22Ensure that Azure Databricks workspace should have a name tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.23Ensure that Azure Virtual Network Manager should have tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.24Ensure that Azure Orbital Spacecraft has locksLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.25Ensure that Azure Orbital Spacecraft has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.26Ensure that Azure Dedicated Host Group has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.27Ensure that Azure Orbital Spacecraft's status is not failedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.28Ensure that NetApp Account active directories are in an operational stateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.29Ensure that Azure Log Analytics Cluster has tagsLowNew
  • CloudGuard Azure All Rules Ruleset

December 20 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.63Ensure that AWS Elastic Container Registry (ECR) image scanning is enabledHighModification
  • Name
  • Logic
  • Ensure that ECR image scan on push is enabled.
  • EcrRepository should have imageScanningConfiguration.scanOnPush=true
  • Ensure that AWS Elastic Container Registry (ECR) image scanning is enabled
  • EcrRepository should have repositoryScanningConfiguration.scanFrequency in ('SCAN_ON_PUSH','CONTINUOUS_SCAN')
  • AWS Security Risk Management
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS APRA 234
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.AWS.AS.43Ensure that Amazon S3 Glacier should have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.106Ensure X-Ray Encryption using KMSLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.113Ensure AWS Code Artifact Domain is using Customer managed key (CMK) KMS encryptionHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.149Ensure that CodeStar user profile should have SSH public keyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.56Ensure that your Amazon ECS instances are using the latest ECS container agent versionMediumModification
  • Logic
  • EcsCluster should have containerInstances contain-all [ versionInfo.agentVersion in ($CloudGuard_ECS_Cluster_Latest_Agent_Versions) ]
  • EcsCluster where containerInstances length() should have containerInstances contain-all [ versionInfo.agentVersion in ($CloudGuard_ECS_Cluster_Latest_Agent_Versions) ]
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.117Ensure AWS Transcribe Job has tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.118Ensure AWS Medical Transcribe Job has tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.119Ensure AWS X-Ray Group has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.122Ensure that CodeStar should have tagsInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.126Endure AWS Code Artifact Repository has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.127Ensure AWS Code Artifact Domain has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.129Ensure AWS Global Accelerator has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.130Ensure AWS Global Custom Accelerator has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.NET.04Ensure Azure Firewall SKU is configured to PremiumHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.10Ensure Azure Firewall has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.13Ensure that Azure Compute Gallery has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.14Ensure that Azure Compute Gallery has locksLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.15Ensure that Azure Compute Gallery's status is not failedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.16Ensure that Azure Compute Gallery's Image has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.17Ensure that Azure Compute Gallery Image's status is not failedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.18Ensure that Azure Data Share Account has tagsLowNew
  • CloudGuard Azure All Rules Ruleset

December 13 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.AS.42Ensure that AWS Firewall Manager Policy has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.56Ensure Managed Streaming for Apache Kafka (MSK) clusters have in-transit encryption enabled within the cluster and between clients and brokersCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.75Ensure AWS MemoryDB for Redis clusters have Customer Managed CMK at-rest encryptionHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.87Ensure AWS MemoryDB for Redis manual snapshots have Customer Managed CMK encryptionHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.102Ensure AWS MemoryDB for Redis clusters have in-transit encryption enabledHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.15Ensure MemoryDB for Redis clusters have automatic snapshots enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.21Ensure Managed Streaming for Apache Kafka (MSK) clusters have only authenticated accessHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.22Ensure Managed Streaming for Apache Kafka (MSK) clusters do not allow public accessHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.11Ensure Managed Streaming for Apache Kafka (MSK) clusters have log delivery configuredLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.26Ensure AWS WAFv2 Web ACL logging should be enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.18Ensure Managed Streaming for Apache Kafka (MSK) clusters have enhanced monitoring configuredLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.18Ensure Managed Streaming for Apache Kafka (MSK) clusters have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.43Ensure that AWS MemoryDB for Redis snapshot has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.49Ensure MemoryDB for Redis cluster is updatedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.58Ensure that AWS MemoryDB for Redis clusters have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.111Ensure AWS SimSpace Weaver Simulation have tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.112Ensure AWS WAFv2 Web ACL has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.113Ensure that the AWS Firewall Manager Policy removes protection from unused resourcesLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.114Ensure that the AWS Firewall Manager Account is in a Healthy StateLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.115Ensure that the AWS Firewall Manager Policy automatically remediates non-compliant resourcesLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.116Ensure that the AWS Firewall Manager Policy is in a healthy stateHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.AS.03Ensure that an Event Grid namespace has an associated tagLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.02Ensure that Event Grid Namespace's minimum TLS version is set to 1.2HighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.101Ensure that Event Grid Namespace is not open to public IPsHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.102Ensure that Event Grid Namespace does not allow public network accessHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.07Ensure that Azure Stream Analytics Cluster has locksLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.08Ensure that Azure Stream Analytics Cluster has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.09Ensure that Azure Stream Analytics Cluster's status is not failedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.11Ensure that Event Grid Namespace's private endpoint connections are not in a failed stateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.12Ensure Event Grid Namespace is not in Failed stateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AWS.NET.60Ensure that NAT gateway is not associated in a private subnetMediumRemoval
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS ENS 2022
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10

December 06 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.IAM.01Eliminate use of the 'root' user for administrative and daily tasksHighModification
  • Logic
  • IamUser where name regexMatch /^<root_account>$/i should not have passwordLastUsed after(-90, 'days')
  • IamUser where name like '%root_account%' should not have passwordLastUsed after(-90, 'days')
  • AWS HIPAA
  • CloudGuard AWS Dashboards
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS ENS 2022
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS Dashboard System Ruleset
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.IAM.16Ensure no 'root' user account access key existsHighModification
  • Logic
  • IamUser where name regexMatch /^<root_account>$/ should have firstAccessKey.isActive=false and secondAccessKey.isActive=false
  • IamUser where name like '%root_account%' should have firstAccessKey.isActive=false and secondAccessKey.isActive=false
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS ISO27001:2022
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS APRA 234
  • AWS ENS 2022
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AZU.NET.66Ensure that 'Public access level' is disabled for storage accounts with blob containersCriticalModification
  • Logic
  • StorageAccount should not have allowBlobPublicAccess=true
  • StorageAccount should have allowBlobPublicAccess=false and publicNetworkAccess like 'Disabled'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • CloudGuard Azure Default Ruleset
  • Azure CloudGuard Best Practices
D9.AWS.IAM.149Ensure that Multi-Factor Authentication (MFA) is enabled for your AWS root accountHighModification
  • Logic
  • IamUser where name regexMatch /^<root_account>$/i should have mfaActive=true
  • IamUser where name like '%root_account%' should have mfaActive=true
  • AWS Security Risk Management
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.CRY.101Ensure that your Amazon WorkSpaces storage volumes are encrypted in order to meet security and compliance requirementCriticalModification
  • Logic
  • Workspace should not have userVolumeEncryptionEnabled=false and rootVolumeEncryptionEnabled=false or rootVolumeEncryptionEnabled isEmpty() and userVolumeEncryptionEnabled isEmpty()
  • Workspace should have userVolumeEncryptionEnabled=true and rootVolumeEncryptionEnabled=true
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS CloudGuard Best Practices
D9.AWS.CRY.146Ensure that FinSpace Environment is encrypted using CMKLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.22Ensure Elastic Disaster Recovery Replication status is not giving any errorLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.146Ensure that root account credentials have not been used recently to access your AWS accountHighModification
  • Logic
  • IamUser where name regexMatch /^<root_account>$/i should not have passwordLastUsed after(-7, 'days')
  • IamUser where name like '%root_account%' should not have passwordLastUsed after(-7, 'days')
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.MON.47Ensure Email Address is added for each Amazon Detective's MemberLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.48Ensure Amazon QuickSight has Termination Protection EnabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.140Ensure VPN Gateway is AvailableLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.15Ensure that AWS Timestream Database has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.17Ensure that AWS Timestream Table has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.110Ensure that AWS Personalize has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.OPE.06Ensure that Azure Power BI Embedded Capacity has tagsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AWS.CRY.73Ensure that user Volume Encryption is enabled for AWS WorkspaceHighRemoval
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS CloudGuard Best Practices
D9.AWS.CRY.74Ensure that root Volume Encryption is enabled for AWS WorkspaceHighRemoval
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
  • AWS CloudGuard Best Practices
D9.AWS.OPE.53Ensure Amazon Organizations is in use to consolidate all your AWS accounts into an organizationMediumRemoval
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.59Ensure unused VPC Internet Gateways and Egress-Only Internet Gateways are removed to follow best practicesLowRemoval
  • CloudGuard AWS All Rules Ruleset
D9.AZU.NET.67Ensure that Containers and its blobs are not exposed publiclyCriticalRemoval
  • CloudGuard Azure All Rules Ruleset
  • CloudGuard Azure Default Ruleset
  • Azure ISO 27001:2022
  • Azure ENS 2022
  • Azure CloudGuard Best Practices

November 29 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.IAM.189Ensure that Authorization Type in API Gateway is not set to NoneHighNew
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.103Ensure that Kinesis Data Firehose delivery streams enforce Server-Side Encryption, ideally using Customer-managed Customer Master KeysHighModification
  • Logic
  • KinesisFirehose should have deliveryStreamEncryptionConfiguration.keyType.value='AWS_OWNED_CMK'
  • KinesisFirehose should have (getResources('Kinesis', source.kinesisStreamSourceDescription.kinesisStreamARN, 'id') contain [$.encrypted = true]) or (deliveryStreamEncryptionConfiguration.keyType.value in ('CUSTOMER_MANAGED_CMK','AWS_OWNED_CMK'))
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.OPE.107Ensure that DAX Parameter Group doesn't require rebootHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.108Ensure that Compute Optimizer has no high performance risk ratingsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.109Ensure that AWS Data Exchange Dataset has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.OPE.05Ensure that Chaos Studio Experiment's status is not failedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AWS.NET.67Ensure that all authorization Type in API Gateway are not set to NoneHighRemoval
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.146Ensure that FinSpace Environment is encrypted using CMKLowRemoval
  • CloudGuard AWS All Rules Ruleset

November 22 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.LOG.17Ensure that Endpoint Protection for all Windows Virtual Machines is installedHighModification
  • Name
  • Logic
  • Ensure that Endpoint Protection for all Virtual Machines is installed
  • VirtualMachine should have extensions contain [ virtualMachineExtensionType='IaaSAntimalware' and provisioningState='Succeeded' ]
  • Ensure that Endpoint Protection for all Windows Virtual Machines is installed
  • VirtualMachine where operatingSystem='Windows' should have extensions contain [ virtualMachineExtensionType='IaaSAntimalware' and provisioningState='Succeeded' ]
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • CloudGuard Azure Default Ruleset
  • CIS Microsoft Azure Compute Services Benchmark v1.0.0
  • Azure APRA 234
  • Azure ISO 27001:2022
  • AZURE MLPS 2.0
  • Azure ENS 2022
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AWS.IAM.185Ensure that all the expired SSL/TLS certificates stored in AWS IAM are removedLowNew
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS ENS 2022
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.3.0
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.NET.90Ensure that EC2 Metadata Service only allows IMDSv2HighModification
  • Severity
  • Medium
  • High
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS ENS 2022
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.AWS.IAM.186Ensure that Data Lake's 'allowFullTableExternalDataAccess' setting is disabledHighNew
  • CloudGuard AWS All Rules Ruleset
D9.K8S.IAM.93Ensure that a limit is set on pod PIDs (Kubelet)HighNew
  • CIS Kubernetes Benchmark v1.8.0
D9.AWS.CRY.56Ensure that all the expired SSL/TLS certificates stored in AWS IAM are removedLowRemoval
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.3.0
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10

November 15 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.NET.95Ensure API Gateway has WAFLowModification
  • Name
  • Logic
  • Ensure API gateway has WAF
  • ApiGateway should have wafRegional
  • Ensure API Gateway has WAF
  • ApiGateway should have stages contain-all [ wafRegional or wafRegionalV2 ]
  • CloudGuard AWS Default Ruleset
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
D9.AWS.AS.38Ensure that FinSpace Environment has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.39Ensure that Comprehend Flywheel has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.40Ensure that Comprehend Endpoint has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.41Ensure that AWS Config Rule has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.148Ensure that Forecast Predictor is encrypted using CMKLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.147Ensure that Forecast Dataset is encrypted using CMKLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.142Ensure that Comprehend Flywheel's model is encrypted with CMKLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.143Ensure that Comprehend Flywheel's volume is encrypted with CMKLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.144Ensure that CloudSearch Domain enforces HTTPSHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.145Ensure that your CloudSearch Domain is enforcing a minimum TLS security policy of version 1.2HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.146Ensure that FinSpace Environment is encrypted using CMKLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.184Ensure unused IAM users are removed from AWS account to follow security best practiceMediumNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.NET.139Ensure that your Amazon Comprehend Flywheel uses a VPCMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.91Ensure that FinSpace Environment status is healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.104Ensure that Forecast Predictor has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.105Ensure that Forecast Predictor status is healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.103Ensure that Forecast Dataset has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.93Ensure that Verified Permissions Policy Store has validation enabledHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.94Ensure that Comprehend Flywheel's status is not failedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.95Ensure that Comprehend Endpoint's status is not failedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.96Ensure that the status of the CloudSearch Domain is healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.99Ensure that Forecast Monitor has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.102Ensure that Forecast Monitor status is healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.97Ensure that Forecast Explainability has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.98Ensure that Forecast has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.100Ensure that Forecast Explainability status is healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.101Ensure that Forecast status is healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.106Ensure that Forecast Dataset Group has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.K8S.AC.24CVE-2022-0811: Prevent pods from having securityContext with sysctls that contains + or =CriticalModification
  • Logic
  • KubernetesPod should not have spec.securityContext.sysctls contain-any [ value like '%+%' or value like '%=%' ]
  • KubernetesPod should not have spec.securityContext.sysctls contain-any [ value like '%\+%' or value like '%=%' ]
  • Container Admission Control
  • Container Admission Control 1.0
D9.K8S.IA.21Package of Unknown SeverityInformationalModification
  • Logic
  • Package should not have cves contain [ severity='Unknown' ]
  • Package should not have cves contain [ severity isEmpty() or severity='Unknown' ]
  • Container Image Assurance 1.0
D9.AWS.CRY.106Ensure unused IAM users are removed from AWS account to follow security best practiceMediumRemoval
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234

November 08 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.NET.01Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to SSH (TCP:22)CriticalNew
  • AWS CIS Foundations v. 1.5.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CIS Controls V 8
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.AWS.NET.02Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to RDP (TCP:3389)CriticalNew
  • AWS CIS Foundations v. 1.5.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CIS Controls V 8
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.AWS.NET.91Ensure no security groups allow unrestricted ingress to commonly used remote server administration portsCriticalModification
  • Name
  • Logic
  • Ensure no security groups allow ingress from ::/0 to remote server administration ports
  • SecurityGroup should not have inboundRules with [ (scope='::/0') and ( ( port<=22 and portTo>=22) or ( port<=3389 and portTo>=3389 ) ) ]
  • Ensure no security groups allow unrestricted ingress to commonly used remote server administration ports
  • SecurityGroup should not have inboundRules with [ (scope='::/0' or scope='0.0.0.0/0') and ( ( port<=22 and portTo>=22) or ( port<=3389 and portTo>=3389 ) ) ]
  • AWS CIS Foundations v. 1.5.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CIS Controls V 8
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.AWS.AS.30Ensure that Lightsail Distribution has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.32Ensure that Nimble Studio has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.34Ensure that Lightsail Relational Database has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.35Ensure that AppRunner Autoscaling Configuration has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.36Ensure that CloudHSM Cluster has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.37Ensure that CloudHSM Backup has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.140Ensure that Nimble Studio is encryptedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.141Ensure that Nimble Studio is encrypted using CMKLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.19Ensure that Lightsail Relational Database has a recent snapshotHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.20Ensure that Lightsail Relational Database has Backup Retention enabledHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.21Ensure that CloudHSM Cluster has a backup retention of at least 30 daysLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.137Ensure that Lightsail Distribution doesn't allow unrestricted operations via HTTP requestsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.138Ensure that Lightsail Relational Database is not publicly accessibleHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.86Ensure that AWS account's Support Level is 'Business' or 'Enterprise'LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.88Ensure that Nimble Studio status is healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.89Ensure that Connect Instance status is healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.90Ensure that CloudHSM Cluster is in an operational stateHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.92Ensure that the CloudHSM Cluster does not have any Hardware Security Modules (HSMs) in a degraded stateHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.IAM.59Configure your Microsoft Azure virtual machines to use Azure Active Directory credentials for secure authentication.LowModification
  • Severity
  • Critical
  • Low
  • CloudGuard Azure All Rules Ruleset
  • Azure ISO 27001:2022
D9.AWS.NET.77Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration portsCriticalRemoval
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS APRA 234
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.3.0
  • AWS CIS Foundations v. 1.4.0
D9.AWS.CRY.100Ensure that Amazon Glue Data Catalog objects and connection passwords are encryptedHighRemoval
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234

November 01 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.IAM.175MFA should be Active for All IAM UsersHighNew
  • AWS Security Risk Management
  • CloudGuard AWS All Rules Ruleset
  • AWS Dashboard System Ruleset
D9.AZU.IAM.46Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged UsersHighModification
  • Logic
  • User where assignedRoles contain [displayName regexMatch /.*Administrator|Creator|Global.*/] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • User where assignedRoles with [displayName like '%admin%' or displayName like '%contributor%' or displayName like '%creator%' or displayName like '%manage%' or displayName like '%owner%'] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • CloudGuard Azure Default Ruleset
  • Azure ISO 27001:2022
  • AZURE MLPS 2.0
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.IAM.47Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged UsersHighModification
  • Logic
  • User should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • User where assignedRoles with [displayName unlike '%admin%' and displayName unlike '%contributor%' and displayName unlike '%creator%' and displayName unlike '%manage%' and displayName unlike '%owner%'] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • CloudGuard Azure Default Ruleset
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
D9.AWS.AS.20Ensure AppRunner Service has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.21Ensure that Lightsail Domain has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.25Ensure that MWAA Environment has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.27Ensure that ACM Private Certificate Authority has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.28Ensure that Directory Service Directories have an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.29Ensure that AppRunner Connection has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.31Ensure that AppRunner VPC Connector has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.136Ensure that AppRunner Service is encrypted using CMKLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.137Ensure that the ACM Private Certificate Authority is not set to expire within the next 7 daysHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.138Ensure that AppFabric App Bundle is encrypted using CMKLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.139Ensure that MWAA Environment is encrypted with CMKHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.180Ensure that Single Sign-On (SSO) is enabled for DS DirectoryLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.182Ensure that DS Directory's RADIUS server is configured and in healthy stateHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.183Ensure that DS Directory RADIUS authentication protocol is configured and not set to 'PAP'LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.45Ensure that MWAA Environment's status is healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.46Ensure that AWS Lightsail Domain's name server update state is not failedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.134Ensure that AppRunner Service not publicly accessible through the internetHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.135Ensure that AppRunner Service outgoing traffic is not routed directly to public internetMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.136Ensure that MWAA Environment webserver access mode is set to private onlyCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.73Ensure AppRunner Service has observability enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.74Make sure the AppRunner Service was created without any issues.HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.75Ensure that the common name for your ACM Private Certificate Authority is a Fully Qualified Domain Name (FQDN)LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.76Ensure that AppFabric App Bundle has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.77Ensure that AppRunner Connection is in healthy stateHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.78Ensure that Support Case status is not 'pending-customer-action'LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.79Ensure AWS MWAA Environment's last-update status is not failedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.80Ensure that the Private Certificate Authority's status is not expired or failedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.81Ensure that MWAA Environment DagProcessingLogs are enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.82Ensure that MWAA Environment SchedulerLogs are enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.83Ensure that MWAA Environment TaskLogs are enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.84Ensure that MWAA Environment WebserverLogs are enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.85Ensure that AWS MWAA Environment WorkerLogs are enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.87Ensure that the DS Directory is in healthy stateHighNew
  • CloudGuard AWS All Rules Ruleset
D9.K8S.IA.21Package of Unknown SeverityInformationalModification
  • Logic
  • Package where not severity isEmpty() should have severity in('Low','Medium','High','Critical')
  • Package should not have cves contain [ severity='Unknown' ]
  • Container Image Assurance 1.0

October 25 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.DR.03Ensure AWS RDS retention policy is at least 7 daysHighModification
  • Logic
  • Severity
  • RDS should have backupRetentionPeriod>6
  • Medium
  • RDS should have backupRetentionPeriod!=0 and backupRetentionPeriod>6
  • High
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.AS.24Ensure that AWS MediaTailor Source Location has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.26Ensure Lightsail Disk has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.179Ensure MediaTailor Source Location has access authentication configuredHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.43Ensure AWS Lightsail Disk's state is not error or unknownHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.44Ensure AWS Lightsail Disk's auto-mount status is not failedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.127Ensure no security group allows inbound access on a range of portsHighModification
  • Logic
  • SecurityGroup should have inboundRules contain-all [$.port = $.portTo]
  • SecurityGroup where not inboundRules isEmpty() should have inboundRules contain-all [$.port = $.portTo]
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.129Ensure AWS VPC does not allow unauthorized peeringHighModification
  • Logic
  • VPC should have vpcPeeringConnections with [ targetVpc.ownerId = ~.accountNumber ]
  • VPC where vpcPeeringConnections length()>0 should have vpcPeeringConnections with [ targetVpc.ownerId = ~.accountNumber ]
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.67Ensure that Batch Job Compute Environment has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.68Ensure that Batch Job Definition has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.69Ensure that Batch Job Compute Environment's state is not 'INVALID'LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.70Ensure that Signer Job status is not 'Failed'HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.71Ensure that your AWS AppStream 2.0 Usage Report Subscriptions are healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.72Ensure that your AWS AppStream 2.0 Usage Report was generated in the last 30 daysHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.14Ensure AWS RDS instances have Automated Backups feature enabledHighRemoval
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234

October 18 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.LOG.24Ensure Object-level Logging of Read Events is Enabled for S3 BucketsHighModification
  • Name
  • Logic
  • Severity
  • Ensure that Object-level logging for read events is enabled for S3 bucket
  • CloudTrail should have (eventSelectors contain [ dataResources contain [type like 'AWS::S3::Object' ] ]) and (eventSelectors contain [ readWriteType = 'ReadOnly' or readWriteType = 'All'])
  • Low
  • Ensure Object-level Logging of Read Events is Enabled for S3 Buckets
  • List<CloudTrail> should have ( items with [ status.isLogging=true and isOrganizationTrail=true and eventSelectors contain [ dataResources contain [ type='AWS::S3::Object' and values contain ['arn:aws:s3:::' ] ] ] length()>0 ] ) or ( items with [ status.isLogging=true and isOrganizationTrail=false and eventSelectors contain [ dataResources contain [ type='AWS::S3::Object' and (eventSelectors contain [ readWriteType = 'ReadOnly' or readWriteType = 'All'] ) length()>0 ] ] ] )
  • High
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS APRA 234
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.3.0
  • AWS CIS Foundations v. 1.4.0
D9.AWS.AS.12Ensure Lightsail Load Balancer has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.13Ensure Lightsail Instance has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.16Ensure CodePipeline Webhook has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.17Ensure that AWS MediaTailor Playback Configuration has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.18Ensure that AWS MediaTailor Channel has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.19Ensure KeySpace has an associated tagLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.22Ensure that Signer Profile has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.23Ensure that DAX Cluster has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.128Ensure that Amazon Lightsail Load Balancer has HTTPS redirection enabledHighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.CRY.130Ensure Lightsail instances are have a user generated SSH keys in order to have full control over the authentication processLowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.CRY.131Ensure that Amazon Lightsail Load Balancer SSL/TLS certificate exists and is attachedHighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.CRY.132Ensure that CodePipeline Webhooks require authentication to be triggeredHighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.CRY.133Ensure DevOps Guru Service Integration is encrypted with CMKLowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.CRY.134Ensure that DAX Cluster encryption type should be TLSHighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.CRY.135Ensure that DAX Cluster has server side encryption enabledHighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.IAM.167Ensure that AWS Lambda IAM policy should not be overly permissive to all trafficHighModification
  • Name
  • Logic
  • Ensure that AWS Lambda IAM policy should not overly permissive to all traffic
  • Lambda should not have roles contain [ combinedPolicies contain [ policyDocument.Statement contain [ Effect='Allow' and Action in ['*'] ] ] ]
  • Ensure that AWS Lambda IAM policy should not be overly permissive to all traffic
  • Lambda should not have roles contain [ combinedPolicies contain [ policyDocument.Statement contain [ Effect='Allow' and Action ='*' ] ] ]
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.IAM.176EC2 with IAM role attached should not have iam:PassRole and ec2:RunInstances permissionsLowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.IAM.177There should be no AWS role having iam:PassRole and lambda:InvokeFunction permissions attached to an EC2 instanceLowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.IAM.178There should not be any AWS Lambda having an IAM role with Amazon RDS database SQL query execution permissionsLowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.LOG.56Ensure that AWS MediaTailor Playback Configuration has 100% logging enabled.LowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.LOG.57Ensure DevOps Guru Service Integration has Anomaly Detection logging enabledLowNew
  • CloudGuard AWS All Rules Ruleset
  • AWS APRA 234
D9.AWS.NET.1027Ensure that Lightsail Instances isn't exposed to the public internetHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.62Ensure that your AWS Lightsail Load Balancers are healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.63Ensure that your AWS Lightsail Load Balanced Instances are healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.64Ensure that Batch Job Queue has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.65Ensure that Kinesis Analytics Application has tagsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.66Ensure that DevOps Guru Service Integration has the OpsCenter feature enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1014Ensure AWS Redshift non-default parameter groups require SSL to secure data in transitCriticalRemoval
  • CloudGuard AWS All Rules Ruleset

October 11 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.CRY.33Ensure 'TLS Version' is set to 'TLSV1.2' for MySQL flexible Database ServerHighModification
  • Logic
  • MySQLDBFlexibleServer should have parameters with [ name='tls_version' and value='TLSv1.2' ]
  • MySQLDBFlexibleServer should have parameters with [ name='tls_version' and value like 'TLSv1.2' ]
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.IAM.66Ensure Azure groups are Security EnabledLowNew
  • Azure Security Risk Management
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.67Ensure App Registration has Expiration Date set for all Client SecretsLowNew
  • Azure Security Risk Management
  • CloudGuard Azure All Rules Ruleset
D9.AWS.CRY.86Connections to Amazon Redshift clusters should be encrypted in transitMediumModification
  • Logic
  • Redshift should have parametersGroup contain [ parameters with [ parameterName='require_ssl' and parameterValue='true' ] ]
  • Redshift where status='available' should have parametersGroup contain [ parameters with [ (parameterName='require_ssl' and parameterValue='true') or (parameterName like 'use_fips_ssl' and parameterValue='true')] ]
  • AWS NIST 800-53 Rev 5
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS CloudGuard Best Practices
D9.AWS.AS.15ECS Task Definitions should Limit Memory Usage for ContainersHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.14ECS Task Definitions should Mount the Root File System as Read-onlyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.129EKS Cluster should have Secrets EncryptedCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.174Ensure AWS IAM SSH public keys are rotated on a periodic basis as a security best practiceLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1011Ensure that your CloudFront distributions are using an origin access identity for their origin S3 bucketsHighModification
  • Logic
  • CloudFront should have distributionConfig.origins.items contain [ s3OriginConfig.originAccessIdentity ]
  • CloudFront where distributionConfig.origins.items contain [ s3OriginConfig ] should have distributionConfig.origins.items contain [ s3OriginConfig.originAccessIdentity ]
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
D9.AWS.NET.122Instances should have Source/Destination Check Enabled when Not Using NATHighModification
  • Name
  • Logic
  • Severity
  • Ensure AWS IAM SSH public keys are rotated on a periodic basis as a security best practice
  • IamUser should not have sshPublicKeys with [ uploadDate before(-30, 'days') ]
  • Low
  • Instances should have Source/Destination Check Enabled when Not Using NAT
  • Instance should have nics with [ ( subnet.routeTable.routes with [ natGatewayId ] ) or ( securityGroups contain-none [ networkInterfaces ] ) or ( securityGroups contain [ networkInterfaces contain-all [ sourceDestCheck = true ] ] ) ]
  • High
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.133Ensure that your Amazon RDS database cluster snapshots are not accessible to all AWS accountsCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.CRY.66Ensure that Private Key Vaults are used for Encryption at Rest in Azure Kubernetes Service (AKS)HighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.68Ensure that System-Assigned Managed Identities are used for AKS ClustersHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.69Ensure that the Network Contributor Role is used for managing Azure Network ResourcesHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.100Ensure that the Kubernetes API version for AKS clusters is the latestHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AWS.NET.01Ensure no security groups allow ingress from 0.0.0.0/0 to SSH (TCP:22)CriticalRemoval
  • AWS HIPAA
  • CloudGuard AWS Dashboards
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Network Alerts for default VPC components
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.NET.02Ensure no security groups allow ingress from 0.0.0.0/0 to RDP (TCP:3389)CriticalRemoval
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Network Alerts for default VPC components
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10

October 04 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.NET.23Ensure to filter source IP addresses for Cosmos DB AccountMediumModification
  • Name
  • Logic
  • Ensure to filter source Ips for Cosmos DB Account
  • CosmosDbAccount should have ipRangeFilter
  • Ensure to filter source IP addresses for Cosmos DB Account
  • CosmosDbAccount where publicNetworkAccess='Enabled' should have ipRangeFilter
  • Azure CloudGuard CheckUp
  • Azure NIST 800-53 Rev 5
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AWS.IAM.173API Gateway Routes should Specify an Authorization TypeHighNew
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
D9.GCP.NET.68Ensure there are no VPC firewall rules that allow unrestricted inbound access to Cassandra ports (TCP - 7000, 7001, 7199, 8888, 9042, 9160, 61620 and 61621)HighNew
  • GCP NIST 800-53 Rev 5
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.69Ensure there are no VPC firewall rules that allow unrestricted inbound access to TCP port 9090 (Ciscosecure websm)HighNew
  • GCP NIST 800-53 Rev 5
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.70Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP ports 9200 and 9300 (Elasticsearch)HighNew
  • GCP NIST 800-53 Rev 5
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.71Ensure there are no VPC firewall rules that allow unrestricted inbound access to TCP ports 636 and 389 and UDP port 389 (LDAP)HighNew
  • GCP NIST 800-53 Rev 5
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.72Ensure there are no VPC firewall rules that allow unrestricted inbound access to TCP or UDP on ports 11211, 11214 and 11215 (Memcached)HighNew
  • GCP NIST 800-53 Rev 5
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.73Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP port 6379 (Redis)HighNew
  • GCP NIST 800-53 Rev 5
  • CloudGuard GCP All Rules Ruleset
D9.AWS.OPE.60Ensure that Amazon EC2 Auto Scaling groups should use Amazon EC2 launch templatesMediumNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
D9.AWS.OPE.61Ensure that all instances in the Auto Scaling Group are HealthyMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.VLN.14Ensure that EC2 instances do not have critical vulnerabilitiesCriticalNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Vulnerabilities Detection
D9.AWS.VLN.15Ensure that EC2 instances do not have high-severity vulnerabilitiesHighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Vulnerabilities Detection
D9.AWS.ERM.01Exposed workload with critical/high severity vulnerability and elevated privileges (EC2 Instance)HighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Security Controls
D9.AWS.ERM.02Exposed storage asset with sensitive data (S3 bucket)HighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Security Controls
D9.AWS.ERM.03Third party with elevated privilegesHighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Security Controls
D9.AWS.ERM.04Exposed workload with elevated privileges (ECS Service)MediumNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Security Controls
D9.AWS.ERM.05Exposed workload with elevated privileges (EC2 Instance)MediumNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Security Controls
D9.AWS.ERM.06Exposed workload with elevated privileges (Lambda Function)MediumNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Security Controls
D9.AZU.CRY.65Ensure that Automation account variables are encryptedCriticalNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.65Ensure that AKS local accounts are disabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.99Ensure that Data Factory public access is disabledHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.VLN.03Ensure that VirtualMachines do not have critical vulnerabilitiesCriticalNew
  • CloudGuard Azure All Rules Ruleset
  • Azure Vulnerabilities Detection
D9.AZU.VLN.04Ensure that VirtualMachines do not have high-severity vulnerabilitiesHighNew
  • CloudGuard Azure All Rules Ruleset
  • Azure Vulnerabilities Detection
D9.AZU.ERM.01Exposed workload with critical/high severity vulnerability and elevated privileges (Virtual Machine)HighNew
  • CloudGuard Azure All Rules Ruleset
  • Azure Security Controls
D9.AZU.ERM.02Exposed workload with elevated privileges (Virtual Machine)MediumNew
  • CloudGuard Azure All Rules Ruleset
  • Azure Security Controls
D9.GCP.IAM.45Ensure that IAM permission are not assigned to usersLowNew
  • CloudGuard GCP All Rules Ruleset

September 27 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.LOG.55Ensure AppSync should have request-level and field-level logging turned onLowNew
  • AWS Security Risk Management
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
D9.AWS.NET.60Ensure that NAT gateway is not associated in a private subnetMediumModification
  • Logic
  • NatGateway should have getResource('Subnet', subnetId) contain [routeTable.routes contain-any [gatewayId like '%igw%']]
  • NatGateway where isPublic=true should have getResource('Subnet', subnetId) contain [routeTable.routes contain-any [gatewayId like '%igw%']]
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.127Ensure Athena workgroups should be encrypted at restHighNew
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
D9.AWS.IAM.151Ensure that AWS CloudTrail should not have delete or full permissionHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.172Ensure AWS Identity and Access Management (IAM) user passwords are reset before expiration (45 Days)LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.132Ensure that the Amazon VPC peering connection configuration is compliant with the desired routing policyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.130Ensure AWS VPC Managed NAT (Network Address Translation) Gateway service is enabled for high availability (HA)MediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.CRY.64Ensure to enable infrastructure double encryption for Data Explorer clustersCriticalNew
  • CloudGuard Azure All Rules Ruleset
D9.GCP.IAM.44Ensure the 'cloudsql_iam_authentication' is enabled for your MySQL and PostgreSQL instancesMediumNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.MON.03Ensure GKE Cloud Monitoring is enabled for your clustersMediumNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.14Ensure VM instances have secure boot enabledLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.15Ensure your DataProc clusters don't use outdated imagesLowNew
  • CloudGuard GCP All Rules Ruleset
D9.OCI.CRY.06Ensure OCI Kubernetes Engine Cluster boot volume is configured with in-transit data encryptionLowNew
  • CloudGuard OCI All Rules Ruleset
D9.AWS.LOG.26Ensure AWS Identity and Access Management (IAM) user passwords are reset before expiration (45 Days)LowRemoval
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.124Ensure appropriate subscribers to all your AWS Simple Notification Service (SNS) topicsHighRemoval
  • CloudGuard AWS All Rules Ruleset
D9.GCP.NET.66Ensure that your backend services are enforcing HTTPSHighRemoval
  • CloudGuard GCP All Rules Ruleset

September 20 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.NET.04Ensure the default security group of every VPC restricts all trafficCriticalModification
  • Logic
  • SecurityGroup where name like 'default' should have inboundRules isEmpty() and outboundRules isEmpty()
  • SecurityGroup where name='default' should have inboundRules isEmpty() and outboundRules isEmpty()
  • AWS HIPAA
  • CloudGuard AWS Dashboards
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Network Alerts for default VPC components
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.36Ensure SageMaker notebook instance storage volumes are encrypted with Amazon KMS Customer Master Keys (CMKs)HighModification
  • Name
  • Logic
  • Severity
  • Ensure that SageMaker Notebook Instance Data Encryption with KMS CMKs is enabled
  • SageMakerNotebook where kmsKey should have kmsKey.isCustomerManaged=true
  • Low
  • Ensure SageMaker notebook instance storage volumes are encrypted with Amazon KMS Customer Master Keys (CMKs)
  • SageMakerNotebook should have kmsKeyId
  • High
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.DR.03Ensure AWS RDS retention policy is at least 7 daysMediumModification
  • Severity
  • High
  • Medium
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.VLN.03Amazon GuardDuty service is enabled in the regionLowModification
  • Name
  • Amazon GuardDuty service is enabled
  • Amazon GuardDuty service is enabled in the region
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS MAS TRM Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.GCP.IAM.08Ensure Kubernetes Cluster is created with Client Certificate disabledHighModification
  • Name
  • Logic
  • Ensure Kubernetes Cluster is created with Client Certificate enabled
  • GkeCluster should have isClientCertificateIssued=true
  • Ensure Kubernetes Cluster is created with Client Certificate disabled
  • GkeCluster should have isClientCertificateIssued=false
  • GCP NIST 800-53 Rev 5
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Foundations v. 1.0.0
  • GCP CloudGuard Best Practices
D9.AWS.CRY.116Ensure that Amazon Neptune graph database instances are encryptedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.119Ensure KMS Customer Master Keys (CMK) are in use to have full control over the encryption / decryption processHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.122Ensure IAM SSH public keys used for AWS CodeCommit are rotated on a periodic basis to adhere to AWS security best practices (45 days)MediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.124Ensure that envelope encryption of Kubernetes secrets using Amazon KMS is enabledCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.125Ensure AWS Glue connection has SSL configuredHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.126Ensure unused AWS EC2 key pairs are decommissioned to follow AWS security best practicesHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DNS.09Ensure that Sender Policy Framework (SPF) is used to stop spammers from spoofing your AWS Route 53 domainMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.06Identify and recover any KMS Customer Master Keys (CMK) scheduled for deletionCriticalModification
  • Logic
  • KMS where keyState='PendingDeletion' should have keyState='Disabled'
  • KMS where keyState='PendingDeletion' should have enabled=false
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
D9.AWS.IAM.164Ensure that your AWS root account is not using access keys as a security best practiceCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.165Ensure IAM Roles should not have Administrator Access PermissionsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.166Ensure that AWS resources are not publicly accessible through IAM policies.HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.167Ensure that AWS Lambda IAM policy should not overly permissive to all trafficHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.168Ensure that AWS Secrets Manager Secrets are not publicly accessible through IAM policiesHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.169Ensure AWS IAM User's SSH public key is rotated every 90 days or lessHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.170Detect when a canary token access key has been usedCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.171Ensure AWS KMS Key should not be publicly accessible through IAM policiesHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.41Ensure that AWS CloudWatch logs are enabled for all your APIs created with Amazon API Gateway service in order to track and analyze execution behavior at the API stage levelMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.42Ensure that at-rest encryption is enabled when writing Amazon Glue logs to CloudWatch LogsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.43Ensure AWS S3 Buckets configuration changes are being monitored using CloudWatch alarmsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.44Ensure AWS Route Tables configuration changes are being monitored using CloudWatch alarmsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.45Ensure Root Account Usage is being monitored using CloudWatch alarmsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.46Ensure AWS Network ACLs configuration changes are being monitored using CloudWatch alarmsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.47Ensure your AWS Console authentication process is being monitored using CloudWatch alarmsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.48Ensure AWS CMK configuration changes are being monitored using CloudWatch alarmsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.49Monitor for AWS Console Sign-In Requests Without MFAMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.50Ensure ElasticSearch domain Index slow logs should be enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.51Ensure ElasticSearch domain Search Slow Logs should be enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.52Ensure Amazon Config log files are delivered as expectedMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.53Ensure AWS VPC configuration changes are being monitored using CloudWatch alarmsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.54Ensure AWS VPC Customer/Internet Gateway configuration changes are being monitored using CloudWatch alarmsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.31Ensure there are no empty AWS Auto Scaling Groups (ASGs)MediumModification
  • Logic
  • AutoScalingGroup should not have elasticLoadBalancers isEmpty() and instances isEmpty()
  • AutoScalingGroup where targetGroups isEmpty() should not have elasticLoadBalancers isEmpty() and instances isEmpty()
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.33Ensure that each AWS Auto Scaling Group has an associated Elastic Load BalancerLowModification
  • Logic
  • AutoScalingGroup should not have elasticLoadBalancers isEmpty() and targetGroups isEmpty()
  • AutoScalingGroup where instances isEmpty() should not have elasticLoadBalancers isEmpty() and targetGroups isEmpty()
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.41Ensure that a data repository bucket is defined for Amazon Macie within each AWS regionMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.42Ensure AWS AppSync attached WAFv2 ACL configured with AMR to mitigate Log4j VulnerabilityHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1019Ensure that your AWS Network Load Balancer listeners are using a secure protocol such as TLSHighModification
  • Logic
  • NetworkLoadBalancer should have listeners contain-any [ protocol='TLS' ]
  • NetworkLoadBalancer should have listeners contain-all [ protocol='TLS' ]
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1026Ensure that AWS EKS security groups are configured to allow incoming traffic only on TCP port 443MediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.110Ensure no security group allows unrestricted inbound access to TCP port 1521HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.111Ensure every EC2 instance is launched inside an Auto Scaling Group (ASG) in order to follow AWS reliability and security best practicesHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.112Ensure that no Amazon EC2 security group allows unrestricted outbound accessLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.113Ensure that Amazon Security Hub findings are analyzed and resolvedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.114Ensure that Amazon Macie was run in the last 30 days and its security findings are highlighted, analyzed, and resolvedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.115Ensure no security group allows unrestricted inbound access to TCP port 5432HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.117Ensure no security group allows unrestricted inbound access to TCP port 135 (RPC)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.118Ensure no AWS EC2 security group allows unrestricted inbound access to TCP port 25 (SMTP)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.119Ensure no AWS EC2 security group allows unrestricted inbound access to TCP port 23HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.122Ensure AWS IAM SSH public keys are rotated on a periodic basis as a security best practiceLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.123Ensure that AWS route tables with VPC peering are not excessively permissive to all trafficHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.124Ensure appropriate subscribers to all your AWS Simple Notification Service (SNS) topicsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.125Ensure that your AWS SES identities (domains and/or email addresses) are not exposed to everyoneHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.126Ensure AWS EMR Cluster's Master Security Group does not allow all traffic to port 8088HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.127Ensure no security group allows inbound access on a range of portsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.128Ensure EC2 instances are launched using the EC2-VPC platform instead of the EC2-Classic outdated platformHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.129Ensure AWS VPC does not allow unauthorized peeringHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.27Ensure that the latest version of Redis is used for your AWS ElastiCache clustersLowModification
  • Logic
  • ElastiCache where engine='redis' should have engineVersion>='7.0.7'
  • ElastiCache where engine='redis' should have engineVersion in ($CloudGuard_Latest_Redis_Cluster_Versions)
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.28Ensure that the latest version of Memcached is used for your AWS ElastiCache clustersLowModification
  • Logic
  • ElastiCache where engine='memcached' should have engineVersion>='1.6.17'
  • ElastiCache where engine='memcached' should have engineVersion in ($CloudGuard_Latest_Memcached_Cluster_Versions)
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.55Ensure SNS topics do not allow Everyone to publishLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.56Ensure that your Amazon ECS instances are using the latest ECS container agent versionMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.57Ensure AWS Elastic IPs are in use.InformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.59Ensure unused VPC Internet Gateways and Egress-Only Internet Gateways are removed to follow best practicesLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.VLN.10Ensure that Amazon GuardDuty detectors are configured (non-empty list of GuardDuty detectors)LowModification
  • Name
  • Severity
  • Ensure Amazon GuardDuty is enabled to help you protect your AWS accounts and workloads against security threats
  • Medium
  • Ensure that Amazon GuardDuty detectors are configured (non-empty list of GuardDuty detectors)
  • Low
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
D9.AWS.VLN.11Ensure that Amazon Inspector Findings are analyzed and resolved (EC2)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.VLN.12Ensure that Amazon Inspector Findings are analyzed and resolved (ECR)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.VLN.13Ensure that Amazon Inspector Findings are analyzed and resolved (Lambda)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.CRY.63Ensure there is a sufficient period configured for the SSL certificates auto-renewalLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.60Ensure that Auto-Renewal feature is enabled for your Azure Key Vault SSL certificatesCriticalNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.61Ensure that your Azure Key Vault encryption keys are renewed prior to their expiration dateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.62Ensure that your Azure Key Vault secrets are renewed prior to their expiration dateHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.64Ensure there is more than one owner assigned to your Microsoft Azure subscriptionHighNew
  • CloudGuard Azure All Rules Ruleset
D9.GCP.CRY.25Ensure that Google Cloud backend services enforce HTTPS to handle encrypted web trafficHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.DR.04GKE Cluster should have Redundant ZonesHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.DR.05GKE Clusters with Auto-upgrade Enabled should be Adequately Sized to have at least Three NodesHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.39Users should not be Granted Write Permissions without a Valid Business JustificationHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.36IAM Policies should Restrict Public Access to GCP ResourcesCriticalNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.37IAM Users should not have Service Account PrivilegesHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.38Logs related to storage buckets should not be publicly accessibleHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.40Ensure Compute Engine does not have Permissions to Destroy DataHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.41Ensure Compute Engine does not have Write Permissions on Database Management ServiceHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.42Ensure Compute Engine does not have Permissions to Impersonate Service AccountsHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.43Ensure Compute Engine does not have Write Permissions on any Deny PolicyHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.LOG.36Google Cloud Kubernetes Engine Clusters should have Logging EnabledHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.LOG.37Ensure Logging is enabled for your Kubernetes engine clustersLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.MON.02Google Cloud Kubernetes Engine Clusters should have Monitoring EnabledHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.64Google Cloud SQL Instances should not be Configured with Overly Permissive Authorized NetworksHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.65Ensure IP forwarding is disabled for all instance templatesMediumNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.66Ensure that your backend services are enforcing HTTPSHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.67Ensure that no VPC firewall rules allow unrestricted outbound access on TCP or UDPHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.13Redis instances should use Standard Tier for High AvailabilityLowNew
  • CloudGuard GCP All Rules Ruleset
D9.ALI.DR.02Ensure that ECS data disk is not configured with 'release disk with instance feature'LowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.DR.03Ensure that Alibaba Cloud disk automatic snapshot policy is EnabledLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.LOG.28Ensure that ActionTrail logging is enabledLowModification
  • Logic
  • ActionTrail should havet railStatus.isLogging=true
  • ActionTrail should have railStatus.isLogging=true
  • CloudGuard Alibaba All Rules Ruleset
D9.OCI.MON.01Ensure OCI Compute Instances have monitoring enabledLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.MON.02Ensure OCI Object Storage buckets are enabled to emit object eventsLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.24Ensure OCI VCN has inbound security listsLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.25Ensure OCI VCN Security list has no stateful security rulesLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.26Ensure Network Security Groups (NSG) has no stateful security rulesLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.27Ensure OCI Kubernetes Engine Cluster pod security policy is enforcedLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.28Ensure OCI Kubernetes Engine Cluster endpoint is configured with Network Security GroupsLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.OPE.03Ensure OCI Compute Instance has Legacy MetaData service endpoint disabledHighNew
  • CloudGuard OCI All Rules Ruleset
D9.AWS.NET.1001Default Security Groups - with network policiesMediumRemoval
  • CloudGuard AWS Dashboards
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.104Ensure SageMaker notebook instance storage volumes are encrypted with Amazon KMS Customer Master Keys (CMKs)HighRemoval
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.107Ensure RDS instances are encrypted with KMS CMKs in order to have full control over data encryption and decryptionLowRemoval
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.112Ensure AWS S3 buckets enforce SSL to secure data in transitHighRemoval
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1009Ensure that OpenSearch domains are accessible from a Virtual Private CloudCriticalRemoval
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.50Ensure RDS instances have Multi-AZ enabledInformationalRemoval
  • CloudGuard AWS All Rules Ruleset

September 13 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.GCP.VLN.08Ensure '3625 (trace flag)' database flag for Cloud SQL SQL Server instance is set to 'on'MediumModification
  • Name
  • Logic
  • Ensure '3625 (trace flag)' database flag for Cloud SQL SQL Server instance is set to 'off'
  • CloudSql where databaseVersion like 'SQLSERVER%' should have settings.databaseFlags contain [ name like '3625' and value like 'off' ]
  • Ensure '3625 (trace flag)' database flag for Cloud SQL SQL Server instance is set to 'on'
  • CloudSql where databaseVersion like 'SQLSERVER%' should have settings.databaseFlags contain [ name like '3625' and value like 'on' ]
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.AWS.MON.16Ensure that the configuration recorder is set to 'on' and set S3 Bucket and SNS topic as your delivery channelLowModification
  • Logic
  • ConfigSetting where recordingIsOn=true should have deliveryChannel.s3BucketName and deliveryChannel.snsTopicARN
  • ConfigSetting should have recordingIsOn=true and deliveryChannel.s3BucketName and deliveryChannel.snsTopicARN
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS CCPA Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.109Ensure AWS FSx for Windows File Server file systems data is encrypted using AWS KMS CMKsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.114Ensure that Firehose delivery stream data records are encrypted at destinationLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.115Ensure that AWS Neptune instances enforce data-at-rest encryption using KMS CMKsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.118Ensure AWS Database Migration Service endpoints have SSL configuredLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.120Ensure IAM User does not have more than one active SSH public keyMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.121Ensure AWS Secrets Manager is in useLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.150IAM policy overly permissive to Lambda serviceCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.149Ensure that Multi-Factor Authentication (MFA) is enabled for your AWS root accountHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.152Ensure RDS instance has IAM authentication enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.153Ensure Additional Controls for External AWS Account Role Mapping and Approval for Cross-Account AccessHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.156Ensure AWS RDS cluster has IAM authentication enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.159Ensure there is at least one IAM user currently used to access your AWS accountMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.160Mapping and Approval of Roles Accessible by External Federated AccountsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.161Ensure AWS EC2 Instance is Devoid of Data Destruction Permissions for AWS Key Management Service (KMS)LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.162Restrict IamRole Assume Role Policies with Principal, in Order for Enhanced SecurityHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.154Ensure that Lambda functions should not have IAM roles with permissions for destructive actions on Amazon RDS databasesHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.157 Ensure that AWS Lambda function should not have org write access levelHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.158Ensure that AWS Lambda function should not have IAM write access levelHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.163Ensure no AWS IAM users have been inactive for a long (specified) period of timeHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.39Ensure that DNS query logging is enabled for your Amazon Route 53 hosted zonesHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.40Ensure that your AWS Elasticsearch domains publish slow logs to AWS CloudWatch LogsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.39AWS RDS event subscription should be enabled for DB instanceLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.40Ensure SNS topics do not allow Everyone to subscribeHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1020Ensure no AWS EC2 security group allows unrestricted inbound access to TCP port 445 (CIFS)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1021Ensure that Amazon ALBs are using the latest predefined security policy for their SSL/TLS negotiation configurationLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1022Ensure that Classic Load Balancers are using one of the latest predefined security policiesLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1023Ensure that no security group allows unrestricted inbound access on TCP/UDP port 11211HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1024Ensure that the access to your REST APIs is allowed to trusted IP addresses onlyLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1025Ensure that no security group allows unrestricted inbound access on TCP port 6379HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.98Ensure ELB listener uses a secure HTTPS or SSL protocolHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.99Ensure no security group contains RFC 1918 CIDRsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.100Ensure no AWS EC2 security group allows unrestricted inbound access to TCP and UDP port 53HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.107Ensure no security group allows unrestricted inbound access to TCP port 1433 and 3306 (MSSQL)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.101Ensure no security group allows unrestricted inbound access to TCP port 9200HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.102Make certain that unrestricted inbound access to TCP ports 20 and 21 is disallowed for all EC2 security groupsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.103Ensure no security group allows unrestricted inbound access to TCP port 80 (HTTP)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.105Ensure no security group allows unrestricted inbound access to TCP port 443 (HTTPS)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.106Ensure no security group allows unrestricted inbound access to ICMPHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.108Ensure that AWS Lambda function should not communicating with ports known to mine MoneroLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.109Ensure no AWS EC2 security group allows unrestricted inbound access to TCP port 139 and UDP ports 137, 138HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.42Ensure that your Amazon WorkSpaces instances are healthyHighModification
  • Logic
  • Workspace should have state='HEALTHY'
  • Workspace where state unlike 'STOPPED' should have state='HEALTHY'
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.47Ensure Amazon Neptune instances have Auto Minor Version Upgrade feature enabledMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.46Ensure RDS event subscriptions are enabled for DB security groupsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.52Ensure that AWS Neptune cluster deletion protection is enabledHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.48Ensure that RDS cluster delete protection is enabledMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.50Ensure RDS instances have Multi-AZ enabledInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.51Ensure that DocumentDB delete protection is enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.53Ensure Amazon Organizations is in use to consolidate all your AWS accounts into an organizationMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.54Ensure CloudFormation service is in use for defining your cloud architectures on Amazon Web ServicesLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.VLN.10Ensure Amazon GuardDuty is enabled to help you protect your AWS accounts and workloads against security threatsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.CRY.59Ensure Azure Container Instance environment variableLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.DR.05Ensure to activate geo-redundant backup for MariaDBLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.62Ensure to audit role assignments that have risky permissionsHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.63Ensure there are no Microsoft Azure Active Directory guest users if they are not neededHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.90Ensure Azure Container registries do not have Public access to All networks enabledHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.97Ensure that MariaDB is not publicly accessibleHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.98Ensure Host-Level Encryption is Enabled for VMSS InstancesMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.GCP.CRY.21Ensure that Cloud SQL server certificates are rotated (renewed) before their expirationLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.CRY.22Ensure that your virtual machine (VM) instance disks are encrypted using Customer-Managed Keys (CMKs)LowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.CRY.23Ensure there are no publicly accessible KMS cryptographic keys available within your Google Cloud accountCriticalNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.33Ensure that the use of Cloud Identity and Access Management (IAM) primitive roles is limited within your Google Cloud projectsMediumNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.35Ensure that your API key usage is restricted to trusted hosts and applications onlyHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.LOG.35Ensure that data access audit logs are enabled for all critical service APIs within your GCP projectLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.10Ensure Kubernetes Cluster has No Client Certificate IssuedHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.11Ensure that there is at least one sink configuration that has no inclusions or exclusion filters.HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.12Ensure that critical service APIs are enabled for your GCP projectsHighNew
  • CloudGuard GCP All Rules Ruleset
D9.OCI.NET.18Ensure no network security groups allow ingress from 0.0.0.0/0 to port 3306HighNew
  • CloudGuard OCI All Rules Ruleset
  • OCI CloudGuard Network Security Alerts
D9.OCI.NET.19Ensure no network security groups allow ingress from 0.0.0.0/0 to port 1521HighNew
  • CloudGuard OCI All Rules Ruleset
  • OCI CloudGuard Network Security Alerts
D9.OCI.NET.20Ensure no network security groups allow ingress from 0.0.0.0/0 to port 5432HighNew
  • CloudGuard OCI All Rules Ruleset
  • OCI CloudGuard Network Security Alerts
D9.OCI.NET.21Ensure no network security groups allow ingress from 0.0.0.0/0 to port 5900HighNew
  • CloudGuard OCI All Rules Ruleset
  • OCI CloudGuard Network Security Alerts
D9.OCI.NET.22Ensure no network security groups allow ingress from 0.0.0.0/0 to port 25HighNew
  • CloudGuard OCI All Rules Ruleset
  • OCI CloudGuard Network Security Alerts
D9.OCI.NET.23Ensure no network security groups allow ingress from 0.0.0.0/0 to port 7001HighNew
  • CloudGuard OCI All Rules Ruleset
  • OCI CloudGuard Network Security Alerts
D9.AWS.CRY.91Ensure that node-to-node encryption is enabled for your OpenSearch clustersHighRemoval
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.95To adhere to security and compliance standards, it is essential to guarantee that AWS RDS instances are encryptedLowRemoval
  • CloudGuard AWS All Rules Ruleset

September 06 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.GCP.NET.20Ensure that the default VPC network is not being used within your GCP projectsMediumModification
  • Name
  • Ensure That the Default Network Does Not Exist in a Project
  • Ensure that the default VPC network is not being used within your GCP projects
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP CloudGuard Network Security
  • GCP HIPAA
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.AWS.NET.73Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration portsHighModification
  • Logic
  • NACL should not have inbound with [ source='0.0.0.0/0' and action='ALLOW' and ( ( destinationPort<=22 and destinationPortTo>=22 ) or ( destinationPort<=3389 and destinationPortTo>=3389 ) ) ]
  • NACL should not have inbound with [ source='0.0.0.0/0' and action='ALLOW' and (( protocol in ('6','17','-1','TCP','UDP','ALL') and ( ( destinationPort<=22 and destinationPortTo>=22 ) or ( destinationPort<=3389 and destinationPortTo>=3389 ) ) ) )]
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.3.0
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.110Ensure that encryption at rest is enabled for Amazon Glue job bookmarksHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.101Ensure that your Amazon WorkSpaces storage volumes are encrypted in order to meet security and compliance requirementCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.103Ensure that Kinesis Data Firehose delivery streams enforce Server-Side Encryption, ideally using Customer-managed Customer Master KeysHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.104Ensure SageMaker notebook instance storage volumes are encrypted with Amazon KMS Customer Master Keys (CMKs)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.105Ensure EBS volumes are encrypted with CMKs to have full control over encrypting and decrypting dataCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.106Ensure unused IAM users are removed from AWS account to follow security best practiceMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.107Ensure RDS instances are encrypted with KMS CMKs in order to have full control over data encryption and decryptionLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.108Ensure that stage-level cache encryption is enabled for your Amazon API Gateway APIsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.111Ensure rotation for customer created CMKs is enabledHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.112Ensure AWS S3 buckets enforce SSL to secure data in transitHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.16Ensure that Amazon Aurora MySQL database clusters have backtracking enabledInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.17Ensure AWS Elastic Block Store (EBS) volumes have recent snapshots available for point-in-time recoveryHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.18Ensure on-demand backup and restore functionality is in use for AWS DynamoDB tablesHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.119Ensure IAM User is Restrained from Wildcard Access to All ResourcesLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.120Ensure AWS EC2 Instance Lacks IAM Write Access LevelMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.125Ensure IAM policy does not allow privilege escalation via Codestar create project and associate team member permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.126Ensure AWS IAM policy does not allow privilege escalation via EC2 Instance Connect permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.127Ensure AWS IAM policy prevents privilege escalation via EC2 and SSM permissions.MediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.128Ensure AWS IAM policy prevents escalation via EC2 describe and SSM session permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.129Ensure AWS IAM policy prevents escalation via Glue Dev Endpoint permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.130Ensure AWS IAM policy prevents escalation via PassRole & CodeBuild permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.131Ensure AWS IAM policy prevents escalation via PassRole & CreateProject permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.132Ensure AWS IAM policy prevents escalation via PassRole & Data Pipeline permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.133Ensure AWS IAM policy prevents escalation via PassRole & EC2 permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.134Ensure AWS IAM policy prevents escalation via PassRole & Glue create job permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.135Ensure AWS IAM policy prevents escalation via PassRole & Glue development endpoint permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.136Ensure AWS IAM policy prevents escalation via PassRole & Glue update job permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.137Ensure AWS IAM policy prevents escalation via PassRole & Lambda create and invoke function permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.138Ensure AWS IAM policy prevents escalation via PassRole, Lambda create function, and event source mapping permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.139Ensure AWS IAM policy prevents escalation via PassRole, Lambda create function, and add permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.140Ensure AWS IAM policy prevents escalation via PassRole & SageMaker create notebook permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.141Ensure AWS IAM policy prevents escalation via PassRole & SageMaker create processing job permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.142Ensure AWS IAM policy prevents escalation via PassRole & SageMaker create training job permissionsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.144Ensure there are no Lambda functions with admin privileges within your AWS accountHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.145Ensure AWS IAM policies are attached to groups instead of users as an IAM best practiceLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.146Ensure that root account credentials have not been used recently to access your AWS accountHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.28Ensure cloud trail capturing management eventsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.29Ensure AWS ACM Certificates Have Valid Logging and StatusLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.37Enable user activity logging for your Amazon Redshift clusters to track who has accessed your clusters and what activities they have performed.LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.38Ensure that AWS CloudWatch logging is enabled for Amazon Transfer for SFTP user activityLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.37Ensure that detailed CloudWatch metrics are enabled for all APIs created with AWS API Gateway service in order to monitor API stages caching, latency and detected errors at a more granular level and set alarms accordinglyLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.38Ensure that Amazon MQ brokers are using the network of brokers configurationHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1014Ensure AWS Redshift non-default parameter groups require SSL to secure data in transitCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1015Ensure that EKS cluster's Kubernetes API endpoints are not publicly accessibleCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1016Ensure that your Amazon RDS database snapshots are not accessible to all AWS accountsCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1017Ensure that Amazon Transfer for SFTP servers are using AWS PrivateLink for their endpointsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1018Ensure that Drop Invalid Header Fields feature is enabled for your Application Load Balancers to remove non-standard headersHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1019Ensure that your AWS Network Load Balancer listeners are using a secure protocol such as TLSHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.25Ensure EKS cluster version is up to dateInformationalModification
  • Name
  • Logic
  • Ensure EKS cluster version is up-to-date
  • EksCluster should have version split('.') getValue(1) >= 25
  • Ensure EKS cluster version is up to date
  • EksCluster should have version split('.') getValue(1) >= 27
  • CloudGuard AWS All Rules Ruleset
  • AWS Foundational Security Best Practices (FSBP) standard
  • AWS CloudGuard Best Practices
D9.AWS.OPE.36Ensure RDS event subscriptions are enabled for instance level eventsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.37Ensure there is a Dead Letter Queue configured for each Lambda function available in your AWS accountLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.38Ensure that REST APIs created with Amazon API Gateway have response caching enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.41Ensure EC2 instances are not too oldMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.39Ensure ElastiCache clusters are using the latest generation of nodes for cost and performance improvementsMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.40Ensure that AWS S3 buckets utilize lifecycle configurations to manage S3 objects during their lifetimeLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.42Ensure that your Amazon WorkSpaces instances are healthyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.44Ensure all Elastic Network Interfaces are in useLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.45Ensure EC2 Instances are Protected against Termination ActionsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.CRY.56Ensure no Azure Data Explorer cluster is configured without disk encryptionLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.57Ensure Azure Function App use HTTP 2.0HighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.58Ensure Service Fabric cluster is configured with cluster protection level securityLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.56Ensure that critical Azure Blob Storage data is protected from accidental deletion or modificationHighModification
  • Logic
  • StorageAccount where blobContainers should have contain-all [ hasLegalHold=true or hasImmutabilityPolicy=true ]
  • StorageAccount where blobContainers should have $ contain-all [ hasLegalHold=true or hasImmutabilityPolicy=true ]
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.60Ensure that Azure Recovery Services vault is configured with managed identityLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.61Ensure that a resource locking administrator role is available for each Azure subscriptionHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.88Ensure that an activity log alert is created for Delete PostgreSQL Database eventsHighModification
  • Logic
  • ActivityLogAlertRule should have condition.allOf contain [ equals='Microsoft.DBforPostgreSQL/servers/delete' ]
  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.DBforPostgreSQL/servers/delete'] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.90Ensure that the health of your Microsoft Azure scale set instances is being monitoredLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.91Ensure that an activity log alert is created for Delete MySQL Database eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.92Ensure that an activity log alert is created for Create/Update PostgreSQL Database eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.93Ensure that an activity log alert is created for Create/Update MySQL Database eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.94Ensure that an activity log alert is created for Update Key Vault MicrosoftKeyVault/vaults eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.95Ensure that an activity log alert exists for Power Off Virtual Machine eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.96Ensure that an activity log alert exists for Delete Virtual Machine eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.97Ensure that an activity log alert exists for Delete Storage Account eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.98Ensure there is an Azure activity log alert created for Delete Load Balancer eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.99Ensure there is an activity log alert created for the Delete Key Vault eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.100Ensure that an activity log alert is created for Delete Azure SQL Database (MicrosoftSql/servers/databases) eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.101Ensure that an activity log alert is created for the Deallocate Virtual Machine (MicrosoftCompute/virtualMachines) eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.102Ensure there is an activity log alert created for the Create/Update Storage Account eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.103Ensure that an activity log alert is created for Create/Update Azure SQL Database eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.104Ensure that an activity log alert is created for Create or Update Virtual Machine (MicrosoftCompute/virtualMachines) eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.105Ensure that an activity log alert is created for Rename Azure SQL Database eventsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.106Ensure that Microsoft Defender for Cloud plans are subscribed for all resourcesHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.87Ensure that Azure Postgre SQL Flexible Server access is limited and not allowed overly permissiveMediumModification
  • Logic
  • Severity
  • PostgreSQLFlexibleServer where properties.publicNetworkAccess='Enabled' should not have firewallRules contain [ properties.startIpAddress='0.0.0.0' or properties.endIpAddress like '255.255.255.255' ]
  • Low
  • PostgreSQLFlexibleServer where properties.publicNetworkAccess='Enabled' should not have firewallRules contain [ properties.startIpAddress='0.0.0.0' and properties.endIpAddress like '255.255.255.255' ]
  • Medium
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.88Identify and remove empty virtual machine scale sets from your Azure cloud accountLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.89Ensure Azure Application Gateway Web application firewall (WAF) policy rule for Remote Command Execution is enabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.91Ensure Azure Virtual Machine (Windows) secure boot feature is EnabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.92Ensure Azure Virtual Machine vTPM feature is enabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.93Ensure Azure Front Door Web application firewall (WAF) policy rule for Remote Command Execution is enabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.94Ensure Azure Front Door Web application firewall (WAF) is enabledHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.95Ensure that FTP-Control (TCP:21) is restricted from the InternetCriticalNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.96Ensure that your Azure virtual machine scale sets are using load balancers for traffic distributionMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.04Ensure that Automatic OS Upgrades feature is enabled for your Azure virtual machine scale setsHighNew
  • CloudGuard Azure All Rules Ruleset
D9.GCP.AS.16Ensure that MySQL database servers are using the latest major version of MySQL databaseLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.AS.17Ensure that your production Google Cloud virtual machine instances are not preemptibleLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.CRY.17SSL Policy Profile should be Restricted for HTTPS Load BalancerHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.CRY.18TLS Version should be v1.2 or Later for SSL Policy on HTTPS Load BalancerHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.CRY.19Default SSL Policy should be Replaced by a Stricter Policy for HTTPS Load Balancer Target ProxyHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.CRY.20SQL Instances should have Valid SSL ConfigurationsHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.LOG.34Ensure that logging is enabled for your Virtual Private Cloud (VPC) firewall rulesLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.51Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP port 3306 (MySQL Database)CriticalModification
  • Logic
  • Network should not have firewallRules contain [ allowed contain [ ipProtocol='tcp' and (ports contain [ '3306' ] or ( ports contain [ $ split('-') getValue(0) <= 3306 and $ split('-') getValue(1) >= 3306] )) ] and sourceRanges with [ '0.0.0.0/0' ] ]
  • Network should not have firewallRules contain [ direction ='Ingress' and allowed contain [ ipProtocol='tcp' and (ports contain [ '3306' ] or ( ports contain [ $ split('-') getValue(0) <= 3306 and $ split('-') getValue(1) >= 3306] )) ] and (sourceRanges with [ '0.0.0.0/0' ] or sourceRanges with ['::/0'])]
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.52Ensure that no VPC firewall rules allow unrestricted inbound access on TCP port 5432 (PostgreSQL Database Server)CriticalModification
  • Logic
  • Network should not have firewallRules contain [ allowed contain [ ipProtocol='tcp' and (ports contain [ '5432' ] or ( ports contain [ $ split('-') getValue(0) <= 5432 and $ split('-') getValue(1) >= 5432] )) ] and sourceRanges with [ '0.0.0.0/0' ] ]
  • Network should not have firewallRules contain [ direction ='Ingress' and allowed contain [ ipProtocol='tcp' and (ports contain [ '5432' ] or ( ports contain [ $ split('-') getValue(0) <= 5432 and $ split('-') getValue(1) >= 5432] )) ] and (sourceRanges with [ '0.0.0.0/0' ] or sourceRanges with ['::/0'])]
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.53Ensure that no VPC firewall rules allow unrestricted inbound access on TCP port 1433 (Microsoft SQL Server)CriticalModification
  • Logic
  • Network should not have firewallRules contain [ allowed contain [ ipProtocol='tcp' and (ports contain [ '1433' ] or ( ports contain [ $ split('-') getValue(0) <= 1433 and $ split('-') getValue(1) >= 1433] )) ] and sourceRanges with [ '0.0.0.0/0' ] ]
  • Network should not have firewallRules contain [ direction ='Ingress' and allowed contain [ ipProtocol='tcp' and (ports contain [ '1433' ] or ( ports contain [ $ split('-') getValue(0) <= 1433 and $ split('-') getValue(1) >= 1433] )) ] and (sourceRanges with [ '0.0.0.0/0' ] or sourceRanges with ['::/0'])]
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.54Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP or UDP on port 53 (DNS)HighModification
  • Logic
  • Network should not have firewallRules contain [ allowed contain [ (ipProtocol='udp' or ipProtocol='tcp') and (ports contain [ '53' ] or ( ports contain [ $ split('-') getValue(0) <= 53 and $ split('-') getValue(1) >= 53] )) ] and sourceRanges with [ '0.0.0.0/0' ] ]
  • Network should not have firewallRules contain [ direction ='Ingress' and allowed contain [ (ipProtocol='udp' or ipProtocol='tcp') and (ports contain [ '53' ] or ( ports contain [ $ split('-') getValue(0) <= 53 and $ split('-') getValue(1) >= 53] )) ] and (sourceRanges with [ '0.0.0.0/0' ] or sourceRanges with ['::/0'])]
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.55Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP port 3389 (RDP)HighModification
  • Logic
  • Network should not have firewallRules contain [ allowed contain [ ipProtocol='tcp' and (ports contain [ '3389 ' ] or ( ports contain [ $ split('-') getValue(0) <= 3389 and $ split('-') getValue(1) >= 3389 ] )) ] and sourceRanges with [ '0.0.0.0/0' ] ]
  • Network should not have firewallRules contain [ direction ='Ingress' and allowed contain [ ipProtocol='tcp' and (ports contain [ '3389' ] or ( ports contain [ $ split('-') getValue(0) <= 3389 and $ split('-') getValue(1) >= 3389] )) ] and (sourceRanges with [ '0.0.0.0/0' ] or sourceRanges with ['::/0'])]
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.56Ensure that no VPC firewall rules allow unrestricted inbound access on TCP port 25 (SMTP)HighModification
  • Logic
  • Network should not have firewallRules contain [ allowed contain [ ipProtocol='tcp' and (ports contain [ '25' ] or ( ports contain [ $ split('-') getValue(0) <= 25 and $ split('-') getValue(1) >= 25] )) ] and sourceRanges with [ '0.0.0.0/0' ] ]
  • Network should not have firewallRules contain [ direction ='Ingress' and allowed contain [ ipProtocol='tcp' and (ports contain [ '25' ] or ( ports contain [ $ split('-') getValue(0) <= 25 and $ split('-') getValue(1) >= 25] )) ] and (sourceRanges with [ '0.0.0.0/0' ] or sourceRanges with ['::/0'])]
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.57Ensure that no VPC firewall rules allow unrestricted inbound access on TCP port 22 (SSH)HighModification
  • Logic
  • Network should not have firewallRules contain [ allowed contain [ ipProtocol='tcp' and (ports contain [ '22' ] or ( ports contain [ $ split('-') getValue(0) <= 22 and $ split('-') getValue(1) >= 22] )) ] and sourceRanges with [ '0.0.0.0/0' ] ]
  • Network should not have firewallRules contain [ direction ='Ingress' and allowed contain [ ipProtocol='tcp' and (ports contain [ '22' ] or ( ports contain [ $ split('-') getValue(0) <= 22 and $ split('-') getValue(1) >= 22] )) ] and (sourceRanges with [ '0.0.0.0/0' ] or sourceRanges with ['::/0'])]
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.58Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP port 1521 (Oracle Database)HighModification
  • Logic
  • Network should not have firewallRules contain [ allowed contain [ ipProtocol='tcp' and (ports contain [ '1521' ] or ( ports contain [ $ split('-') getValue(0) <= 1521 and $ split('-') getValue(1) >= 1521] )) ] and sourceRanges with [ '0.0.0.0/0' ] ]
  • Network should not have firewallRules contain [ direction ='Ingress' and allowed contain [ ipProtocol='tcp' and (ports contain [ '1521' ] or ( ports contain [ $ split('-') getValue(0) <= 1521 and $ split('-') getValue(1) >= 1521] )) ] and (sourceRanges with [ '0.0.0.0/0' ] or sourceRanges with ['::/0'])]
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.59Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP port 135 (Remote Procedure Call)HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.60Ensure that no VPC firewall rules allow unrestricted inbound access on TCP ports 20 or 21 (File Transfer Protocol FTP)HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.61Ensure that no VPC firewall rules allow unrestricted inbound access using Internet Control Message Protocol (ICMP)HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.63HTTPS Load Balancer should have QUIC EnabledLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.09Ensure VM instance has custom metadataLowNew
  • CloudGuard GCP All Rules Ruleset
D9.ALI.DR.01Ensure that ECS data disk is configured with delete automatic snapshots featureLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.IAM.20Ensure RAM password policy won't allow login after the password expiresLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.IAM.21Ensure ECS Instances release protection is enabledLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.NET.32Ensure SLB delete protection is enabledLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.OCI.NET.09Ensure no network security groups allow ingress from 0.0.0.0/0 to port 53HighNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.10Ensure no network security groups allow ingress from 0.0.0.0/0 to port 2483HighNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.11Ensure no network security groups allow ingress from 0.0.0.0/0 to port 27017HighNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.12Ensure no network security groups allow ingress from 0.0.0.0/0 to port 6379HighNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.13Ensure no network security groups allow ingress from 0.0.0.0/0 to port 80HighNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.14Ensure no network security groups allow ingress from 0.0.0.0/0 to port 20HighNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.15Ensure no network security groups allow ingress from 0.0.0.0/0 to port 21HighNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.16Ensure no network security groups allow ingress from 0.0.0.0/0 to port 1434HighNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.17Ensure no network security groups allow ingress from 0.0.0.0/0 to port 1433HighNew
  • CloudGuard OCI All Rules Ruleset

August 30 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.IAM.57Ensure that admin user is disabled for Container RegistryLowNew
  • Azure CloudGuard CheckUp
  • Azure NIST 800-53 Rev 5
  • CloudGuard Azure All Rules Ruleset
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.OPE.01Ensure Container Registry has locksLowNew
  • Azure CloudGuard CheckUp
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.IAM.58Enable role-based access control (RBAC) within Azure Kubernetes ServicesLowNew
  • Azure CIS Foundations v. 1.4.0
  • Azure NIST 800-53 Rev 5
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure CIS Foundations v. 1.3.1
D9.AWS.OPE.21Ensure Auto Scaling group have scaling cooldown higher than a minuteLowModification
  • Name
  • Ensure Auto Scaling group have scaling cooldown configured
  • Ensure Auto Scaling group have scaling cooldown higher than a minute
  • AWS NIST 800-53 Rev 5
  • AWS HITRUST v11.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS HITRUST
D9.AWS.CRY.91Ensure that node-to-node encryption is enabled for your OpenSearch clustersHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.92Ensure that at-rest encryption is enabled when writing AWS Glue data to Amazon S3LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.93Ensure that ECR Registry-level configuration is enabled for image scanningHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.94Ensure that your OpenSearch domains are encrypted using KMS Customer Master KeysLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.95To adhere to security and compliance standards, it is essential to guarantee that AWS RDS instances are encryptedLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.96Ensure ElastiCache AUTH feature enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.97Ensure that in-transit encryption is enabled for your Amazon OpenSearch domainsCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.98Ensure Amazon Certificate Manager (ACM) certificates are renewed before their expiration (7 Days)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.99Ensure Amazon Certificate Manager (ACM) certificates are renewed before their expiration (45 Days)LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.100Ensure that Amazon Glue Data Catalog objects and connection passwords are encryptedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.12Ensure high availability for your OpenSearch clusters by enabling the Zone Awareness featureLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.13Ensure that OpenSearch clusters are using dedicated master nodes to increase the production environment stabilityLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.14Ensure AWS RDS instances have Automated Backups feature enabledHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.116Follow proper naming conventions for Virtual Private CloudsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.118Ensure IAM User Write Access is ProhibitedLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.117Ensure IAM User Organization Write Access is ProhibitedHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.121Ensure AWS EC2 Instance is Devoid of Data Destruction PermissionsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.122Ensure AWS EC2 Instance is Devoid of Database Management Write Access PermissionsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.123Ensure EC2 Instances do not have S3 AccessLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.124Ensure AWS EC2 instance does not have the permission to create a new Group with an attached policyHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.31Ensure CloudTrail trails are configured to log Data eventsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.32Ensure alert notifications for important events within your Amazon Elastic Beanstalk environmentLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.33Ensure that access logging is enabled for your Elastic Beanstalk environment load balancerMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.34Ensure persistent logs are enabled for your Amazon Elastic Beanstalk environmentsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.35Ensure AWS RDS utilizes secure and unique master usernames for database securityHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.36Ensure that CloudTrail trails record API calls for global services such as IAM, STS, and CloudFrontMediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.30Check for any AMIs older than 180 days available within your AWS accountLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.31Ensure there are no empty AWS Auto Scaling Groups (ASGs)MediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.33Ensure that each AWS Auto Scaling Group has an associated Elastic Load BalancerLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.32Ensure Amazon CloudTrail trail log files are delivered as expectedLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.34Ensure that X-Ray tracing is enabled for your Amazon Elastic Beanstalk environmentsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.35Ensure Enhanced Health Reporting is enabled for your AWS Elastic Beanstalk environmentsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.36Ensure your AWS CloudFormation stacks are integrated with Simple Notification Service (SNS)MediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1006Ensure unused Virtual Private Gateways are removedCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1007Ensure that only approved IP addresses can access your Amazon OpenSearch domainsCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1008Ensure Amazon Redshift clusters are launched within a Virtual Private CloudInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1009Ensure that OpenSearch domains are accessible from a Virtual Private CloudCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1010Enforce HTTPS for Amazon Elastic Beanstalk environment load balancersHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1011Ensure that your CloudFront distributions are using an origin access identity for their origin S3 bucketsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1012Instance should not have a public IP addressHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1013Ensure that security groups are using proper naming conventions.LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.29Ensure enhanced monitoring is enabled for your AWS Kinesis streams using shard-level metricsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.30Ensure Amazon Auto Scaling Groups have cooldown periods enabled HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.31Ensure that your OpenSearch domains are using the latest version of the TLS security policyLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.32Verify that Redshift clusters are utilizing the most up-to-date node generations to enhance performanceLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.33Ensure managed platform updates are enabled for your AWS Elastic Beanstalk environmentsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.34Ensure that AWS Cloudfront web distributions are configured to compress objects (files) automaticallyLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.35Ensure that the latest version of OpenSearch engine is used for your OpenSearch domainsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.NET.84Ensure that a network policy is in place to secure traffic between podsLowNew
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure CloudGuard Best Practices
D9.AZU.NET.83Ensure that Azure CNI Networking is enabledLowNew
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure CloudGuard Best Practices
D9.AZU.CRY.52Ensure 'Enforce SSL connection' is set to 'Enabled' for Azure MariaDB database ServerHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.53Ensure Azure AKS cluster HTTP application routing is disabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.54Ensure no Azure AKS cluster is configured without disk encryptionLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.CRY.55Ensure Azure MySQL Database Server is using a secure TLS versionHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.55Ensure that no Azure user, group or application has full permissions to access and manage Key VaultsHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.56Ensure that critical Azure Blob Storage data is protected from accidental deletion or modificationHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.59Configure your Microsoft Azure virtual machines to use Azure Active Directory credentials for secure authentication.CriticalNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.LOG.19Ensure that Diagnostic Logs are enabled for the supported Azure cloud resourcesHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.LOG.20Ensure Azure AKS cluster monitoring is enabledLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.89Ensure that a security contact phone number is provided in the Microsoft Defender for Cloud settingsLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.78Ensure that default network access rule is set to 'Deny' within your Azure Key Vaults configurationHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.79Ensure that Private Endpoints are Used for Azure MariaDb database ServerMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.80Ensure that Azure Storage account access is limited only to specific IP addressesLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.81Ensure that MariaDB database servers are using the latest version of the TLS protocolCriticalNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.82Ensure Azure Database for MySQL server is configured with private endpointMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.85Ensure PostgreSQL database server is not allowed public network accessHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.86Ensure that Private Endpoints are Used for Azure PostgreSQL database ServerMediumNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.87Ensure that Azure Postgre SQL Flexible Server access is limited and not allowed overly permissiveLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.OPE.02Ensure that your Cluster Pool contains at least 3 NodesLowNew
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.OPE.03Ensure to not use the deprecated Classic registryLowNew
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.GCP.AS.12Ensure that PostgreSQL database instances have the appropriate configuration set for the 'max_connections' flagLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.AS.13Ensure that automatic storage increase is enabled for your Cloud SQL database instancesHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.AS.14Ensure that PostgreSQL database servers are using the latest major version of PostgreSQL databaseLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.AS.15Ensure that the Auto-Delete feature is disabled for the disks attached to your VM instancesHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.DR.03Ensure that production SQL database instances are configured to automatically fail over to another zone within the selected cloud regionCriticalNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.31Ensure Compute Engine does not have predefined Admin rolesCriticalNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.32Ensure Compute Engine does not have IAM Write access levelHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.LOG.31Ensure that logging is enabled for Google Cloud load balancing backend servicesLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.LOG.32Ensure that MySQL database instances have the 'slow_query_log' flag set to On (enabled)LowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.LOG.33Ensure storage bucket does not send logs to itselfLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.39Ensure Firewall default rules are not overly permissiveHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.40Ensure Firewall rule does not allow all traffic on port 21 - FTPHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.41Ensure Firewall rule does not allow all traffic on port 80 - HTTPHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.42Ensure Firewall rule does not allow all traffic on port 445 - Microsoft-DSCriticalNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.43Ensure Firewall rule does not allow all traffic on port 27017 - MongoDBHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.44Ensure Firewall rule does not allow all traffic on port 139 - NetBIOS-SSNHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.45Ensure Firewall rule does not allow all traffic on port 1521 - Oracle DBHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.46Ensure Firewall rule does not allow all traffic on port 110 - POP3HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.47Ensure Firewall rule does not allow all traffic on port 23 - TelnetHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.48Ensure Firewall rule does not expose GKE clusters by allowing all traffic on port 10250HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.49Ensure Firewall rule does not expose GKE clusters by allowing all traffic on port 10255HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.50Ensure no inbound rule exists that is overly permissive to allow all traffic from InternetHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.51Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP port 3306 (MySQL Database)CriticalNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.52Ensure that no VPC firewall rules allow unrestricted inbound access on TCP port 5432 (PostgreSQL Database Server)CriticalNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.53Ensure that no VPC firewall rules allow unrestricted inbound access on TCP port 1433 (Microsoft SQL Server)CriticalNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.54Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP or UDP on port 53 (DNS)HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.55Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP port 3389 (RDP)HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.56Ensure that no VPC firewall rules allow unrestricted inbound access on TCP port 25 (SMTP)HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.57Ensure that no VPC firewall rules allow unrestricted inbound access on TCP port 22 (SSH)HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.58Ensure there are no VPC firewall rules that allow unrestricted inbound access on TCP port 1521 (Oracle Database)HighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.06Ensure that automatic restart is enabled for your Google Cloud virtual machine (VM) instancesHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.07Ensure that deletion protection is enabled for your Google Cloud virtual machine (VM) instancesHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.OPE.08Ensure that 'On Host Maintenance' configuration setting is set to 'Migrate' for all VM instancesHighNew
  • CloudGuard GCP All Rules Ruleset
D9.ALI.LOG.28Ensure that ActionTrail logging is enabledLowNew
  • CloudGuard Alibaba All Rules Ruleset
D9.OCI.IAM.11Ensure IAM password policy require at least one lowercase letterLowNew
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.12Ensure IAM password policy require at least one uppercase letterLowNew
  • CloudGuard OCI All Rules Ruleset
D9.AZU.AKS.01Ensure that admin user is disabled for Container RegistryLowRemoval
  • Azure CloudGuard CheckUp
  • Azure NIST 800-53 Rev 5
  • CloudGuard Azure All Rules Ruleset
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.AKS.02Ensure Container Registry has locksLowRemoval
  • Azure CloudGuard CheckUp
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.AKS.08Enable role-based access control (RBAC) within Azure Kubernetes ServicesLowRemoval
  • Azure CIS Foundations v. 1.4.0
  • Azure NIST 800-53 Rev 5
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.AKS.05Ensure that a network policy is in place to secure traffic between podsLowRemoval
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure CloudGuard Best Practices
D9.AZU.AKS.06Ensure that Azure CNI Networking is enabledLowRemoval
  • CloudGuard Azure All Rules Ruleset
  • Azure CSA CCM v.4.0.1
  • Azure CloudGuard Best Practices
D9.AZU.AKS.07Ensure that your Cluster Pool contains at least 3 NodesLowRemoval
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.AKS.09Ensure to not use the deprecated Classic registryLowRemoval
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices

August 23 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.NET.67Ensure that all authorization Type in API Gateway are not set to NoneHighModification
  • Logic
  • ApiGateway should not have resources contain-any [ methods contain-any [ authorizationType='NONE' ] ]
  • ApiGateway where not authorizers should not have resources contain-any [ methods contain-any [ authorizationType='NONE' ] ]
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • CloudGuard AWS All Rules Ruleset
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.ALI.NET.03Ensure no security groups allow ingress from 0.0.0.0/0 to port 22 - SSHHighModification
  • Name
  • Ensure no security groups allow ingress from 0.0.0.0/0 to port 22
  • Ensure no security groups allow ingress from 0.0.0.0/0 to port 22 - SSH
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.NET.04Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 - RDPHighModification
  • Name
  • Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389
  • Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 - RDP
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.AWS.AS.11Identify and remove any unused AWS DynamoDB tables to optimize AWS costsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.88Ensure that Amazon DocumentDB clusters data is encrypted at restHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.89Ensure API Gateway endpoints has client certificate authenticationLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.CRY.90Ensure that Amazon DocumentDB clusters are encrypted with KMS Customer Master Keys (CMKs)HighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DNS.08Ensure AWS SES identities (email addresses and/or domains) are verifiedLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.06Identify and recover any KMS Customer Master Keys (CMK) scheduled for deletionCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.07Ensure that Amazon Aurora clusters have Copy Tags to Snapshots feature enabledInformationalNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.09Ensure that Deletion Protection feature is enabled for your Aurora database clusters (provisioned and serverless)MediumNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.10Ensure Termination Protection feature is enabled for EC2 instances that are not part of ASGsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.11Ensure AWS DocumentDB clusters have a sufficient backup retention period set for compliance purposesLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.1020Ensure IAM Database Authentication feature is enabled for Amazon Neptune clustersHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.IAM.115Ensure that Amazon Lambda functions are referencing active execution rolesLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.25Ensure AWS Identity and Access Management (IAM) user passwords are reset before expiration (30 Days)LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.26Ensure AWS Identity and Access Management (IAM) user passwords are reset before expiration (45 Days)LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.LOG.27Ensure CloudTrail Logging is EnabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.28Ensure DKIM signing is enabled in AWS SES to protect email senders and receivers against phishing.LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.MON.29Enable AWS DocumentDB Log ExportsLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1003Verify that there are no Amazon RDS database instances currently operational within the public subnets of our AWS Virtual Private Cloud (VPC).LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1004Ensure that your Amazon Lambda functions have access to VPC-only resources.LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1005Ensure Amazon MQ brokers are not publicly accessible and prone to security risksHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.96Ensure AppSync has WAFLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.97Ensure IMDS Response Hop Limit is Set to OneLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.26Make certain your AWS MQ brokers are running on the most up-to-date version of the Apache ActiveMQ engine.LowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.27Ensure that the latest version of Redis is used for your AWS ElastiCache clustersLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.OPE.28Ensure that the latest version of Memcached is used for your AWS ElastiCache clustersLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.VLN.09Ensure Aurora PostgreSQL is not exposed to local file read vulnerabilityCriticalNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.MON.88Ensure that an activity log alert is created for Delete PostgreSQL Database eventsHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.74Ensure that HTTP protocol (TCP:80) is restricted from the InternetHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.75Ensure that HTTPS protocol (TCP:443) is restricted from the InternetHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.76Ensure that PostgreSQL database servers are using the latest major version of PostgreSQL databaseHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.77Ensure that Azure Redis Cache servers are using the latest version of the TLS protocolCriticalNew
  • CloudGuard Azure All Rules Ruleset
D9.GCP.AS.10Ensure there is an automatic storage increase limit configured for your Cloud SQL database instancesLowNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.AS.11Ensure that SQL Server database instances have the appropriate configuration set for the 'user connections' flagHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.IAM.30Ensure GCP IAM user does not have permissions to deploy all resourcesHighNew
  • CloudGuard GCP All Rules Ruleset
D9.GCP.NET.38Ensure Google Cloud Function is configured with a VPC connectorHighNew
  • CloudGuard GCP All Rules Ruleset
D9.ALI.NET.17Ensure no security groups allow ingress from 0.0.0.0/0 to port 53 - DNSHighNew
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.NET.18Ensure no security groups allow ingress from 0.0.0.0/0 to port 2483 - unencrypted Oracle DBHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.19Ensure no security groups allow ingress from 0.0.0.0/0 to port 27017 - unencrypted Mongo DBHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.20Ensure no security groups allow ingress from 0.0.0.0/0 to port 6379 - unencrypted RedisHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.21Ensure no security groups allow ingress from 0.0.0.0/0 to port 80 - HTTPHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.22Ensure no security groups allow ingress from 0.0.0.0/0 to port 20 - FTP-DataHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.23Ensure no security groups allow ingress from 0.0.0.0/0 to port 21 - FTPHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.24Ensure no security groups allow ingress from 0.0.0.0/0 to port 1434 - MSSQL AdminHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.25Ensure no security groups allow ingress from 0.0.0.0/0 to port 1433 - MSSQL ServerHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.26Ensure no security groups allow ingress from 0.0.0.0/0 to port 3306 - MySQLHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.27Ensure no security groups allow ingress from 0.0.0.0/0 to port 1521 - unencrypted Oracle DBHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.28Ensure no security groups allow ingress from 0.0.0.0/0 to port 5432 - Postgres SQLHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.29Ensure no security groups allow ingress from 0.0.0.0/0 to port 5900 - VNC ServerHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.30Ensure no security groups allow ingress from 0.0.0.0/0 to port 25 - SMTPHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts
D9.ALI.NET.31Ensure no security groups allow ingress from 0.0.0.0/0 to port 7001 - CassandraHighNew
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba CloudGuard Network Security Alerts

August 16 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.K8S.CRY.19Ensure that the --service-account-key-file argument is set as appropriate (API Server) (Openshift)LowModification
  • Name
  • Ensure that the --service-account-key-file argument is set as appropriate (API Server) (Openshift)
  • Ensure that the --service-account-key-file argument is set as appropriate (API Server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.CRY.20Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server) (Openshift)HighModification
  • Name
  • Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server) (Openshift)
  • Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.CRY.21Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server) (Openshift)HighModification
  • Name
  • Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server) (Openshift)
  • Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.CRY.24Ensure that the --encryption-provider-config argument is set as appropriate (API Server) (Openshift)HighModification
  • Name
  • Ensure that the --encryption-provider-config argument is set as appropriate (API Server) (Openshift)
  • Ensure that the --encryption-provider-config argument is set as appropriate (API Server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
D9.K8S.CRY.26Ensure that the API Server only makes use of Strong Cryptographic Ciphers (API Server) (Openshift)HighModification
  • Name
  • Ensure that the API Server only makes use of Strong Cryptographic Ciphers (API Server) (Openshift)
  • Ensure that the API Server only makes use of Strong Cryptographic Ciphers (API Server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
D9.K8S.CRY.28Ensure that the --use-service-account-credentials argument is set to true (Controller Manager) (Openshift)LowModification
  • Name
  • Ensure that the --use-service-account-credentials argument is set to true (Controller Manager) (Openshift)
  • Ensure that the --use-service-account-credentials argument is set to true (Controller Manager) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.CRY.29Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager) (Openshift)LowModification
  • Name
  • Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager) (Openshift)
  • Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.CRY.31Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager) (Openshift)InformationalModification
  • Name
  • Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager) (Openshift)
  • Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
D9.K8S.CRY.34Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd) (Openshift)HighModification
  • Name
  • Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd) (Openshift)
  • Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.CRY.37Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd) (Openshift)MediumModification
  • Name
  • Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd) (Openshift)
  • Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.CRY.41Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet) (Openshift)HighModification
  • Name
  • Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet) (Openshift)
  • Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.CRY.45Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (API server) (Openshift)HighModification
  • Name
  • Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (API server) (Openshift)
  • Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (API server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.55Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server) (Openshift)HighModification
  • Name
  • Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server) (Openshift)
  • Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.61Ensure that the admission control plugin SecurityContextDeny is not set (API Server) (Openshift)HighModification
  • Name
  • Ensure that the admission control plugin SecurityContextDeny is not set (API Server) (Openshift)
  • Ensure that the admission control plugin SecurityContextDeny is not set (API Server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
D9.K8S.IAM.63Ensure that the admission control plugin SecurityContextConstraint is set (API Server) (Openshift)HighModification
  • Name
  • Ensure that the admission control plugin SecurityContextConstraint is set (API Server) (Openshift)
  • Ensure that the admission control plugin SecurityContextConstraint is set (API Server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.65Ensure that the admission control plugin SecurityContextConstraint is set (SCC restricted) (Openshift)HighModification
  • Name
  • Ensure that the admission control plugin SecurityContextConstraint is set (SCC restricted) (Openshift)
  • Ensure that the admission control plugin SecurityContextConstraint is set (SCC restricted) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.67Minimize the admission of containers wishing to share the host process ID namespace (SCC) (Openshift)HighModification
  • Name
  • Minimize the admission of containers wishing to share the host process ID namespace (SCC) (Openshift)
  • Minimize the admission of containers wishing to share the host process ID namespace (SCC) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.68Minimize the admission of containers wishing to share the host IPC namespace (SCC) (Openshift)HighModification
  • Name
  • Minimize the admission of containers wishing to share the host IPC namespace (SCC) (Openshift)
  • Minimize the admission of containers wishing to share the host IPC namespace (SCC) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.69Minimize the admission of containers wishing to share the host network namespace (SCC) (Openshift)LowModification
  • Name
  • Minimize the admission of containers wishing to share the host network namespace (SCC) (Openshift)
  • Minimize the admission of containers wishing to share the host network namespace (SCC) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.72Minimize the admission of containers with the NET_RAW capability (SCC) (Openshift)HighModification
  • Logic
  • List<OpenshiftSecurityContextConstraint> should have items contain [ requiredDropCapabilities contain-any [in ('NET_RAW','ALL')] ]
  • List<OpenshiftSecurityContextConstraint> should have items contain [ requiredDropCapabilities contain-any [$ in ('NET_RAW','ALL')] ]
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.LOG.07Ensure that the maximumRetainedFiles argument is set to 10 or as appropriate (API Server) (Openshift)LowModification
  • Name
  • Ensure that the maximumRetainedFiles argument is set to 10 or as appropriate (API Server) (Openshift)
  • Ensure that the maximumRetainedFiles argument is set to 10 or as appropriate (API Server) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.LOG.08Ensure that the maximumFileSizeMegabytes argument is set to 100 or as appropriate (API Server) (Openshift)LowModification
  • Name
  • Logic
  • Ensure that the maximumFileSizeMegabytes argument is set to 100 or as appropriate (API Server) (Openshift)
  • KubernetesCluster should have kubernetesPlatform.openshift.openshiftKubeApiserver.configConfigmap.apiServerArguments.audit-log-maxsize='100' and kubernetesPlatform.openshift.openshiftApiserver.configConfigmap.apiServerArguments.audit-log-maxsize='100'
  • Ensure that the maximumFileSizeMegabytes argument is set to 100 or as appropriate (API Server) (Openshift)
  • KubernetesCluster should have kubernetesPlatform.openshift.openshiftKubeApiserver.configConfigmap.apiServerArguments.audit-log-maxsize >=100 and kubernetesPlatform.openshift.openshiftApiserver.configConfigmap.apiServerArguments.audit-log-maxsize >=100
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.NET.28Verify that the scheduler API service is protected by authentication and authorization (Scheduler) (Openshift)HighModification
  • Name
  • Verify that the scheduler API service is protected by authentication and authorization (Scheduler) (Openshift)
  • Verify that the scheduler API service is protected by authentication and authorization (Scheduler) (Openshift)
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
D9.AWS.AS.09Ensure that your Amazon MQ brokers are using the active/standby deployment modeLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.AS.10Ensure AWS MQ brokers have the Auto Minor Version Upgrade feature enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.05Ensure Amazon ElastiCache Redis clusters have the Multi-AZ feature enabledLowNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.DR.08Ensure AWS Neptune clusters have a sufficient backup retention period setHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AWS.NET.1002Ensure CloudFront origins don't use insecure SSL protocolsHighNew
  • CloudGuard AWS All Rules Ruleset
D9.AZU.NET.72Ensure that Oracle Database (TCP:1521) is restricted from the InternetHighNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.NET.73Ensure that no network security groups allow unrestricted inbound access on TCP ports 27017, 27018 and 27019HighNew
  • CloudGuard Azure All Rules Ruleset
D9.K8S.CRY.47Ensure that the healthz endpoints for the scheduler are protected by RBAC (OpenShift)HighNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.CRY.48Verify that the scheduler API service is protected by RBAC (OpenShift)HighNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.28Use https for kubelet connections (OpenShift)CriticalNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.87Ensure that the kubelet uses certificates to authenticate (OpenShift)CriticalNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.88Ensure that the --request-timeout argument is set (OpenShift)HighNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.89Ensure that the API Server only makes use of Strong Cryptographic Ciphers (OpenShift)CriticalNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.90Ensure that encryption providers are appropriately configured (OpenShift)HighNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.91Ensure unsupported configuration overrides are not used (OpenShift)CriticalNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.IAM.92Ensure that the admission control plugin SecurityContextConstraint is set (SCC)(Openshift)HighNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.LOG.10Ensure that a minimal audit policy is createdHighNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.NET.13Ensure that the --insecure-port argument is set to 0 (OpenShift)CriticalNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.NET.16Ensure that the --bind-address argument is set to 127.0.0.1 (Controller Manager)(OpenShift)CriticalNew
  • CIS OpenShift Container Platform v4 Benchmark v1.4.0
D9.K8S.AC.25Limit binding of Anonymous UserCriticalNew
  • Container Admission Control
  • Container Admission Control 1.0

August 09 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.IAM.18Ensure VIRTUAL or HARDWARE MFA is enabled for the 'root' accountCriticalModification
  • Name
  • Logic
  • Ensure MFA is enabled for the 'root' user account
  • IamUser where name like '%root_account%' should have mfaType in('Virtual')
  • Ensure VIRTUAL or HARDWARE MFA is enabled for the 'root' account
  • IamUser where name like '%root_account%' should have mfaType in('Virtual','Hardware')
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS ISO27001:2022
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.IAM.101Ensure that S3 Bucket policy doesn't have excessive permissions (Allowing all actions)HighModification
  • Logic
  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Action contain [$ regexMatch /\*/] or Action regexMatch /\*/) ]
  • S3Bucket should not have policy.Statement contain [Effect='Allow' and Action contain ['*'] and Condition isEmpty()]
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS PCI-DSS 3.2
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS CCPA Framework
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.NET.78Ensure no EC2 instance allows incoming traffic from 0.0.0.0/0 to known TCP portMediumModification
  • Logic
  • Instance where isPublic=true should not have nics contain [ securityGroups contain [ inboundRules contain [ scope='0.0.0.0/0' and port in($CloudGuard_Known_TCP_Ports) and protocol in('TCP', 'ALL') ] ] ]
  • Instance where isPublic=true and nics contain [ subnet.routeTable.associations length()>0 and subnet.routeTable.routes contain [ destinationCidrBlock='0.0.0.0/0' and gatewayId like 'igw-%' ] ] should not have nics contain [ securityGroups contain [ inboundRules contain [ scope='0.0.0.0/0' and port in($CloudGuard_Known_TCP_Ports) and protocol in('TCP', 'ALL') ] ] ]
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS ISO27001:2022
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard CheckUp
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Network Alerts for default VPC components
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
D9.AWS.NET.79Ensure no EC2 instance allows incoming traffic from 0.0.0.0/0 to known UDP portMediumModification
  • Logic
  • Instance where isPublic=true should not have nics contain [ securityGroups contain [ inboundRules contain [ scope='0.0.0.0/0' and port in($CloudGuard_Known_UDP_Ports) and protocol in('UDP', 'ALL') ] ] ]
  • Instance where isPublic=true and nics contain [ subnet.routeTable.associations length()>0 and subnet.routeTable.routes contain [ destinationCidrBlock='0.0.0.0/0' and gatewayId like 'igw-%' ] ] should not have nics contain [ securityGroups contain [ inboundRules contain [ scope='0.0.0.0/0' and port in($CloudGuard_Known_UDP_Ports) and protocol in('UDP', 'ALL') ] ] ]
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS ISO27001:2022
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard CheckUp
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Network Alerts for default VPC components
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
D9.AWS.NET.80Ensure no EC2 instance allows incoming traffic from 0.0.0.0/0 to known TCP DB portHighModification
  • Logic
  • Instance where isPublic=true should not have nics contain [ securityGroups contain [ inboundRules contain [ scope='0.0.0.0/0' and port in($CloudGuard_Known_DB_TCP_Ports) and protocol in('TCP', 'ALL') ] ] ]
  • Instance where isPublic=true and nics contain [ subnet.routeTable.associations length()>0 and subnet.routeTable.routes contain [ destinationCidrBlock='0.0.0.0/0' and gatewayId like 'igw-%' ] ] should not have nics contain [ securityGroups contain [ inboundRules contain [ scope='0.0.0.0/0' and port in($CloudGuard_Known_DB_TCP_Ports) and protocol in('TCP', 'ALL') ] ] ]
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS ISO27001:2022
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard CheckUp
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Network Alerts for default VPC components
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
D9.AWS.NET.81Ensure no EC2 instance allows incoming traffic from 0.0.0.0/0 to known UDP DB portHighModification
  • Logic
  • Instance where isPublic=true should not have nics contain [ securityGroups contain [ inboundRules contain [ scope='0.0.0.0/0' and port in($CloudGuard_Known_DB_UDP_Ports) and protocol in('UDP', 'ALL') ] ] ]
  • Instance where isPublic=true and nics contain [ subnet.routeTable.associations length()>0 and subnet.routeTable.routes contain [ destinationCidrBlock='0.0.0.0/0' and gatewayId like 'igw-%' ] ] should not have nics contain [ securityGroups contain [ inboundRules contain [ scope='0.0.0.0/0' and port in($CloudGuard_Known_DB_UDP_Ports) and protocol in('UDP', 'ALL') ] ] ]
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS ISO27001:2022
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard CheckUp
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Network Alerts for default VPC components
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
D9.AWS.NET.75Ensure no Lambda allows ingress from 0.0.0.0/0 to remote server administration portsHighModification
  • Name
  • Logic
  • Ensure no lambda allow ingress from 0.0.0.0/0 to remote server administration ports
  • Lambda should not have inboundRules with [ scope='0.0.0.0/0' and ( ( port<=23 and portTo>=20 ) or ( port<=115 and portTo>=115 ) or ( port<=139 and portTo>=137 ) or ( port<=2049 and portTo>=2049 ) or ( port<=3389 and portTo>=3389 ) ) ]
  • Ensure no Lambda allows ingress from 0.0.0.0/0 to remote server administration ports
  • Lambda should not have inboundRules with [scope in ('0.0.0.0/0', '::/0') and portTo in (22, 115, 137, 2049, 3389)]
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS ISO27001:2022
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS MITRE ATT&CK Framework v10
D9.AZU.IAM.46Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged UsersHighModification
  • Logic
  • RoleAssignment should have (properties contain [getResource('User', principalId) contain [userCredentialRegistrationDetails.isRegisterWithMfa=true]] and properties contain [getResources('RoleDefinition',roleDefinitionId) contain [properties.roleName in ('Owner','Contributor')]])
  • User where assignedRoles contain [displayName regexMatch /.*Administrator|Creator|Global.*/] should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.IAM.47Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged UsersHighModification
  • Logic
  • RoleAssignment should have (properties contain [getResource('User', principalId) contain [userCredentialRegistrationDetails.isRegisterWithMfa=true]] and properties contain [getResources('RoleDefinition',roleDefinitionId) contain-none [properties.roleName in ('Owner','Contributor')]])
  • User should have userCredentialRegistrationDetails.isRegisterWithMfa=true
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
D9.AWS.IAM.19Ensure hardware MFA is enabled for the 'root' user accountCriticalRemoval
  • AWS CIS Foundations v. 1.5.0
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.4.0

August 02 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.GCP.CRY.01Ensure VM Disks for Critical VMs Are Encrypted With Customer-Supplied Encryption Keys (CSEK)HighModification
  • Name
  • Ensure VM disks for critical VMs are encrypted with Customer-Supplied Encryption Keys (CSEK)
  • Ensure VM Disks for Critical VMs Are Encrypted With Customer-Supplied Encryption Keys (CSEK)
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP HIPAA
  • GCP Dashboard System Ruleset
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.03Ensure Oslogin Is Enabled for a ProjectMediumModification
  • Name
  • Ensure oslogin is enabled for a Project
  • Ensure Oslogin Is Enabled for a Project
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP HIPAA
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.02Ensure that Corporate Login Credentials are UsedHighModification
  • Name
  • Ensure that corporate login credentials are used
  • Ensure that Corporate Login Credentials are Used
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP CSA CCM v.3.0.1
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP CloudGuard SOC2 based on AICPA TSC 2017
  • GCP HIPAA
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.04Ensure That There Are Only GCP-Managed Service Account Keys for Each Service AccountHighModification
  • Name
  • Ensure that there are only GCP-managed service account keys for each service account
  • Ensure That There Are Only GCP-Managed Service Account Keys for Each Service Account
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Foundations v. 1.0.0
  • GCP HIPAA
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.05Ensure That Service Account Has No Admin PrivilegesHighModification
  • Name
  • Ensure that Service Account has no Admin privileges
  • Ensure That Service Account Has No Admin Privileges
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP HIPAA
  • GCP Dashboard System Ruleset
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.09Ensure That Cloud Storage Bucket Is Not Anonymously or Publicly AccessibleCriticalModification
  • Name
  • Ensure that Cloud Storage bucket is not anonymously or publicly accessible
  • Ensure That Cloud Storage Bucket Is Not Anonymously or Publicly Accessible
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP HIPAA
  • GCP Dashboard System Ruleset
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.11Ensure 'Enable Connecting to Serial Ports' Is Not Enabled for VM InstanceHighModification
  • Name
  • Ensure 'Enable connecting to serial ports' is not enabled for VM Instance
  • Ensure 'Enable Connecting to Serial Ports' Is Not Enabled for VM Instance
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP CloudGuard Network Security
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.20Ensure That the Default Network Does Not Exist in a ProjectMediumModification
  • Name
  • Ensure the default network does not exist in a project
  • Ensure That the Default Network Does Not Exist in a Project
  • GCP CloudGuard CheckUp
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP CloudGuard Network Security
  • GCP HIPAA
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.02Ensure 'Block Project-Wide SSH Keys' Is Enabled for VM InstancesHighModification
  • Name
  • Ensure 'Block Project-wide SSH keys' enabled for VM instances
  • Ensure 'Block Project-Wide SSH Keys' Is Enabled for VM Instances
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.07Ensure That the Cloud SQL Database Instance Requires All Incoming Connections To Use SSLHighModification
  • Name
  • Ensure that the Cloud SQL database instance requires all incoming connections to use SSL
  • Ensure That the Cloud SQL Database Instance Requires All Incoming Connections To Use SSL
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP HIPAA
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.08Ensure Compute Instances Are Launched With Shielded VM EnabledHighModification
  • Name
  • Ensure Compute instances are launched with Shielded VM enabled
  • Ensure Compute Instances Are Launched With Shielded VM Enabled
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.09Ensure That Compute Instances Have Confidential Computing EnabledHighModification
  • Name
  • Ensure that Compute instances have Confidential Computing enabled
  • Ensure That Compute Instances Have Confidential Computing Enabled
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.10Ensure That Compute Instances Do Not Have Public IP AddressesHighModification
  • Name
  • Ensure that Compute instances do not have public IP addresses
  • Ensure That Compute Instances Do Not Have Public IP Addresses
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.11Ensure That Cloud KMS Cryptokeys Are Not Anonymously or Publicly AccessibleHighModification
  • Name
  • Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible
  • Ensure That Cloud KMS Cryptokeys Are Not Anonymously or Publicly Accessible
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.12Ensure That a Default Customer-Managed Encryption Key (CMEK) Is Specified for All BigQuery Data SetsHighModification
  • Name
  • Ensure that a Default Customer-managed encryption key (CMEK) is specified for all BigQuery Data Sets
  • Ensure That a Default Customer-Managed Encryption Key (CMEK) Is Specified for All BigQuery Data Sets
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.13Ensure KMS Encryption Keys Are Rotated Within a Period of 90 DaysHighModification
  • Name
  • Ensure KMS encryption keys are rotated within a period of 90 days
  • Ensure KMS Encryption Keys Are Rotated Within a Period of 90 Days
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.CRY.14Ensure That All BigQuery Tables Are Encrypted With Customer-Managed Encryption Key (CMEK)HighModification
  • Name
  • Ensure that all BigQuery Tables are encrypted with Customer-managed encryption key (CMEK)
  • Ensure That All BigQuery Tables Are Encrypted With Customer-Managed Encryption Key (CMEK)
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.DR.01Ensure That Cloud SQL Database Instances Are Configured With Automated BackupsLowModification
  • Name
  • Ensure that Cloud SQL database instances are configured with automated backups
  • Ensure That Cloud SQL Database Instances Are Configured With Automated Backups
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.01Ensure That Instances Are Not Configured To Use the Default Service Account With Full Access to All Cloud APIsHighModification
  • Name
  • Ensure that instances are not configured to use the default service account with full access to all Cloud APIs
  • Ensure That Instances Are Not Configured To Use the Default Service Account With Full Access to All Cloud APIs
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP CSA CCM v.3.0.1
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP HIPAA
  • GCP Dashboard System Ruleset
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.03Ensure that Multi-Factor Authentication is 'Enabled' for All Non-Service AccountsHighModification
  • Name
  • Ensure that multi-factor authentication is enabled for all non-service accounts
  • Ensure that Multi-Factor Authentication is 'Enabled' for All Non-Service Accounts
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP HIPAA
  • GCP Dashboard System Ruleset
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.18Ensure That Separation of Duties Is Enforced While Assigning Service Account Related Roles to UsersHighModification
  • Name
  • Ensure that Separation of duties is enforced while assigning service account related roles to users
  • Ensure That Separation of Duties Is Enforced While Assigning Service Account Related Roles to Users
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.21Ensure That Instances Are Not Configured To Use the Default Service AccountHighModification
  • Name
  • Ensure that instances are not configured to use the default service account
  • Ensure That Instances Are Not Configured To Use the Default Service Account
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.22Ensure API Keys Are Rotated Every 90 DaysHighModification
  • Name
  • Ensure API keys are rotated every 90 days
  • Ensure API Keys Are Rotated Every 90 Days
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.23Ensure API Keys Are Restricted to Only APIs That Application Needs AccessHighModification
  • Name
  • Ensure API keys are restricted to only APIs that application needs access
  • Ensure API Keys Are Restricted to Only APIs That Application Needs Access
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.24Ensure API Keys Only Exist for Active ServicesHighModification
  • Name
  • Ensure API keys are not created for a project
  • Ensure API Keys Only Exist for Active Services
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.25Ensure That IAM Users Are Not Assigned the Service Account User or Service Account Token Creator Roles at Project LevelHighModification
  • Name
  • Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level
  • Ensure That IAM Users Are Not Assigned the Service Account User or Service Account Token Creator Roles at Project Level
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.26Ensure That Separation of Duties Is Enforced While Assigning KMS Related Roles to UsersHighModification
  • Name
  • Ensure that Separation of duties is enforced while assigning KMS related roles to users
  • Ensure That Separation of Duties Is Enforced While Assigning KMS Related Roles to Users
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.27Ensure That Cloud Storage Buckets Have Uniform Bucket-Level Access EnabledLowModification
  • Name
  • Ensure that Cloud Storage buckets have uniform bucket-level access enabled
  • Ensure That Cloud Storage Buckets Have Uniform Bucket-Level Access Enabled
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.IAM.28Ensure That BigQuery Datasets Are Not Anonymously or Publicly AccessibleHighModification
  • Name
  • Ensure that BigQuery datasets are not anonymously or publicly accessible
  • Ensure That BigQuery Datasets Are Not Anonymously or Publicly Accessible
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.03Ensure That the 'Log_connections' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'On'LowModification
  • Name
  • Ensure that the 'log_connections' database flag for Cloud SQL PostgreSQL instance is set to 'on'
  • Ensure That the 'Log_connections' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'On'
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.06Ensure That the 'Log_min_duration_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set to '-1' (Disabled)LowModification
  • Name
  • Ensure that the 'log_min_duration_statement' database flag for Cloud SQL PostgreSQL instance is set to '-1' (disabled)
  • Ensure That the 'Log_min_duration_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set to '-1' (Disabled)
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.12Ensure That the 'Log_disconnections' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'On'LowModification
  • Name
  • Ensure that the 'log_disconnections' database flag for Cloud SQL PostgreSQL instance is set to 'on'
  • Ensure That the 'Log_disconnections' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'On'
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.13Ensure 'Log_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set AppropriatelyLowModification
  • Name
  • Ensure 'log_statement' database flag for Cloud SQL PostgreSQL instance is set appropriately
  • Ensure 'Log_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set Appropriately
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.14Ensure 'Log_error_verbosity' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'DEFAULT' or StricterLowModification
  • Name
  • Ensure 'log_error_verbosity' database flag for Cloud SQL PostgreSQL instance is set to 'default' or stricter
  • Ensure 'Log_error_verbosity' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'DEFAULT' or Stricter
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.16Ensure that the 'Log_min_messages' Flag for a Cloud SQL PostgreSQL Instance is set at minimum to 'Warning'LowModification
  • Name
  • Ensure That the 'Log_min_messages' Database Flag for Cloud SQL PostgreSQL Instance Is Set to at least 'Warning'
  • Ensure that the 'Log_min_messages' Flag for a Cloud SQL PostgreSQL Instance is set at minimum to 'Warning'
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.17Ensure 'Log_min_error_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'Error' or StricterLowModification
  • Name
  • Ensure 'log_min_error_statement' database flag for Cloud SQL PostgreSQL instance is set to 'Error' or stricter
  • Ensure 'Log_min_error_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'Error' or Stricter
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.18Ensure That Cloud Audit Logging Is Configured ProperlyLowModification
  • Name
  • Ensure that Cloud Audit Logging is configured properly across all services and all users from a project
  • Ensure That Cloud Audit Logging Is Configured Properly
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.19Ensure Log Metric Filter and Alerts Exist for Project Ownership Assignments/ChangesLowModification
  • Name
  • Ensure log metric filter and alerts exist for project ownership assignments/changes
  • Ensure Log Metric Filter and Alerts Exist for Project Ownership Assignments/Changes
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.20Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration ChangesLowModification
  • Name
  • Ensure that the log metric filter and alerts exist for Audit Configuration changes
  • Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration Changes
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.21Ensure That the Log Metric Filter and Alerts Exist for Custom Role ChangesLowModification
  • Name
  • Ensure that the log metric filter and alerts exist for Custom Role changes
  • Ensure That the Log Metric Filter and Alerts Exist for Custom Role Changes
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.22Ensure That the Log Metric Filter and Alerts Exist for VPC Network Firewall Rule ChangesLowModification
  • Name
  • Logic
  • Ensure that the log metric filter and alerts exist for VPC Network Firewall rule changes
  • AlertPolicy where conditions contain [ conditionThreshold.logName] and enabled='true' should have conditions contain [ getResource('LogBasedMetric',conditionThreshold.logName) getValue('filter') ='resource.type="gce_firewall_rule" AND protoPayload.methodName:"compute.firewalls.patch" OR protoPayload.methodName:"compute.firewalls.insert"OR protoPayload.methodName:"compute.firewalls.delete"']
  • Ensure That the Log Metric Filter and Alerts Exist for VPC Network Firewall Rule Changes
  • AlertPolicy where conditions contain [ conditionThreshold.logName] and enabled='true' should have conditions contain [ getResource('LogBasedMetric',conditionThreshold.logName) getValue('filter') ='resource.type="gce_firewall_rule" AND protoPayload.methodName:"compute.firewalls.patch" OR protoPayload.methodName:"compute.firewalls.insert" OR protoPayload.methodName:"compute.firewalls.delete"']
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.23Ensure That the Log Metric Filter and Alerts Exist for VPC Network Route ChangesLowModification
  • Name
  • Ensure that the log metric filter and alerts exist for VPC network route changes
  • Ensure That the Log Metric Filter and Alerts Exist for VPC Network Route Changes
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.24Ensure That the Log Metric Filter and Alerts Exist for VPC Network ChangesLowModification
  • Name
  • Ensure that the log metric filter and alerts exist for VPC network changes
  • Ensure That the Log Metric Filter and Alerts Exist for VPC Network Changes
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.25Ensure That the Log Metric Filter and Alerts Exist for Cloud Storage IAM Permission ChangesLowModification
  • Name
  • Ensure that the log metric filter and alerts exist for Cloud Storage IAM permission changes
  • Ensure That the Log Metric Filter and Alerts Exist for Cloud Storage IAM Permission Changes
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.26Ensure That the Log Metric Filter and Alerts Exist for SQL Instance Configuration ChangesLowModification
  • Name
  • Ensure that the log metric filter and alerts exist for SQL instance configuration changes
  • Ensure That the Log Metric Filter and Alerts Exist for SQL Instance Configuration Changes
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.27Ensure That Cloud DNS Logging Is Enabled for All VPC NetworksLowModification
  • Name
  • Ensure that Cloud DNS logging is enabled for all VPC networks
  • Ensure That Cloud DNS Logging Is Enabled for All VPC Networks
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.LOG.28Ensure That Sinks Are Configured for All Log EntriesLowModification
  • Name
  • Ensure that sinks are configured for all log entries
  • Ensure That Sinks Are Configured for All Log Entries
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.08Ensure That IP Forwarding Is Not Enabled on InstancesHighModification
  • Name
  • Ensure that IP forwarding is not enabled on Instances
  • Ensure That IP Forwarding Is Not Enabled on Instances
  • GCP CIS Foundations v. 1.3.0
  • GCP Security Risk Management
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CloudGuard Network Security
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.12Ensure That SSH Access Is Restricted From the InternetHighModification
  • Name
  • Ensure that SSH access is restricted from the internet
  • Ensure That SSH Access Is Restricted From the Internet
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP CloudGuard Network Security
  • GCP HIPAA
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.13Ensure That RDP Access Is Restricted From the InternetHighModification
  • Name
  • Ensure that RDP access is restricted from the internet
  • Ensure That RDP Access Is Restricted From the Internet
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP PCI-DSS 3.2
  • GCP NIST 800-53 Rev 4
  • GCP ISO 27001:2013
  • GCP NIST CSF v1.1
  • GCP CloudGuard Network Security
  • GCP HIPAA
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.16Ensure that VPC Flow Logs is Enabled for Every Subnet in a VPC NetworkMediumModification
  • Name
  • Ensure VPC Flow logs is enabled for every subnet in a VPC Network
  • Ensure that VPC Flow Logs is Enabled for Every Subnet in a VPC Network
  • GCP CIS Foundations v. 1.3.0
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP HIPAA
  • GCP GDPR Readiness
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.24Ensure That Cloud SQL Database Instances Do Not Have Public IPsHighModification
  • Name
  • Ensure that Cloud SQL instances do not have public IPs
  • Ensure That Cloud SQL Database Instances Do Not Have Public IPs
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.26Ensure That DNSSEC Is Enabled for Cloud DNSHighModification
  • Name
  • Ensure that DNSSEC is enabled for Cloud DNS
  • Ensure That DNSSEC Is Enabled for Cloud DNS
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.27Ensure That RSASHA1 Is Not Used for the Key-Signing Key in Cloud DNS DNSSECHighModification
  • Name
  • Ensure that RSASHA1 is not used for the key-signing key in Cloud DNS DNSSEC
  • Ensure That RSASHA1 Is Not Used for the Key-Signing Key in Cloud DNS DNSSEC
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.28Ensure That RSASHA1 Is Not Used for the Zone-Signing Key in Cloud DNS DNSSECHighModification
  • Name
  • Ensure that RSASHA1 is not used for the zone-signing key in Cloud DNS DNSSEC
  • Ensure That RSASHA1 Is Not Used for the Zone-Signing Key in Cloud DNS DNSSEC
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.29Ensure No HTTPS Proxy Load Balancers Permit SSL Policies With Weak Cipher SuitesHighModification
  • Name
  • Ensure no HTTPS proxy load balancers permit SSL policies with weak cipher suites
  • Ensure No HTTPS Proxy Load Balancers Permit SSL Policies With Weak Cipher Suites
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.NET.31Ensure Legacy Networks Do Not Exist for Older ProjectsHighModification
  • Name
  • Ensure legacy networks do not exist for a project
  • Ensure Legacy Networks Do Not Exist for Older Projects
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.0.0
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.VLN.02Ensure That the 'Local_infile' Database Flag for a Cloud SQL MySQL Instance Is Set to 'Off'MediumModification
  • Name
  • Ensure that the 'local_infile' database flag for a Cloud SQL Mysql instance is set to 'off'
  • Ensure That the 'Local_infile' Database Flag for a Cloud SQL MySQL Instance Is Set to 'Off'
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.1.0
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.GCP.VLN.05Ensure 'Skip_show_database' Database Flag for Cloud SQL MySQL Instance Is Set to 'On'MediumModification
  • Name
  • Ensure 'skip_show_database' database flag for Cloud SQL Mysql instance is set to 'on'
  • Ensure 'Skip_show_database' Database Flag for Cloud SQL MySQL Instance Is Set to 'On'
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • CloudGuard GCP All Rules Ruleset
  • GCP CIS Controls V 8
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.ALI.CRY.04Ensure that 'Virtual Machine's disk' are encryptedHighModification
  • Name
  • Ensure that Virtual Machine's Disks are encrypted
  • Ensure that 'Virtual Machine's disk' are encrypted
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.CRY.05Ensure server-side encryption is set to 'Encrypt with BYOK'HighModification
  • Name
  • Ensure server-side encryption is set to 'Encrypt with BYOK'.
  • Ensure server-side encryption is set to 'Encrypt with BYOK'
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.CRY.06Ensure RDS instance TDE protector is encrypted with BYOK (Use your own key)HighModification
  • Name
  • Ensure RDS instance TDE protector is encrypted with BYOK (Use your own key).
  • Ensure RDS instance TDE protector is encrypted with BYOK (Use your own key)
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.CRY.07Ensure that 'TDE' is set to 'Enabled' on for applicable database instanceHighModification
  • Name
  • Ensure that 'TDE' is set to 'Enabled' on for applicable database instance.
  • Ensure that 'TDE' is set to 'Enabled' on for applicable database instance
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.IAM.01Ensure no root account access key existsHighModification
  • Name
  • Ensure no root account access key exists.
  • Ensure no root account access key exists
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.IAM.04Ensure users not logged on for 90 days or longer are disabled for console logonHighModification
  • Name
  • Ensure users not logged on for 90 days or longer are disabled for console logon.
  • Ensure users not logged on for 90 days or longer are disabled for console logon
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.IAM.08Ensure RAM policies that allow full '*:*' administrative privileges are not createdHighModification
  • Name
  • Ensure RAM policies that allow full "*:*" administrative privileges are not created
  • Ensure RAM policies that allow full '*:*' administrative privileges are not created
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.IAM.09Ensure RAM password policy prevents password reuseHighModification
  • Name
  • Ensure RAM password policy prevents password reuse.
  • Ensure RAM password policy prevents password reuse
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.IAM.10Ensure RAM password policy requires at least one uppercase letterLowModification
  • Name
  • Ensure RAM password policy requires at least one uppercase letter.
  • Ensure RAM password policy requires at least one uppercase letter
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.IAM.11Ensure RAM password policy requires at least one lowercase letterLowModification
  • Name
  • Ensure RAM password policy requires at least one lowercase letter.
  • Ensure RAM password policy requires at least one lowercase letter
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.IAM.12Ensure RAM password policy require at least one symbolLowModification
  • Name
  • Ensure RAM password policy require at least one symbol.
  • Ensure RAM password policy require at least one symbol
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.IAM.13Ensure RAM password policy require at least one numberLowModification
  • Name
  • Ensure RAM password policy require at least one number.
  • Ensure RAM password policy require at least one number
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.IAM.14Ensure RAM password policy expires passwords within 90 days or lessLowModification
  • Name
  • Ensure RAM password policy expires passwords within 90 days or less.
  • Ensure RAM password policy expires passwords within 90 days or less
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.IAM.15Ensure RAM password policy temporarily blocks logon after 5 incorrect logon attempts within an hourHighModification
  • Name
  • Ensure RAM password policy temporarily blocks logon after 5 incorrect logon attempts within an hour.
  • Ensure RAM password policy temporarily blocks logon after 5 incorrect logon attempts within an hour
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.LOG.10Ensure Security Center Network, Host and Security log analysis is enabledHighModification
  • Name
  • Ensure Security Center Network, Host and Security log analysis is enabled.
  • Ensure Security Center Network, Host and Security log analysis is enabled
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.MON.02Ensure that 'Auditing' Retention is 'greater than 6 months'LowModification
  • Name
  • Ensure that 'Auditing' Retention is 'greater than 6 months'.
  • Ensure that 'Auditing' Retention is 'greater than 6 months'
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.NET.02Ensure legacy networks does not existHighModification
  • Name
  • Ensure legacy networks does not exist.
  • Ensure legacy networks does not exist
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
  • Alibaba cloud ruleset
D9.ALI.NET.16Ensure VPC flow logging is enabled in all VPCsHighModification
  • Name
  • Ensure VPC flow logging is enabled in all VPCs.
  • Ensure VPC flow logging is enabled in all VPCs
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.VLN.01Ensure that Security Center is Advanced or Enterprise EditionHighModification
  • Name
  • Ensure that Security Center is Advanced or Enterprise Edition.
  • Ensure that Security Center is Advanced or Enterprise Edition
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.VLN.02Ensure that all assets are installed with security agentHighModification
  • Name
  • Ensure that all assets are installed with security agent.
  • Ensure that all assets are installed with security agent
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.VLN.03Ensure that Automatic Quarantine is enabledHighModification
  • Name
  • Ensure that Automatic Quarantine is enabled.
  • Ensure that Automatic Quarantine is enabled
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.VLN.04Ensure that Webshell detection is enabled on all web serversHighModification
  • Name
  • Ensure that Webshell detection is enabled on all web servers.
  • Ensure that Webshell detection is enabled on all web servers
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.VLN.05Ensure that notification is enabled on all high risk itemsLowModification
  • Name
  • Ensure that notification is enabled on all high risk items.
  • Ensure that notification is enabled on all high risk items
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.VLN.06Ensure that Config Assessment is granted with privilegeLowModification
  • Name
  • Ensure that Config Assessment is granted with privilege.
  • Ensure that Config Assessment is granted with privilege
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.VLN.07Ensure that scheduled vulnerability scan is enabled on all serversHighModification
  • Name
  • Ensure that scheduled vulnerability scan is enabled on all servers.
  • Ensure that scheduled vulnerability scan is enabled on all servers
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.ALI.VLN.09Ensure that the latest OS Patches for all Virtual Machines are appliedHighModification
  • Name
  • Ensure that the latest OS Patches for all Virtual Machines are applied.
  • Ensure that the latest OS Patches for all Virtual Machines are applied
  • Alibaba CIS Foundations v. 1.0
  • CloudGuard Alibaba All Rules Ruleset
D9.OCI.AS.01Create at least one compartment in your tenancy to store cloud resourcesLowModification
  • Name
  • Create at least one compartment in your tenancy to store cloud resources.
  • Create at least one compartment in your tenancy to store cloud resources
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.AS.02Ensure no VCNs are created in the root compartmentLowModification
  • Name
  • Ensure no VCNs are created in the root compartment.
  • Ensure no VCNs are created in the root compartment
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.AS.03Ensure no instances created in the root compartmentLowModification
  • Name
  • Ensure no instances created in the root compartment.
  • Ensure no instances created in the root compartment
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.AS.04Ensure no volumes are created in the root compartmentLowModification
  • Name
  • Ensure no volumes are created in the root compartment.
  • Ensure no volumes are created in the root compartment
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.AS.05Ensure no filesystems are created in the root compartmentLowModification
  • Name
  • Ensure no filesystems are created in the root compartment.
  • Ensure no filesystems are created in the root compartment
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.AS.06Ensure no buckets are created in the root compartmentLowModification
  • Name
  • Ensure no buckets are created in the root compartment.
  • Ensure no buckets are created in the root compartment
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.AS.07Ensure no autonomousdatabases are created in the root compartmentLowModification
  • Name
  • Ensure no autonomousdatabases are created in the root compartment.
  • Ensure no autonomousdatabases are created in the root compartment
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.CRY.04Ensure File Storage Systems are encrypted with Customer Managed Keys (CMK)HighModification
  • Name
  • Ensure File Storage Systems are encrypted with Customer Managed Keys (CMK).
  • Ensure File Storage Systems are encrypted with Customer Managed Keys (CMK)
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.02Ensure IAM password policy requires minimum length of 14 or greaterHighModification
  • Name
  • Ensure IAM password policy requires minimum length of 14 or greater.
  • Ensure IAM password policy requires minimum length of 14 or greater
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.03Ensure MFA is enabled for all users with a console passwordLowModification
  • Name
  • Ensure MFA is enabled for all users with a console password.
  • Ensure MFA is enabled for all users with a console password
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.04Ensure all OCI IAM user accounts have a valid and current email addressLowModification
  • Name
  • Ensure all OCI IAM user accounts have a valid and current email address.
  • Ensure all OCI IAM user accounts have a valid and current email address
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.05Ensure user API keys rotate within 90 days or lessHighModification
  • Name
  • Ensure user API keys rotate within 90 days or less.
  • Ensure user API keys rotate within 90 days or less
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.06Ensure user customer secret keys rotate within 90 days or lessLowModification
  • Name
  • Ensure user customer secret keys rotate within 90 days or less.
  • Ensure user customer secret keys rotate within 90 days or less
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.07Ensure user auth tokens rotate within 90 days or lessLowModification
  • Name
  • Ensure user auth tokens rotate within 90 days or less.
  • Ensure user auth tokens rotate within 90 days or less
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.08Ensure permissions on all resources are given only to the tenancy administrator groupHighModification
  • Name
  • Ensure permissions on all resources are given only to the tenancy administrator group.
  • Ensure permissions on all resources are given only to the tenancy administrator group
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.09Ensure IAM administrators cannot update tenancy Administrators groupHighModification
  • Name
  • Ensure IAM administrators cannot update tenancy Administrators group.
  • Ensure IAM administrators cannot update tenancy Administrators group
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.IAM.10Ensure API keys are not created for tenancy administrator usersHighModification
  • Name
  • Ensure API keys are not created for tenancy administrator users.
  • Ensure API keys are not created for tenancy administrator users
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.01Ensure default tags are used on resourcesLowModification
  • Name
  • Ensure default tags are used on resources.
  • Ensure default tags are used on resources
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.02Ensure VCN flow logging is enabled for all subnetsLowModification
  • Name
  • Ensure VCN flow logging is enabled for all subnets.
  • Ensure VCN flow logging is enabled for all subnets
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.03Ensure write level Object Storage logging is enabled for all bucketsLowModification
  • Name
  • Ensure write level Object Storage logging is enabled for all buckets.
  • Ensure write level Object Storage logging is enabled for all buckets
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.04Create at least one notification topic and subscription to receive monitoring alertsLowModification
  • Name
  • Create at least one notification topic and subscription to receive monitoring alerts.
  • Create at least one notification topic and subscription to receive monitoring alerts
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.05Ensure a notification is configured for Identity Provider changesLowModification
  • Name
  • Ensure a notification is configured for Identity Provider changes.
  • Ensure a notification is configured for Identity Provider changes
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.06Ensure a notification is configured for IdP group mapping changesLowModification
  • Name
  • Ensure a notification is configured for IdP group mapping changes.
  • Ensure a notification is configured for IdP group mapping changes
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.07Ensure a notification is configured for IAM group changesLowModification
  • Name
  • Ensure a notification is configured for IAM group changes.
  • Ensure a notification is configured for IAM group changes
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.09Ensure a notification is configured for user changesLowModification
  • Name
  • Ensure a notification is configured for user changes.
  • Ensure a notification is configured for user changes
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.10Ensure a notification is configured for VCN changesLowModification
  • Name
  • Ensure a notification is configured for VCN changes.
  • Ensure a notification is configured for VCN changes
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.11Ensure a notification is configured for changes to route tablesLowModification
  • Name
  • Ensure a notification is configured for changes to route tables.
  • Ensure a notification is configured for changes to route tables
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.12Ensure a notification is configured for security list changesLowModification
  • Name
  • Ensure a notification is configured for security list changes.
  • Ensure a notification is configured for security list changes
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.13Ensure a notification is configured for network security group changesLowModification
  • Name
  • Ensure a notification is configured for network security group changes.
  • Ensure a notification is configured for network security group changes
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.LOG.14Ensure a notification is configured for changes to network gatewaysLowModification
  • Name
  • Ensure a notification is configured for changes to network gateways.
  • Ensure a notification is configured for changes to network gateways
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.01Ensure no security lists allow ingress from 0.0.0.0/0 to port 22CriticalModification
  • Name
  • Ensure no security lists allow ingress from 0.0.0.0/0 to port 22.
  • Ensure no security lists allow ingress from 0.0.0.0/0 to port 22
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.02Ensure no security lists allow ingress from 0.0.0.0/0 to port 3389CriticalModification
  • Name
  • Ensure no security lists allow ingress from 0.0.0.0/0 to port 3389.
  • Ensure no security lists allow ingress from 0.0.0.0/0 to port 3389
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.03Ensure the default security list of every VCN restricts all traffic except ICMPHighModification
  • Name
  • Ensure the default security list of every VCN restricts all traffic except ICMP.
  • Ensure the default security list of every VCN restricts all traffic except ICMP
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.04Ensure no network security groups allow ingress from 0.0.0.0/0 to port 22CriticalModification
  • Name
  • Ensure no network security groups allow ingress from 0.0.0.0/0 to port 22.
  • Ensure no network security groups allow ingress from 0.0.0.0/0 to port 22
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.05Ensure no network security groups allow ingress from 0.0.0.0/0 to port 3389CriticalModification
  • Name
  • Ensure no network security groups allow ingress from 0.0.0.0/0 to port 3389.
  • Ensure no network security groups allow ingress from 0.0.0.0/0 to port 3389
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.07Ensure Oracle Autonomous Shared Databases (ADB) access is restricted to allowed sources or deployed within a Virtual Cloud NetworkHighModification
  • Name
  • Ensure Oracle Autonomous Shared Databases (ADB) access is restricted to allowed sources or deployed within a Virtual Cloud.
  • Ensure Oracle Autonomous Shared Databases (ADB) access is restricted to allowed sources or deployed within a Virtual Cloud Network
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.OPE.01Ensure Versioning is Enabled for Object Storage BucketsLowModification
  • Name
  • Ensure Versioning is Enabled for Object Storage Buckets.
  • Ensure Versioning is Enabled for Object Storage Buckets
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.OPE.02Ensure Cloud Guard is enabled in the root compartment of the tenancyLowModification
  • Name
  • Ensure Cloud Guard is enabled in the root compartment of the tenancy.
  • Ensure Cloud Guard is enabled in the root compartment of the tenancy
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset

July 26 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.CRY.35Ensure the 'Minimum TLS version' for storage accounts is set to 'Version 1.2'HighModification
  • Name
  • Ensure the "Minimum TLS version" for storage accounts is set to "Version 1.2"
  • Ensure the 'Minimum TLS version' for storage accounts is set to 'Version 1.2'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.CRY.45Ensure FTP deployments are DisabledLowModification
  • Name
  • Ensure FTP deployments are Disabled for webapp
  • Ensure FTP deployments are Disabled
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.IAM.50Ensure that an exclusionary Geographic Access Policy is consideredLowModification
  • Name
  • Ensure that an exclusionary Geographic Access Policy is considered.
  • Ensure that an exclusionary Geographic Access Policy is considered
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AWS.VLN.07Ensure AWS Security Hub is enabledLowModification
  • Name
  • Ensure AWS Security Hub is enabled.
  • Ensure AWS Security Hub is enabled
  • AWS CIS Foundations v. 1.5.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS CloudGuard Best Practices
D9.OCI.NET.04Ensure no network security groups allow ingress from 0.0.0.0/0 to port 22.CriticalModification
  • Logic
  • NetworkSecurityGroup should have securityRules contain-none [ protocol='any' ] and securityRules contain-none [ tcpOptions isEmpty() and udpOptions isEmpty() ] and securityRules contain-none [ direction='INGRESS' and source='0.0.0.0/0' and protocol!='1' ] and securityRules contain-none [ tcpOptions.destinationPortRange.min<=22 and tcpOptions.destinationPortRange.max>=22 ]
  • NetworkSecurityGroup should not have securityRules contain [ direction='INGRESS' and source='0.0.0.0/0' and tcpOptions.destinationPortRange.min<=22 and tcpOptions.destinationPortRange.max>=22]
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.OCI.NET.05Ensure no network security groups allow ingress from 0.0.0.0/0 to port 3389.CriticalModification
  • Logic
  • NetworkSecurityGroup should have securityRules contain-none [ protocol='any' ] and securityRules contain-none [ tcpOptions isEmpty() and udpOptions isEmpty() ] and securityRules contain-none [ direction='INGRESS' and source='0.0.0.0/0' and protocol!='1' ] and securityRules contain-none [ tcpOptions.destinationPortRange.min<=3389 and tcpOptions.destinationPortRange.max>=3389 ]
  • NetworkSecurityGroup should not have securityRules contain [ direction='INGRESS' and source='0.0.0.0/0' and tcpOptions.destinationPortRange.min<=3389 and tcpOptions.destinationPortRange.max>=3389 ]
  • OCI Foundations Benchmark v1.2.0
  • CloudGuard OCI All Rules Ruleset
D9.AZU.NET.38Ensure FTP deployments are disabledHighRemoval
  • Azure CIS Foundations v. 1.4.0
  • Azure NIST 800-53 Rev 5
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.3.1

July 19 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.08SSL/TLS certificates expire in one weekHighModification
  • Severity
  • Low
  • High
  • AWS HIPAA
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.10ELB secured listener certificate expires in one weekHighModification
  • Severity
  • Low
  • High
  • AWS HIPAA
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.12ALB secured listener certificate expires in one weekHighModification
  • Severity
  • Low
  • High
  • AWS HIPAA
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.IAM.18Ensure MFA is enabled for the 'root' user accountCriticalModification
  • Name
  • Logic
  • Ensure VIRTUAL or HARDWARE MFA is enabled for the 'root' account
  • IamUser where name like '%root_account%' should have mfaType in('Virtual','Hardware')
  • Ensure MFA is enabled for the 'root' user account
  • IamUser where name like '%root_account%' should have mfaType in('Virtual')
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AZU.CRY.18Ensure that 'OS and Data' disks are encrypted with Customer Managed Key (CMK)HighModification
  • Name
  • Ensure that 'OS and Data' disks are encrypted with CMK
  • Ensure that 'OS and Data' disks are encrypted with Customer Managed Key (CMK)
  • Azure CloudGuard CheckUp
  • Azure CIS Foundations v. 1.4.0
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.LOG.12Ensure that logging for Azure Key Vault is 'Enabled'LowModification
  • Name
  • Ensure that logging for Azure KeyVault is 'Enabled'
  • Ensure that logging for Azure Key Vault is 'Enabled'
  • Azure CloudGuard CheckUp
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.0.0
  • Azure PCI-DSS 3.2
  • Azure NIST 800-53 Rev 4
  • Azure CSA CCM v.3.0.1
  • Azure ISO 27001:2013
  • Azure NIST CSF v1.1
  • Azure CloudGuard SOC2 based on AICPA TSC 2017
  • Azure HIPAA
  • Azure CIS Foundations v. 1.1.0
  • Azure NIST 800-171
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure New Zealand Information Security Manual (NZISM) v.3.4
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.NET.01Ensure no Azure SQL Databases allow ingress from 0.0.0.0/0 (ANY IP)HighModification
  • Name
  • Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP)
  • Ensure no Azure SQL Databases allow ingress from 0.0.0.0/0 (ANY IP)
  • Azure CloudGuard CheckUp
  • Azure CIS Foundations v. 1.4.0
  • Azure LGPD regulation
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.0.0
  • Azure PCI-DSS 3.2
  • Azure NIST 800-53 Rev 4
  • Azure CSA CCM v.3.0.1
  • Azure ISO 27001:2013
  • Azure NIST CSF v1.1
  • Azure CloudGuard SOC2 based on AICPA TSC 2017
  • Azure HIPAA
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Network Security Alerts
  • Azure NIST 800-171
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure New Zealand Information Security Manual (NZISM) v.3.4
  • Azure HITRUST v9.5.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.NET.18Ensure Azure Application Gateway Web application firewall (WAF) is enabledHighModification
  • Logic
  • ApplicationGateway should have firewall.enabled=true
  • ApplicationGateway should have firewall.enabled or regionalWAFPolicy.policySettings.state='Enabled'
  • Azure CloudGuard CheckUp
  • Azure NIST 800-53 Rev 5
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure HITRUST v9.5.0
D9.AZU.NET.20Ensure that Resource Locks are set for Mission-Critical Azure ResourcesLowModification
  • Name
  • Ensure that Azure Resource Group has resource lock enabled
  • Ensure that Resource Locks are set for Mission-Critical Azure Resources
  • Azure CloudGuard CheckUp
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.NET.26Ensure that RDP access from the Internet is evaluated and restrictedHighModification
  • Name
  • Ensure that RDP access is restricted from the internet
  • Ensure that RDP access from the Internet is evaluated and restricted
  • Azure CloudGuard CheckUp
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.NET.27Ensure that SSH access from the Internet is evaluated and restrictedHighModification
  • Name
  • Ensure that SSH access is restricted from the internet
  • Ensure that SSH access from the Internet is evaluated and restricted
  • Azure CloudGuard CheckUp
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.01Ensure Azure Key Vaults are Used to Store SecretsHighModification
  • Name
  • Ensure Azure Keyvaults are used to store secrets
  • Ensure Azure Key Vaults are Used to Store Secrets
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure NIST 800-53 Rev 4
  • Azure CSA CCM v.3.0.1
  • Azure NIST CSF v1.1
  • Azure HIPAA
  • Azure NIST 800-171
  • Azure CloudGuard Best Practices
  • Azure New Zealand Information Security Manual (NZISM) v.3.4
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.12Ensure that the Expiration Date is set for all Keys in Key VaultsLowModification
  • Name
  • Ensure that the expiration date is set on all keys
  • Ensure that the Expiration Date is set for all Keys in Key Vaults
  • Azure CIS Foundations v. 1.4.0
  • Azure LGPD regulation
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.0.0
  • Azure PCI-DSS 3.2
  • Azure NIST 800-53 Rev 4
  • Azure GDPR Readiness
  • Azure CSA CCM v.3.0.1
  • Azure ISO 27001:2013
  • Azure NIST CSF v1.1
  • Azure CloudGuard SOC2 based on AICPA TSC 2017
  • Azure HIPAA
  • Azure CIS Foundations v. 1.1.0
  • Azure NIST 800-171
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.13Ensure that the Expiration Date is set for all Secrets in Key VaultsLowModification
  • Name
  • Ensure that the expiration date is set on all Secrets
  • Ensure that the Expiration Date is set for all Secrets in Key Vaults
  • Azure CIS Foundations v. 1.4.0
  • Azure LGPD regulation
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.0.0
  • Azure PCI-DSS 3.2
  • Azure NIST 800-53 Rev 4
  • Azure GDPR Readiness
  • Azure CSA CCM v.3.0.1
  • Azure ISO 27001:2013
  • Azure NIST CSF v1.1
  • Azure CloudGuard SOC2 based on AICPA TSC 2017
  • Azure HIPAA
  • Azure CIS Foundations v. 1.1.0
  • Azure NIST 800-171
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure New Zealand Information Security Manual (NZISM) v.3.4
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.14Ensure SQL server's Transparent Data Encryption (TDE) protector is encrypted with Customer-managed keyLowModification
  • Name
  • Ensure SQL server's TDE protector is encrypted with Customer-managed key
  • Ensure SQL server's Transparent Data Encryption (TDE) protector is encrypted with Customer-managed key
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.16Ensure the storage account containing the container with activity logs is encrypted with Customer Managed KeyLowModification
  • Name
  • Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)
  • Ensure the storage account containing the container with activity logs is encrypted with Customer Managed Key
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.21Ensure that 'HTTP Version' is the Latest, if Used to Run the Web AppHighModification
  • Name
  • Ensure that 'HTTP Version' is the latest, if used to run the web app
  • Ensure that 'HTTP Version' is the Latest, if Used to Run the Web App
  • Azure CIS Foundations v. 1.4.0
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.24Ensure Web App Redirects All HTTP traffic to HTTPS in Azure App ServiceHighModification
  • Name
  • Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service
  • Ensure Web App Redirects All HTTP traffic to HTTPS in Azure App Service
  • Azure CIS Foundations v. 1.4.0
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.26Ensure that 'Unattached disks' are encrypted with 'Customer Managed Key' (CMK)LowModification
  • Name
  • Ensure that 'Unattached disks' are encrypted with CMK
  • Ensure that 'Unattached disks' are encrypted with 'Customer Managed Key' (CMK)
  • Azure CIS Foundations v. 1.4.0
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.27Ensure Storage for Critical Data are Encrypted with Customer Managed KeysLowModification
  • Name
  • Ensure storage for critical data is encrypted with Customer Managed Key
  • Ensure Storage for Critical Data are Encrypted with Customer Managed Keys
  • Azure CIS Foundations v. 1.4.0
  • Azure LGPD regulation
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.0.0
  • Azure PCI-DSS 3.2
  • Azure NIST 800-53 Rev 4
  • Azure GDPR Readiness
  • Azure CSA CCM v.3.0.1
  • Azure ISO 27001:2013
  • Azure CloudGuard SOC2 based on AICPA TSC 2017
  • Azure HIPAA
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure New Zealand Information Security Manual (NZISM) v.3.4
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.35Ensure the "Minimum TLS version" for storage accounts is set to "Version 1.2"HighModification
  • Name
  • Ensure the 'Minimum TLS version' is set to 'Version 1.2'
  • Ensure the "Minimum TLS version" for storage accounts is set to "Version 1.2"
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.CRY.37Ensure Soft Delete is Enabled for Azure Containers and Blob StorageHighModification
  • Name
  • Ensure Soft Delete is Enabled for Azure Storage
  • Ensure Soft Delete is Enabled for Azure Containers and Blob Storage
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.CRY.39Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported ServicesHighModification
  • Name
  • Ensure That Storage Account Access Keys are Periodically Regenerated
  • Ensure Automatic Key Rotation is Enabled Within Azure Key Vault for the Supported Services
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.40Ensure That 'PHP version' is the Latest, If Used to Run the Web AppLowModification
  • Name
  • Ensure That 'PHP version' is the Latest, If Used to Run the Windows Web App
  • Ensure That 'PHP version' is the Latest, If Used to Run the Web App
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.41Ensure that 'Python version' is the Latest Stable Version, if Used to Run the Web AppLowModification
  • Name
  • Ensure that 'Python version' is the Latest Stable Version, if Used to Run the Linux Web App
  • Ensure that 'Python version' is the Latest Stable Version, if Used to Run the Web App
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.CRY.42Ensure that 'Java version' is the latest, if used to run the Web AppLowModification
  • Name
  • Ensure that 'Java version' is the latest, if used to run the Windows Web App
  • Ensure that 'Java version' is the latest, if used to run the Web App
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.IAM.08Ensure App Service Authentication is set up for apps in Azure App Service - WebappHighModification
  • Name
  • Enable App Service Authentication on Azure App Service
  • Ensure App Service Authentication is set up for apps in Azure App Service - Webapp
  • Azure CIS Foundations v. 1.4.0
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.IAM.14Ensure App Service Authentication is set up for apps in Azure App Service - FunctionAppHighModification
  • Name
  • Enable Function App Service Authentication
  • Ensure App Service Authentication is set up for apps in Azure App Service - FunctionApp
  • Azure CIS Foundations v. 1.4.0
  • Azure Security Risk Management
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.IAM.41Ensure Guest Users Are Reviewed on a Regular BasisLowModification
  • Name
  • Ensure guest users are reviewed on a monthly basis
  • Ensure Guest Users Are Reviewed on a Regular Basis
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.IAM.45Ensure That 'Number of methods required to reset' is set to '2'LowModification
  • Name
  • Ensure that 'Number of methods required to reset' is set to '2'
  • Ensure That 'Number of methods required to reset' is set to '2'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.LOG.06Ensure Server Parameter 'log_retention_days' is greater than 3 days for PostgreSQL Database ServerLowModification
  • Name
  • Ensure server parameter 'log_retention_days' is greater than 3 days for PostgreSQL Database Server
  • Ensure Server Parameter 'log_retention_days' is greater than 3 days for PostgreSQL Database Server
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.LOG.10Ensure Server Parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database ServerLowModification
  • Name
  • Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server
  • Ensure Server Parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.LOG.13Ensure the Storage Container Storing the Activity Logs is not Publicly AccessibleHighModification
  • Name
  • Ensure the storage container storing the activity logs is not publicly accessible
  • Ensure the Storage Container Storing the Activity Logs is not Publicly Accessible
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.LOG.16Ensure Storage Logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' RequestsLowModification
  • Name
  • Ensure Storage logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' requests
  • Ensure Storage Logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' Requests
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.LOG.17Ensure that Endpoint Protection for all Virtual Machines is installedHighModification
  • Name
  • Ensure that the endpoint protection for all Virtual Machines is installed
  • Ensure that Endpoint Protection for all Virtual Machines is installed
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.21Ensure that 'Auditing' is set to 'On'LowModification
  • Name
  • Ensure that SQL server 'Auditing' is set to 'On'
  • Ensure that 'Auditing' is set to 'On'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure ISO 27001:2013
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.22Ensure that 'Auditing' Retention is 'greater than 90 days'LowModification
  • Name
  • Ensure that SQL Server 'Auditing' Retention is 'greater than 90 days'
  • Ensure that 'Auditing' Retention is 'greater than 90 days'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure ISO 27001:2013
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.25Ensure that Vulnerability Assessment (VA) setting 'Also send email notifications to admins and subscription owners' is set for each SQL ServerLowModification
  • Name
  • Ensure that VA setting 'Also send email notifications to admins and subscription owners' is set for a SQL server
  • Ensure that Vulnerability Assessment (VA) setting 'Also send email notifications to admins and subscription owners' is set for each SQL Server
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure ISO 27001:2013
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure New Zealand Information Security Manual (NZISM) v.3.4
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.47Ensure that a 'Diagnostic Setting' existsLowModification
  • Name
  • Ensure that Azure Monitor Logs is configured to export Activity Logs
  • Ensure that a 'Diagnostic Setting' exists
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.58Ensure that Auto provisioning of 'Log Analytics agent for Azure VMs' is Set to 'On'LowModification
  • Name
  • Ensure That Auto provisioning of 'Log Analytics agent for Azure VMs' is Set to 'On'
  • Ensure that Auto provisioning of 'Log Analytics agent for Azure VMs' is Set to 'On'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.MON.63Ensure that Vulnerability Assessment (VA) setting 'Periodic recurring scans' is set to 'on' for each SQL serverLowModification
  • Name
  • Ensure that VA setting 'Periodic recurring scans' to 'on' for each SQL server
  • Ensure that Vulnerability Assessment (VA) setting 'Periodic recurring scans' is set to 'on' for each SQL server
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.64Ensure that Vulnerability Assessment (VA) setting 'Send scan reports to' is configured for a SQL serverLowModification
  • Name
  • Ensure that VA setting 'Send scan reports to' is configured for a SQL server
  • Ensure that Vulnerability Assessment (VA) setting 'Send scan reports to' is configured for a SQL server
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.65Ensure That Microsoft Defender for Servers Is Set to 'On'HighModification
  • Name
  • Ensure that Microsoft Defender for Servers is set to 'On'
  • Ensure That Microsoft Defender for Servers Is Set to 'On'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.66Ensure That Microsoft Defender for App Services Is Set To 'On'HighModification
  • Name
  • Ensure that Microsoft Defender for App Service is set to 'On'
  • Ensure That Microsoft Defender for App Services Is Set To 'On'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.67Ensure That Microsoft Defender for Azure SQL Databases Is Set To 'On'HighModification
  • Name
  • Ensure that Microsoft Defender for Azure SQL Databases is set to 'On'
  • Ensure That Microsoft Defender for Azure SQL Databases Is Set To 'On'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.68Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On'HighModification
  • Name
  • Ensure that Microsoft Defender for SQL servers on machines is set to 'On'
  • Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.69Ensure That Microsoft Defender for Storage Is Set To 'On'HighModification
  • Name
  • Ensure that Microsoft Defender for Storage is set to 'On'
  • Ensure That Microsoft Defender for Storage Is Set To 'On'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.71Ensure That Microsoft Defender for Key Vault Is Set To 'On'HighModification
  • Name
  • Ensure that Microsoft Defender for Key Vault is set to 'On'
  • Ensure That Microsoft Defender for Key Vault Is Set To 'On'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.72Ensure that Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud is selectedHighModification
  • Name
  • Microsoft Defender for Endpoint (WDATP) integration with Microsoft Defender for Cloud is selected
  • Ensure that Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud is selected
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.73Ensure that Microsoft Defender for Cloud Apps integration with Microsoft Defender for Cloud is SelectedHighModification
  • Name
  • Ensure that Microsoft Defender for Cloud Apps (MCAS) Integration with Microsoft Defender for Cloud is selected
  • Ensure that Microsoft Defender for Cloud Apps integration with Microsoft Defender for Cloud is Selected
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.74Ensure Any of the ASC Default Policy Settings are Not Set to 'Disabled'HighModification
  • Name
  • Ensure Any of the ASC Default Policy Setting is Not Set to 'Disabled'
  • Ensure Any of the ASC Default Policy Settings are Not Set to 'Disabled'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.VLN.01Ensure that Microsoft Defender for SQL is set to 'On' for critical SQL ServersLowModification
  • Name
  • Ensure that Advanced Threat Protection (ATP) on a SQL server is set to 'Enabled'
  • Ensure that Microsoft Defender for SQL is set to 'On' for critical SQL Servers
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
  • Azure CIS Foundations v. 1.3.1
D9.AZU.NET.24Ensure Default Network Access Rule for Storage Accounts is Set to DenyHighModification
  • Name
  • Ensure default network access rule for Storage Accounts is set to deny
  • Ensure Default Network Access Rule for Storage Accounts is Set to Deny
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Microsoft Cloud Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.NET.25Ensure 'Allow Azure services on the trusted services list to access this storage account' is Enabled for Storage Account AccessLowModification
  • Name
  • Ensure 'Trusted Microsoft Services' is enabled for Storage Account access
  • Ensure 'Allow Azure services on the trusted services list to access this storage account' is Enabled for Storage Account Access
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.NET.66Ensure that 'Public access level' is disabled for storage accounts with blob containersCriticalModification
  • Name
  • Ensure that 'Public access level' is set to Private for blob containers
  • Ensure that 'Public access level' is disabled for storage accounts with blob containers
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AWS.LOG.19Ensure that Object-level logging for write events is enabled for S3 bucketLowModification
  • Name
  • Ensure that object-level logging is enabled for S3 buckets
  • Ensure that Object-level logging for write events is enabled for S3 bucket
  • AWS LGPD regulation
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • CloudGuard AWS All Rules Ruleset
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AZU.IAM.03Ensure that Azure Active Directory Admin is Configured for SQL ServersLowModification
  • Name
  • Ensure that Azure SQL Server Admin is configured with AD Authentication
  • Ensure that Azure Active Directory Admin is Configured for SQL Servers
  • Azure LGPD regulation
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CIS Foundations v. 1.0.0
  • Azure PCI-DSS 3.2
  • Azure NIST 800-53 Rev 4
  • Azure GDPR Readiness
  • Azure CSA CCM v.3.0.1
  • Azure ISO 27001:2013
  • Azure NIST CSF v1.1
  • Azure CloudGuard SOC2 based on AICPA TSC 2017
  • Azure HIPAA
  • Azure CIS Foundations v. 1.1.0
  • Azure NIST 800-171
  • Azure CloudGuard Best Practices
  • Azure New Zealand Information Security Manual (NZISM) v.3.4
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
D9.AWS.IAM.53Ensure AWS IAM policies do not grant 'assume role' permission across all servicesHighModification
  • Severity
  • Low
  • High
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AZU.IAM.46Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged UsersHighModification
  • Name
  • Ensure that multi-factor authentication is enabled for all privileged users
  • Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Privileged Users
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.IAM.47Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged UsersHighModification
  • Name
  • Ensure that multi-factor authentication is enabled for all non-privileged users
  • Ensure that 'Multi-Factor Auth Status' is 'Enabled' for all Non-Privileged Users
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure Dashboard System Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.IAM.51Ensure that A Multi-factor Authentication Policy Exists for Administrative GroupsLowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.IAM.52Ensure that A Multi-factor Authentication Policy Exists for All UsersLowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.IAM.53Ensure Multi-factor Authentication is Required for Risky Sign-insLowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.IAM.54Ensure Multi-factor Authentication is Required for Azure ManagementLowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AZU.NET.62Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All NetworksHighModification
  • Name
  • Ensure Cosmos DB account public network access is disabled
  • Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure HITRUST v9.5.0
D9.AZU.NET.64Ensure That Private Endpoints Are Used Where PossibleMediumModification
  • Name
  • Ensure Cosmos DB account is using Private Endpoints
  • Ensure That Private Endpoints Are Used Where Possible
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
D9.AWS.IAM.19Ensure hardware MFA is enabled for the 'root' user accountCriticalNew
  • AWS CIS Foundations v. 1.5.0
  • CloudGuard AWS All Rules Ruleset
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.4.0

July 12 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.CRY.46Ensure FTP deployments are Disabled for FunctionAppLowModification
  • Logic
  • FunctionApp should not have ftpState='AllAllowed'
  • FunctionApp should have ftpState in('FtpsOnly', 'Disabled')
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • CloudGuard Azure All Rules Ruleset
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AWS.IAM.102Ensure that AWS Elastic Container Registry (ECR) repositories are not exposed to everyone.CriticalModification
  • Logic
  • EcrRepository should not have policy.document.Statement contain [ Effect='Allow' and (Principal='*' or Principal.AWS='*')]
  • EcrRepository should not have policy.document.Statement contain [ Effect='Allow' and (Principal='*' or Principal.AWS='*') and not Condition]
  • AWS Security Risk Management
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CSA CCM v.4.0.1
  • CloudGuard AWS All Rules Ruleset
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.AWS.CRY.84CodeBuild S3 logs should be encryptedHighModification
  • Severity
  • Low
  • High
  • AWS NIST 800-53 Rev 5
  • CloudGuard AWS All Rules Ruleset
  • AWS CloudGuard Best Practices
D9.AZU.IAM.49Ensure Trusted Locations Are DefinedLowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.IAM.50Ensure that an exclusionary Geographic Access Policy is considered.LowNew
  • CloudGuard Azure All Rules Ruleset
D9.AZU.MON.81Ensure that Storage Account has Microsoft Defender for Cloud enabledLowNew
  • CloudGuard Azure All Rules Ruleset

July 05 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.05Ensure that encryption-at-rest is enabled for RDS InstancesHighModification
  • Name
  • Ensure that encryption is enabled for RDS Instances
  • Ensure that encryption-at-rest is enabled for RDS Instances
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard CheckUp
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS Dashboard System Ruleset
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.22Ensure that encryption is enabled for EFS file systemsHighModification
  • Name
  • Ensure that your Amazon EFS file systems are encrypted
  • Ensure that encryption is enabled for EFS file systems
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard CheckUp
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.IAM.01Eliminate use of the 'root' user for administrative and daily tasksHighModification
  • Name
  • Avoid the use of the 'root' account
  • Eliminate use of the 'root' user for administrative and daily tasks
  • AWS HIPAA
  • CloudGuard AWS Dashboards
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS Dashboard System Ruleset
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.IAM.16Ensure no 'root' user account access key existsHighModification
  • Name
  • Ensure no root account access key exists
  • Ensure no 'root' user account access key exists
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.IAM.27Ensure IAM policies that allow full '*:*' administrative privileges are not attachedHighModification
  • Name
  • Ensure IAM policies that allow full '*:*' administrative privileges are not created
  • Ensure IAM policies that allow full '*:*' administrative privileges are not attached
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS Dashboard System Ruleset
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.IAM.43Ensure MFA Delete is enabled on S3 bucketsLowModification
  • Name
  • Ensure MFA Delete is enable on S3 buckets
  • Ensure MFA Delete is enabled on S3 buckets
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS CCPA Framework
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.LOG.03Ensure CloudTrail trails are integrated with CloudWatch LogsLowModification
  • Name
  • Ensure that CloudTrail trails are integrated with CloudWatch Logs
  • Ensure CloudTrail trails are integrated with CloudWatch Logs
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS CCPA Framework
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.01Ensure unauthorized API calls are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for unauthorized API calls
  • Ensure unauthorized API calls are monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard CheckUp
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.02Ensure management console sign-in without MFA is monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for Management Console sign-in without MFA
  • Ensure management console sign-in without MFA is monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.04Ensure IAM policy changes are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for IAM policy changes
  • Ensure IAM policy changes are monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.05Ensure CloudTrail configuration changes are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for CloudTrail configuration changes
  • Ensure CloudTrail configuration changes are monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.07Ensure disabling or scheduled deletion of customer created CMKs is monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs
  • Ensure disabling or scheduled deletion of customer created CMKs is monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.08Ensure S3 bucket policy changes are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for S3 bucket policy changes
  • Ensure S3 bucket policy changes are monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.09Ensure AWS Config configuration changes are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for AWS Config configuration changes
  • Ensure AWS Config configuration changes are monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.11Ensure Network Access Control Lists (NACL) changes are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)
  • Ensure Network Access Control Lists (NACL) changes are monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.12Ensure changes to network gateways are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for changes to network gateways
  • Ensure changes to network gateways are monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.13Ensure route table changes are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for route table changes
  • Ensure route table changes are monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.14Ensure VPC changes are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for VPC changes
  • Ensure VPC changes are monitored
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.NET.17Ensure that public access is not given to RDS InstanceCriticalModification
  • Name
  • RDS should not have Public Interface open to a public scope
  • Ensure that public access is not given to RDS Instance
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS NIST 800-53 Rev 4
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard CheckUp
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Network Alerts for default VPC components
  • AWS CloudGuard Best Practices
  • AWS Dashboard System Ruleset
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.06Ensure AWS Management Console authentication failures are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for AWS Management Console authentication failures
  • Ensure AWS Management Console authentication failures are monitored
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.10Ensure security group changes are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exist for security group changes
  • Ensure security group changes are monitored
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.LOG.19Ensure that object-level logging is enabled for S3 bucketsLowModification
  • Name
  • Ensure that object-level logging is enabled for S3 buckets
  • Ensure that object-level logging is enabled for S3 buckets
  • AWS LGPD regulation
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.IAM.51Ensure there is only one active access key available for any single IAM userHighModification
  • Name
  • Ensure AWS IAM users have no more than one active Access Key
  • Ensure there is only one active access key available for any single IAM user
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.NET.72Ensure that S3 Buckets are configured with 'Block public access (bucket settings)'CriticalModification
  • Name
  • Ensure that S3 Buckets are configured with Block public access (bucket/account settings)
  • Ensure that S3 Buckets are configured with 'Block public access (bucket settings)'
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.NET.90Ensure that EC2 Metadata Service only allows IMDSv2MediumModification
  • Name
  • Ensure that EC2 instances requires the use of Instance Metadata Service Version 2 (IMDSv2)
  • Ensure that EC2 Metadata Service only allows IMDSv2
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS HITRUST v11.0.0
  • AWS CIS Foundations v. 2.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.AWS.CRY.53Ensure that sensitive parameters are encryptedHighModification
  • Logic
  • SystemManagerParameter where name regexMatch /(pass)|(user)|(login)|(pwd)|(key)|(secret)/ should have parameterType='SecureString'
  • SystemManagerParameter where name regexMatch /(pass|user|login|pwd|key|secret)/ should have parameterType='SecureString'
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.CRY.61Ensure EBS Volume Encryption is Enabled in all RegionsHighModification
  • Name
  • Ensure EBS volume encryption is enabled
  • Ensure EBS Volume Encryption is Enabled in all Regions
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS CIS Foundations v. 1.3.0
  • AWS CIS Foundations v. 1.4.0
D9.AWS.CRY.83Attached EBS volumes should be encrypted at-restMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.CRY.84CodeBuild S3 logs should be encryptedLowNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.CRY.85DynamoDB Accelerator (DAX) clusters should be encrypted at restMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.CRY.86Connections to Amazon Redshift clusters should be encrypted in transitMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.IAM.66Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environmentsLowModification
  • Logic
  • List<IamSAMLProvider> should have items with [id] length() > 0]
  • List<IamSAMLProvider> should have items with [id] length() > 0
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.3.0
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.24Ensure AWS Organizations changes are monitoredLowModification
  • Name
  • Ensure a log metric filter and alarm exists for AWS Organizations changes
  • Ensure AWS Organizations changes are monitored
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CSA CCM v.4.0.1
  • AWS CIS Foundations v. 2.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.3.0
  • AWS CIS Foundations v. 1.4.0
D9.AWS.OPE.08Ensure Auto Minor Version Upgrade feature is Enabled for RDS InstancesLowModification
  • Name
  • Ensure AWS RDS automatic minor upgrades are enabled
  • Ensure Auto Minor Version Upgrade feature is Enabled for RDS Instances
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CIS Foundations v. 2.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AZU.IAM.48Ensure That 'Subscription Entering AAD Directory' and 'Subscription Leaving AAD Directory' Is Set To 'Permit No One'LowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AWS.CRY.77Ensure rotation for customer created symmetric CMKs is enabledHighModification
  • Name
  • Ensure KMS CMK have key rotation enabled
  • Ensure rotation for customer created symmetric CMKs is enabled
  • AWS PCI-DSS 4.0
  • AWS CIS Foundations v. 2.0.0
  • AWS CloudGuard Best Practices
D9.AZU.MON.87Ensure Application Insights are ConfiguredLowNew
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AWS.AS.01Instances outside of Europe regionLowModification
  • Logic
  • Instance should have region like '%eu_%'
  • Instance should have region like 'eu_%'
  • AWS GDPR Readiness
D9.AWS.AS.02S3 Buckets outside of EuropeLowModification
  • Logic
  • S3Bucket should have region regexMatch /eu_*/i
  • S3Bucket should have region like 'eu_%'
  • AWS GDPR Readiness
D9.GCP.CRY.16Enable 2FA for VM Instances using OS LoginMediumNew
  • GCP CloudGuard Best Practices
D9.AWS.CRY.82S3 buckets should have server-side encryption enabledMediumRemoval
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.GCP.IAM.30Ensure Essential Contacts are defined for your Google Cloud organizationHighRemoval
  • GCP NIST 800-53 Rev 5
  • GCP CloudGuard Best Practices
D9.AWS.CRY.71Ensure that encryption is enabled for AWS RDS DB Cluster SnapshotHighRemoval
  • AWS CloudGuard Best Practices
D9.AWS.CRY.72Ensure that encryption is enabled for AWS RDS DB SnapshotHighRemoval
  • AWS CloudGuard Best Practices

June 28 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.04Ensure S3 Bucket Policy is set to deny HTTP requestsHighModification
  • Logic
  • S3Bucket where policy should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false' and ((Action contain ['s3:GetObject'] and Action contain ['s3:PutObject']) or Action contain ['s3:*'] or Action contain ['*'] ) ]
  • S3Bucket should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false' and ((Action contain ['s3:GetObject'] and Action contain ['s3:PutObject']) or Action contain ['s3:*'] or Action contain ['*'] ) ]
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS Security Risk Management
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS CCPA Framework
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AWS.LOG.23Ensure the S3 bucket used to store CloudTrail logs is not publicly accessibleHighModification
  • Logic
  • S3Bucket where policy.Statement contain [Principal.Service='cloudtrail.amazonaws.com'] should not have ( acl.grants contain [uri like 'http://acs.amazonaws.com/groups/global/%'] or policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition])
  • S3Bucket where policy.Statement contain [Principal.Service='cloudtrail.amazonaws.com'] should not have ( acl.grants contain [uri like 'http://acs.amazonaws.com/groups/global/%'] or policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*')])
  • AWS LGPD regulation
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS CSA CCM v.4.0.1
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS CCPA Framework
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.K8S.IAM.38Minimize the admission of containers with added capabilities (PSP)HighModification
  • Logic
  • List<KubernetesPodSecurityPolicy> should have items contain [(not spec.allowedCapabilities) or (spec.allowedCapabilities contain [isEmpty()])]
  • List<KubernetesPodSecurityPolicy> where items length() > 0 should have items contain [(not spec.allowedCapabilities) or (spec.allowedCapabilities contain [isEmpty()])]
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0
  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.2.0
  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.3.0
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.4.0
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.AWS.CRY.82S3 buckets should have server-side encryption enabledMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.NET.36AWS Cloud Front - WAF IntegrationMediumModification
  • Logic
  • CloudFront should have distributionConfig.webACLId
  • CloudFront where region unlike 'cn_%' should have distributionConfig.webACLId
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CIS Controls V 8
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AZU.CRY.49Ensure that 'Enable Infrastructure Encryption' for Each Storage Account in Azure Storage is Set to 'enabled'LowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.CRY.50Ensure that 'Enable key rotation reminders' is enabled for each Storage AccountHighNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.CRY.51Enable Role Based Access Control for Azure Key VaultHighNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.LOG.18Ensure that logging for Azure AppService 'HTTP logs' is enabledLowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.MON.85Ensure that Auto provisioning of 'Vulnerability assessment for machines' is Set to 'On'LowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.MON.86Ensure the 'ServiceAdmin' role is listed as an email recipient for Defender alertsLowNew
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v. 1.0.0
  • Azure CloudGuard Best Practices
  • Azure HITRUST v9.5.0
  • Azure ITSG-33
D9.ALI.CRY.05Ensure server-side encryption is set to 'Encrypt with BYOK'.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.CRY.06Ensure RDS instance TDE protector is encrypted with BYOK (Use your own key).HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.CRY.07Ensure that 'TDE' is set to 'Enabled' on for applicable database instance.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.IAM.18Ensure that multi-factor authentication is enabled for all RAM users that have a console passwordHighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.IAM.19Ensure access keys are rotated every 90 days or lessHighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.LOG.02Ensure that ActionTrail are configured to export copies of all Log entriesHighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.LOG.03Ensure the OSS used to store ActionTrail logs is not publicly accessibleHighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.LOG.10Ensure Security Center Network, Host and Security log analysis is enabled.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.LOG.25Ensure parameter 'log_connections' is set to 'ON' for PostgreSQL DatabaseLowNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.LOG.26Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL Database ServerLowNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.LOG.27Ensure server parameter 'log_duration is set to 'ON' for PostgreSQL Database ServerLowNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.MON.01Ensure that 'Auditing' is set to 'On' for applicable database instancesLowNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.MON.02Ensure that 'Auditing' Retention is 'greater than 6 months'.LowNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.NET.11Ensure network access rule for storage bucket is not set to publicly accessibleHighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.NET.12Ensure that RDS instance requires all incoming connections to use SSLHighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.NET.13Ensure that RDS Instances are not open to the worldHighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.NET.15Ensure that SSH access is restricted from the internetHighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.NET.16Ensure VPC flow logging is enabled in all VPCs.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.VLN.01Ensure that Security Center is Advanced or Enterprise Edition.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.VLN.02Ensure that all assets are installed with security agent.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.VLN.03Ensure that Automatic Quarantine is enabled.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.VLN.04Ensure that Webshell detection is enabled on all web servers.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.VLN.05Ensure that notification is enabled on all high risk items.LowNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.VLN.06Ensure that Config Assessment is granted with privilege.LowNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.VLN.07Ensure that scheduled vulnerability scan is enabled on all servers.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.ALI.VLN.09Ensure that the latest OS Patches for all Virtual Machines are applied.HighNew
  • Alibaba CIS Foundations v. 1.0
D9.AZU.LOG.07Ensure that a Log Profile existsLowRemoval
  • Azure CloudGuard Best Practices
  • Azure ITSG-33

June 21 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.78CloudFront distributions should require encryption in transitMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.CRY.79CloudFront distributions should encrypt traffic to custom originsMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.CRY.80RDS cluster snapshots should be encrypted at restMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.CRY.81RDS database snapshots should be encrypted at restMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices

June 14 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.IAM.46Ensure that multi-factor authentication is enabled for all privileged usersHighNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.IAM.47Ensure that multi-factor authentication is enabled for all non-privileged usersHighNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AWS.CRY.77Ensure KMS CMK have key rotation enabledHighModification
  • Logic
  • KMS where origin != 'AWS_CLOUDHSM' and isCustomerManaged=true should not have rotationStatus isEmpty()
  • KMS where origin!='AWS_CLOUDHSM' and isCustomerManaged=true and deletionDate<=0 and isSymmetricKey=true should have rotationStatus=true
  • AWS PCI-DSS 4.0
  • AWS CloudGuard Best Practices
D9.AWS.LOG.09Ensure rotation for customer created CMKs is enabledLowRemoval
  • AWS HIPAA
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard CheckUp
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AZU.MON.03Ensure SQL Database Threat Detection is Enabled and that Email to Account Admins is also EnabledLowRemoval
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v. 1.0.0
  • Azure CloudGuard Best Practices
  • Azure HITRUST v9.5.0
  • Azure ITSG-33

June 07 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.K8S.IAM.02Ensure that the --anonymous-auth argument is set to false (Kubelet)HighModification
  • Logic
  • KubernetesNode should have kubeletData.kubeletconfig.authentication.anonymous.enabled= 'false'
  • KubernetesNode where not kubeletData isEmpty() should have kubeletData.kubeletconfig.authentication.anonymous.enabled = 'false'
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • OpenShift Container Platform v3
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0
  • CIS Kubernetes Benchmark v1.24
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.2.0
  • CIS Kubernetes Benchmark v1.4.0
  • Kubernetes v.1.13 CloudGuard Best Practices
  • Kubernetes NIST.SP.800-190
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.K8S.MON.01Ensure that the --event-qps argument is set to 0 (Kubelet)LowModification
  • Logic
  • KubernetesNode should have kubeletData.kubeletconfig.eventRecordQPS= '0'
  • KubernetesNode where not kubeletData isEmpty() should have kubeletData.kubeletconfig.eventRecordQPS = '0'
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • OpenShift Container Platform v3
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0
  • CIS Kubernetes Benchmark v1.4.0
  • Kubernetes v.1.13 CloudGuard Best Practices
  • Kubernetes NIST.SP.800-190
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.K8S.NET.01Ensure that the --client-ca-file argument is set as appropriate (Kubelet)HighModification
  • Logic
  • KubernetesNode should have kubeletData.kubeletconfig.authentication.x509.clientCAFile
  • KubernetesNode where not kubeletData isEmpty() should have kubeletData.kubeletconfig.authentication.x509.clientCAFile
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • OpenShift Container Platform v3
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0
  • CIS Kubernetes Benchmark v1.24
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.2.0
  • CIS Kubernetes Benchmark v1.4.0
  • Kubernetes v.1.13 CloudGuard Best Practices
  • Kubernetes NIST.SP.800-190
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.K8S.NET.03Ensure that the --streaming-connection-idle-timeout argument is not set to 0 (Kubelet)HighModification
  • Logic
  • KubernetesNode should have kubeletData.kubeletconfig.streamingConnectionIdleTimeout!= '0'
  • KubernetesNode where not kubeletData isEmpty() should have kubeletData.kubeletconfig.streamingConnectionIdleTimeout != '0'
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • OpenShift Container Platform v3
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0
  • CIS Kubernetes Benchmark v1.24
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.2.0
  • CIS Kubernetes Benchmark v1.4.0
  • Kubernetes v.1.13 CloudGuard Best Practices
  • Kubernetes NIST.SP.800-190
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.K8S.NET.04Ensure that the --make-iptables-util-chains argument is set to true (Kubelet)MediumModification
  • Logic
  • KubernetesNode should have kubeletData.kubeletconfig.makeIPTablesUtilChains= 'true'
  • KubernetesNode where not kubeletData isEmpty() should have kubeletData.kubeletconfig.makeIPTablesUtilChains= 'true'
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • OpenShift Container Platform v3
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0
  • CIS Kubernetes Benchmark v1.24
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.2.0
  • CIS Kubernetes Benchmark v1.4.0
  • Kubernetes v.1.13 CloudGuard Best Practices
  • Kubernetes NIST.SP.800-190
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.K8S.OPE.01Ensure that the --protect-kernel-defaults argument is set to true (Kubelet)HighModification
  • Logic
  • KubernetesNode should have kubeletData.kubeletconfig.protectKernelDefaults= 'true'
  • KubernetesNode where not kubeletData isEmpty() should have kubeletData.kubeletconfig.protectKernelDefaults = 'true'
  • CIS OpenShift Container Platform v4 Benchmark v1.1.0
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • OpenShift Container Platform v3
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0
  • CIS Kubernetes Benchmark v1.24
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.2.0
  • CIS Kubernetes Benchmark v1.4.0
  • Kubernetes v.1.13 CloudGuard Best Practices
  • Kubernetes NIST.SP.800-190
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.GCP.CRY.14Ensure that all BigQuery Tables are encrypted with Customer-managed encryption key (CMEK)HighModification
  • Logic
  • BigQueryTable should not have encryptionConfiguration.kmsKeyName isEmpty()
  • BigQueryTable where view.query isEmpty() should not have encryptionConfiguration.kmsKeyName isEmpty()
  • GCP CIS Foundations v. 1.3.0
  • GCP NIST 800-53 Rev 5
  • GCP PCI-DSS 4.0
  • GCP CIS Foundations v. 2.0
  • GCP MITRE ATT&CK Framework v12.1
  • GCP CIS Foundations v. 1.2.0
  • GCP CloudGuard Best Practices
D9.K8S.CRY.01Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet)HighModification
  • Logic
  • KubernetesNode should have (kubeletData.kubeletconfig.tlsCertFile ) and (kubeletData.kubeletconfig.tlsPrivateKeyFile )
  • KubernetesNode where not kubeletData isEmpty() should have (kubeletData.kubeletconfig.tlsCertFile ) and (kubeletData.kubeletconfig.tlsPrivateKeyFile )
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • CIS Kubernetes Benchmark v1.24
  • CIS Kubernetes Benchmark v1.4.0
  • Kubernetes v.1.13 CloudGuard Best Practices
  • Kubernetes NIST.SP.800-190
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.K8S.CRY.02Ensure that the --rotate-certificates argument is not set to false (Kubelet)HighModification
  • Logic
  • KubernetesNode should have kubeletData.kubeletconfig.rotateCertificates= 'true'
  • KubernetesNode where not kubeletData isEmpty() should have kubeletData.kubeletconfig.rotateCertificates = 'true'
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0
  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0
  • CIS Kubernetes Benchmark v1.24
  • CIS Kubernetes Benchmark v1.4.0
  • Kubernetes v.1.13 CloudGuard Best Practices
  • Kubernetes NIST.SP.800-190
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.K8S.CRY.03Ensure that the RotateKubeletServerCertificate argument is set to true (Kubelet)HighModification
  • Logic
  • KubernetesNode should have kubeletData.kubeletconfig.featureGates.RotateKubeletServerCertificate= 'true'
  • KubernetesNode where not kubeletData isEmpty() should have kubeletData.kubeletconfig.featureGates.RotateKubeletServerCertificate = 'true'
  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.2.0
  • CIS Kubernetes Benchmark v1.4.0
  • Kubernetes v.1.13 CloudGuard Best Practices
  • Kubernetes NIST.SP.800-190
  • CIS Kubernetes Benchmark v1.5.1
  • CIS Kubernetes Benchmark v1.6.1
  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1
  • Kubernetes v.1.14 CloudGuard Best Practices
  • CIS Kubernetes Benchmark v1.20
  • CIS Kubernetes Benchmark v1.23
D9.AWS.CRY.77Ensure KMS CMK have key rotation enabledHighModification
  • Logic
  • KMS where isCustomerManaged=true should not have rotationStatus isEmpty()
  • KMS where origin != 'AWS_CLOUDHSM' and isCustomerManaged=true should not have rotationStatus isEmpty()
  • AWS PCI-DSS 4.0
  • AWS CloudGuard Best Practices
D9.AWS.IAM.114Ensure API gateway policy limits public accessHighNew
  • CloudGuard AWS Default Ruleset
D9.AWS.NET.95Ensure API gateway has WAFLowNew
  • CloudGuard AWS Default Ruleset

May 31 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.IAM.59Ensure that VPC Endpoint policy does not provide excessive permissionsHighModification
  • Name
  • Ensure that VPC Endpoint policy won't allow all actions
  • Ensure that VPC Endpoint policy does not provide excessive permissions
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.GCP.IAM.29Ensure unrestricted API keys are not available within your GCP projectsHighNew
  • GCP NIST 800-53 Rev 5
  • GCP CloudGuard Best Practices
D9.GCP.IAM.30Ensure Essential Contacts are defined for your Google Cloud organizationHighNew
  • GCP NIST 800-53 Rev 5
  • GCP CloudGuard Best Practices

May 24 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.68Ensure that Lambda Function's environment variables 'Encryption at Rest' feature uses Customer Master Keys (CMK)LowModification
  • Logic
  • Lambda should have kmsKeyArn
  • Lambda where not environmentVariables isEmpty() should have kmsKeyArn
  • AWS Security Risk Management
  • AWS NIST 800-53 Rev 5
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.AWS.NET.94Ensure security groups associated with EKS cluster do not have inbound rules with a scope of 0.0.0.0/0MediumNew
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CloudGuard Best Practices
D9.AWS.OPE.25Ensure EKS cluster version is up-to-dateInformationalNew
  • AWS CloudGuard Best Practices
D9.AWS.IAM.70Ensure 'AWSSupportServiceRolePolicy' policy does not use 'v20' policy versionCriticalRemoval
  • AWS LGPD regulation
  • AWS CloudGuard S3 Bucket Security
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.AWS.IAM.42S3 buckets should not grant any external privileges via ACLHighRemoval
  • AWS LGPD regulation
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10

May 17 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.03Ensure that S3 Buckets are encrypted with CMKHighModification
  • Logic
  • S3Bucket should have encryption.serverSideEncryptionRules contain [ not serverSideEncryptionByDefault.serverSideEncryptionKeyManagementServiceKeyId isEmpty() ]
  • S3Bucket should have encryption.serverSideEncryptionRules contain [ getResource('KMS', serverSideEncryptionByDefault.serverSideEncryptionKeyManagementServiceKeyId) getValue('isCustomerManaged') and getResource('KMS', serverSideEncryptionByDefault.serverSideEncryptionKeyManagementServiceKeyId) getValue('enabled') ]
  • AWS HIPAA
  • None
  • AWS LGPD regulation
  • AWS CloudGuard S3 Bucket Security
  • AWS NIST 800-53 Rev 5
  • AWS CIS Foundations v. 1.5.0
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS CSA CCM v.3.0.1
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS Dashboard System Ruleset
  • AWS CCPA Framework
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS CIS Foundations v. 1.3.0
  • AWS HITRUST
  • AWS ITSG-33
  • AWS CIS Foundations v. 1.4.0
  • AWS MITRE ATT&CK Framework v10
D9.AZU.NET.24Ensure default network access rule for Storage Accounts is set to denyHighModification
  • Logic
  • StorageAccount should not have networkRuleSet.defaultAction='Allow'
  • StorageAccount should not have publicNetworkAccessAsDisplayedInPortal ='Enabled from all networks'
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • Azure CIS Foundations v. 1.1.0
  • Azure CloudGuard Best Practices
  • Azure Security Benchmark
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure HITRUST v9.5.0
  • Azure CIS Foundations v. 1.3.1
D9.AWS.IAM.52Ensure AWS IAM policies allow only the required privileges for each roleLowModification
  • Logic
  • IamPolicy where arn!='arn:aws:iam::aws:policy/AdministratorAccess' should not have document.Statement contain[ Effect='Allow' ] and document.Statement contain [ Action='*' ]
  • IamPolicy where arn!='arn:aws:iam::aws:policy/AdministratorAccess' should not have document.Statement contain-any [ $ with [ Effect='Allow' and Action='*' ] ]
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AZU.MON.82Ensure that Activity Log Alert exists for Create or Update Public IP Address ruleLowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.MON.83Ensure that Activity Log Alert exists for Delete Public IP Address ruleLowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.MON.84Ensure that Activity Log Alert exists for Delete SQL Server Firewall RuleLowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.NET.68Ensure Private Endpoints are used to access Storage AccountsMediumNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.NET.69Ensure that Private Endpoints are Used for Azure Key VaultMediumNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.NET.70Ensure that Network Security Group Flow logs are captured and sent to Log AnalyticsLowNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AWS.VLN.07Ensure AWS Security Hub is enabled.LowNew
  • AWS CIS Foundations v. 1.5.0
  • AWS CloudGuard Best Practices
D9.AZU.NET.71Ensure an Azure Bastion Host ExistsMediumNew
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AWS.VLN.08Ensure Lambda functions are not using deprecated runtimesHighNew
  • AWS CloudGuard Best Practices
D9.ALI.IAM.01Ensure no root account access key exists.HighModification
  • Name
  • Ensure no root account access key exists
  • Ensure no root account access key exists.
  • Alibaba cloud ruleset

May 10 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.77Ensure KMS CMK have key rotation enabledHighNew
  • AWS PCI-DSS 4.0
  • AWS CloudGuard Best Practices
D9.AWS.IAM.113Amazon EBS snapshots should not be publicly accessibleHighNew
  • AWS PCI-DSS 4.0
  • AWS CloudGuard Best Practices
D9.AWS.VLN.01EC2 Instance - there shouldn't be any High level findings in Inspector ScansHighRemoval
  • AWS LGPD regulation
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS GDPR Readiness
  • AWS PCI-DSS 3.2
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.VLN.07Ensure that enhance scanning is enabled for all repositoriesHighRemoval
  • AWS CloudGuard Best Practices

May 03 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AZU.IAM.45Ensure that 'Number of methods required to reset' is set to '2'LowNew
  • Azure CIS Foundations v. 1.4.0
  • Azure CIS Foundations v. 1.5.0
  • AZU PCI-DSS 4.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
  • Azure CIS Foundations v. 1.2.0
  • Azure CIS Foundations v. 1.3.0
  • Azure CIS Foundations v. 1.3.1
D9.AZU.MON.75Ensure That Microsoft Defender for Resource Manager Is Set To 'On'HighNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.MON.76Ensure That Microsoft Defender for Open-Source Relational Databases Is Set To 'On'HighNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.MON.78Ensure That Microsoft Defender for Azure Cosmos DB Is Set To 'On'HighNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.MON.79Ensure That Microsoft Defender for DNS Is Set To 'On'HighNew
  • Azure CIS Foundations v. 1.5.0
  • Azure NIST 800-53 Rev 5
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.MON.80Ensure That Microsoft Defender for Databases Is Set To 'On'HighNew
  • Azure CIS Foundations v. 1.5.0
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AZU.MON.77Ensure That Microsoft Defender for Containers Is Set To 'On'HighNew
  • Azure CIS Foundations v.2.0
  • Azure CloudGuard Best Practices
D9.AWS.CRY.71Ensure that encryption is enabled for AWS RDS DB Cluster SnapshotHighNew
  • AWS CloudGuard Best Practices
D9.AWS.CRY.72Ensure that encryption is enabled for AWS RDS DB SnapshotHighNew
  • AWS CloudGuard Best Practices
D9.AWS.CRY.70Ensure that encryption is enabled for AWS RDSDBCluster StorageHighNew
  • AWS CloudGuard Best Practices
D9.AWS.CRY.73Ensure that user Volume Encryption is enabled for AWS WorkspaceHighNew
  • AWS CloudGuard Best Practices
D9.AWS.CRY.74Ensure that root Volume Encryption is enabled for AWS WorkspaceHighNew
  • AWS CloudGuard Best Practices
D9.AWS.CRY.76Ensure that encryption is enabled for AWS EBS SnapshotHighNew
  • AWS CloudGuard Best Practices
D9.ALI.CRY.02Ensure server-side encryption is set to 'Encrypt with Service Key'HighModification
  • Name
  • Ensure that OSS bucket server side encryption using KMS is enabled
  • Ensure server-side encryption is set to 'Encrypt with Service Key'
  • Alibaba cloud ruleset
D9.ALI.CRY.03Ensure that 'Unattached disks' are encryptedHighModification
  • Name
  • Ensure that ECS Disks are encrypted
  • Ensure that 'Unattached disks' are encrypted
  • Alibaba cloud ruleset
D9.ALI.CRY.04Ensure that Virtual Machine's Disks are encryptedHighModification
  • Name
  • Ensure that ECS Virtual Machine's Disks are encrypted
  • Ensure that Virtual Machine's Disks are encrypted
  • Alibaba cloud ruleset
D9.ALI.LOG.01Ensure that logging is enabled for OSS bucketsLowModification
  • Logic
  • OssBucket should have logging.loggingEnabled=true and name != logging.targetBucket
  • OssBucket should have logging.loggingEnabled=true and name!=logging.targetBucket
  • Alibaba cloud ruleset
D9.ALI.NET.03Ensure no security groups allow ingress from 0.0.0.0/0 to port 22HighModification
  • Logic
  • SecurityGroup should not have inboundRules with [sourceCidrIp = '0.0.0.0/0' and port<=22 and portTo>=22]
  • SecurityGroup should not have inboundRules with [sourceCidrIp='0.0.0.0/0' and (port=22 and portTo=22)]
  • Alibaba cloud ruleset
D9.ALI.NET.04Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389HighModification
  • Logic
  • SecurityGroup should not have inboundRules with [sourceCidrIp = '0.0.0.0/0' and port<=3389 and portTo>=3389]
  • SecurityGroup should not have inboundRules with [sourceCidrIp = '0.0.0.0/0' and (port=3389 and portTo=3389)]
  • Alibaba cloud ruleset

April 24 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.OCI.LOG.06Ensure a notification is configured for IdP group mapping changes.LowModification
  • Logic
  • List<EventRule> should have items with [isEnabled=true and (actions.actions with [ actionType='ONS'] and actions.actions with [ isEnabled=true ]) and (condition.eventType contain ['com.oraclecloud.identitycontrolplane.createpolicy']) and (condition.eventType contain ['com.oraclecloud.identitycontrolplane.deletepolicy']) and (condition.eventType contain ['com.oraclecloud.identitycontrolplane.updatepolicy']) length() >0]
  • List<EventRule> should have items with [isEnabled=true and (actions.actions with [ actionType='ONS'] and actions.actions with [ isEnabled=true ]) and (condition.eventType contain ['com.oraclecloud.identitycontrolplane.createidpgroupmapping']) and (condition.eventType contain ['com.oraclecloud.identitycontrolplane.deleteidpgroupmapping']) and (condition.eventType contain ['com.oraclecloud.identitycontrolplane.updateidpgroupmapping']) length() >0]
  • OCI Foundations Benchmark v1.2.0

April 19 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.IAM.112Enforce Password PolicyHighNew
  • AWS HIPAA
  • None
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS PCI-DSS 3.2
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.MON.26Ensure a log metric filter and alarm exist for EC2 instance changesMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.MON.27Ensure a log metric filter and alarm exist for EC2 Large instance changesMediumNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.NET.93Ensure EMR clusters nodes should not have public IPHighNew
  • AWS NIST 800-53 Rev 5
  • AWS CloudGuard Best Practices
D9.AWS.IAM.111Credentials report was generated in the last 24 hoursLowNew
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS PCI-DSS 3.2
  • AWS CIS Foundations v. 1.0.0
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.OCI.CRY.05Ensure customer created Customer Managed Key (CMK) is rotated at least annuallyHighNew
  • OCI Foundations Benchmark v1.2.0
D9.AWS.OPE.23Ensure that the Cross-Region Replication feature is enabled for your Amazon ECR container images.LowNew
  • AWS CloudGuard Best Practices
D9.AWS.OPE.24Ensure that Amazon ECR image repositories are using lifecycle policies.LowNew
  • AWS CloudGuard Best Practices
D9.AWS.VLN.07Ensure that enhance scanning is enabled for all repositoriesHighNew
  • AWS CloudGuard Best Practices
D9.ALI.CRY.01Ensure that 'Secure transfer required' is set to 'Enabled'HighModification
  • Name
  • Ensure that 'Secure transfer required' is Enabled
  • Ensure that 'Secure transfer required' is set to 'Enabled'
  • Alibaba cloud ruleset
D9.ALI.IAM.04Ensure users not logged on for 90 days or longer are disabled for console logon.HighModification
  • Name
  • Logic
  • Ensure users not logged on for 90 days or longer are disabled for console logon
  • RamUser should not have (lastLoginDate isEmpty() and lastLoginDate after(-90, 'days') )
  • Ensure users not logged on for 90 days or longer are disabled for console logon.
  • RamUser should not have lastLoginDate isEmpty() or lastLoginDate before(-90, 'days')
  • Alibaba cloud ruleset
D9.ALI.IAM.08Ensure RAM policies that allow full "*:*" administrative privileges are not createdHighModification
  • Name
  • Ensure RAM policies that allow full access administrative privileges are not created
  • Ensure RAM policies that allow full "*:*" administrative privileges are not created
  • Alibaba cloud ruleset
D9.ALI.IAM.09Ensure RAM password policy prevents password reuse.HighModification
  • Name
  • Ensure RAM password policy prevents password reuse
  • Ensure RAM password policy prevents password reuse.
  • Alibaba cloud ruleset
D9.ALI.IAM.10Ensure RAM password policy requires at least one uppercase letter.LowModification
  • Name
  • Ensure RAM password policy requires at least one uppercase letter
  • Ensure RAM password policy requires at least one uppercase letter.
  • Alibaba cloud ruleset
D9.ALI.IAM.11Ensure RAM password policy requires at least one lowercase letter.LowModification
  • Name
  • Ensure RAM password policy requires at least one lowercase letter
  • Ensure RAM password policy requires at least one lowercase letter.
  • Alibaba cloud ruleset
D9.ALI.IAM.12Ensure RAM password policy require at least one symbol.LowModification
  • Name
  • Ensure RAM password policy require at least one symbol
  • Ensure RAM password policy require at least one symbol.
  • Alibaba cloud ruleset
D9.ALI.IAM.13Ensure RAM password policy require at least one number.LowModification
  • Name
  • Ensure RAM password policy require at least one number
  • Ensure RAM password policy require at least one number.
  • Alibaba cloud ruleset
D9.ALI.IAM.14Ensure RAM password policy expires passwords within 90 days or less.LowModification
  • Name
  • Logic
  • Ensure RAM password policy expires passwords within 90 days or less
  • RamPasswordPolicy should have maxPasswordAge<=90
  • Ensure RAM password policy expires passwords within 90 days or less.
  • RamPasswordPolicy should have maxPasswordAge>0 and maxPasswordAge<=90
  • Alibaba cloud ruleset
D9.ALI.IAM.15Ensure RAM password policy temporarily blocks logon after 5 incorrect logon attempts within an hour.HighModification
  • Name
  • Logic
  • Ensure RAM password policy temporarily blocks logon after 5 incorrect logon attempts within an hour
  • RamPasswordPolicy should have maxLoginAttemps<=5
  • Ensure RAM password policy temporarily blocks logon after 5 incorrect logon attempts within an hour.
  • RamPasswordPolicy should have maxLoginAttemps>0 and maxLoginAttemps<=5
  • Alibaba cloud ruleset
D9.ALI.IAM.16Ensure RAM password policy requires minimum length of 14 or greaterLowModification
  • Name
  • Ensure RAM password policy requires minimum length of at least 14
  • Ensure RAM password policy requires minimum length of 14 or greater
  • Alibaba cloud ruleset
D9.ALI.NET.02Ensure legacy networks does not exist.HighModification
  • Name
  • Ensure legacy networks does not exist
  • Ensure legacy networks does not exist.
  • Alibaba cloud ruleset
D9.AWS.PRE.02Enforce Password PolicyHighRemoval
  • AWS HIPAA
  • None
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS PCI-DSS 3.2
  • AWS CIS Foundations v. 1.0.0
  • AWS ISO 27001:2013
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10
D9.AWS.PRE.01Credentials report was generated in the last 24 hoursLowRemoval
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS CIS Foundations v. 1.1.0
  • AWS HITRUST v11.0.0
  • AWS NIST 800-53 Rev 4
  • AWS PCI-DSS 3.2
  • AWS CIS Foundations v. 1.0.0
  • AWS NIST CSF v1.1
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CIS Foundations v. 1.2.0
  • AWS CloudGuard Well Architected Framework
  • AWS CloudGuard Best Practices
  • AWS MAS TRM Framework
  • AWS NIST 800-171
  • AWS HITRUST
  • AWS ITSG-33
  • AWS MITRE ATT&CK Framework v10

March 29 2023

Rule IDRule NameSeverityChange TypeUpdated ContentBeforeAfterAffected Rulesets
D9.AWS.CRY.59Ensure ACM certificate was not issued before the Heartbleed security bug fixCriticalModification
  • Logic
  • AcmCertificate should have (notBefore > 1396915200 and issuedAt = -62135596800) or issuedAt > 1396915200
  • AcmCertificate where status='ISSUED' should have ( notBefore>1396915200 and issuedAt=-62135596800 ) or issuedAt>1396915200
  • AWS NIST 800-53 Rev 5
  • AWS MITRE ATT&CK Framework v11.3
  • AWS PCI-DSS 4.0
  • AWS HITRUST v11.0.0
  • CloudGuard AWS Default Ruleset
  • AWS CloudGuard SOC2 based on AICPA TSC 2017
  • AWS CloudGuard Best Practices
D9.OCI.AS.01Create at least one compartment in your tenancy to store cloud resources.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.AS.02Ensure no VCNs are created in the root compartment.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.AS.03Ensure no instances created in the root compartment.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.AS.04Ensure no volumes are created in the root compartment.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.AS.05Ensure no filesystems are created in the root compartment.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.AS.06Ensure no buckets are created in the root compartment.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.AS.07Ensure no autonomousdatabases are created in the root compartment.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.CRY.01Ensure Object Storage Buckets are encrypted with a Customer Managed Key (CMK).HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.CRY.02Ensure Block Volumes are encrypted with Customer Managed Keys (CMK).HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.CRY.03Ensure boot volumes are encrypted with Customer Managed Key (CMK).HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.CRY.04Ensure File Storage Systems are encrypted with Customer Managed Keys (CMK).HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.01Ensure no Object Storage buckets are publicly visible.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.02Ensure IAM password policy requires minimum length of 14 or greater.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.03Ensure MFA is enabled for all users with a console password.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.04Ensure all OCI IAM user accounts have a valid and current email address.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.05Ensure user API keys rotate within 90 days or less.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.06Ensure user customer secret keys rotate within 90 days or less.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.07Ensure user auth tokens rotate within 90 days or less.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.08Ensure permissions on all resources are given only to the tenancy administrator group.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.09Ensure IAM administrators cannot update tenancy Administrators group.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.IAM.10Ensure API keys are not created for tenancy administrator users.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.01Ensure default tags are used on resources.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.02Ensure VCN flow logging is enabled for all subnets.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.03Ensure write level Object Storage logging is enabled for all buckets.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.04Create at least one notification topic and subscription to receive monitoring alerts.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.05Ensure a notification is configured for Identity Provider changes.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.06Ensure a notification is configured for IdP group mapping changes.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.07Ensure a notification is configured for IAM group changes.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.08Ensure a notification is configured for IAM policy changesLowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.09Ensure a notification is configured for user changes.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.10Ensure a notification is configured for VCN changes.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.11Ensure a notification is configured for changes to route tables.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.12Ensure a notification is configured for security list changes.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.13Ensure a notification is configured for network security group changes.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.LOG.14Ensure a notification is configured for changes to network gateways.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.NET.01Ensure no security lists allow ingress from 0.0.0.0/0 to port 22.CriticalNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.NET.02Ensure no security lists allow ingress from 0.0.0.0/0 to port 3389.CriticalNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.NET.03Ensure the default security list of every VCN restricts all traffic except ICMP.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.NET.04Ensure no network security groups allow ingress from 0.0.0.0/0 to port 22.CriticalNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.NET.05Ensure no network security groups allow ingress from 0.0.0.0/0 to port 3389.CriticalNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.NET.06Ensure Oracle Integration Cloud (OIC) access is restricted to allowed sources.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.NET.07Ensure Oracle Autonomous Shared Databases (ADB) access is restricted to allowed sources or deployed within a Virtual Cloud.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.NET.08Ensure Oracle Analytics Cloud (OAC) access is restricted to allowed sources or deployed within a Virtual Cloud Network.HighNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.OPE.01Ensure Versioning is Enabled for Object Storage Buckets.LowNew
  • OCI Foundations Benchmark v1.2.0
D9.OCI.OPE.02Ensure Cloud Guard is enabled in the root compartment of the tenancy.LowNew
  • OCI Foundations Benchmark v1.2.0

March 15 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.18

Ensure VIRTUAL or HARDWARE MFA is enabled for the 'root' account

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CIS Foundations v. 1.1.0

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.01

Ensure no security groups allow ingress from 0.0.0.0/0 to SSH (TCP:22)

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS HIPAA

  • None

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CIS Foundations v. 1.1.0

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.02

Ensure no security groups allow ingress from 0.0.0.0/0 to RDP (TCP:3389)

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CIS Foundations v. 1.1.0

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.04

Ensure the default security group of every VPC restricts all traffic

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CIS Foundations v. 1.1.0

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.16

RDS should not have Public Interface

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.17

RDS should not have Public Interface open to a public scope

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.08

Ensure no security groups allow ingress from 0.0.0.0/0 to ALL ports and protocols

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.29

Ensure that EC2 AMIs are not publicly accessible

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AZU.NET.16

Redis attached subnet Network Security Group should allow egress traffic only to ports 6379 or 6380

High

Modification

  • Logic

  • RedisCache should have subnet.securityGroup.outboundSecurityRules contain [ destinationPortRanges contain [ destinationPort<=6379 and destinationPortTo>=6379 ] ] and subnet.securityGroup.outboundSecurityRules contain [ destinationPortRanges contain [ destinationPort<=6380 and destinationPortTo>=6380 ] ]

  • RedisCache where sku.name='Premium' should have subnet.securityGroup.outboundSecurityRules contain [ destinationPortRanges contain [ destinationPort<=6379 and destinationPortTo>=6379 ] ] and subnet.securityGroup.outboundSecurityRules contain [ destinationPortRanges contain [ destinationPort<=6380 and destinationPortTo>=6380 ] ]

  • Azure LGPD regulation

  • Azure NIST 800-53 Rev 5

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CloudGuard Network Security Alerts

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

D9.AWS.CRY.67

Ensure that EC2 instance's custom AMI is encrypted at rest

High

Modification

  • Logic

  • Instance where imageDetails.imageLocation regexMatch /^(?!amazon\/).+/ should not have imageDetails.blockDeviceMappings contain [ ebs.encrypted=false ]

  • Instance where imageDetails.imageLocation regexMatch /^(?!amazon|aws-marketplace\/).+/ should not have imageDetails.blockDeviceMappings contain [ ebs.encrypted=false ]

  • AWS Security Risk Management

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

D9.AWS.IAM.1019

IamUser with Admin or wide permissions without MFA enabled

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS Dashboard System Ruleset

  • AWS HITRUST

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.106

Ensure that EC2 instance's custom AMI is not publicly shared

Critical

Modification

  • Logic

  • Severity

  • Instance where imageDetails.imageLocation regexMatch /^(?!amazon\/).+/ should not have imageDetails.isPublic

  • High

  • Instance where imageDetails.imageLocation regexMatch /^(?!amazon|aws-marketplace\/).+/ should not have imageDetails.isPublic

  • Critical

  • AWS Security Risk Management

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

D9.AWS.NET.72

Ensure that S3 Buckets are configured with Block public access (bucket/account settings)

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.60

Ensure ACM certificate is using a minimum of 2048-bit key for RSA certificate

High

Modification

  • Severity

  • Critical

  • High

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

D9.AWS.IAM.57

Ensure SNS Topics aren't publicly accessible

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.27

Instances with Direct Connect virtual interface should not have public interfaces

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.28

RDS Databases with Direct Connect virtual interface should not have public interfaces

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS ISO 27001:2013

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.47

Ensure AWS VPC subnets have automatic public IP assignment disabled

Critical

Modification

  • Severity

  • Medium

  • Critical

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.51

Ensure AWS Redshift clusters are not publicly accessible

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.52

Ensure that the API Endpoint type in API Gateway is set to Private and is not exposed to the public internet

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.56

Ensure that Security Groups are not open to all

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.71

EksCluster should not be publicly accessed

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.77

Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.VLN.05

Ensure that public System Manager Documents include parameters

High

Modification

  • Severity

  • Critical

  • High

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.91

Ensure no security groups allow ingress from ::/0 to remote server administration ports

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS CIS Foundations v. 1.5.0

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

D9.AWS.IAM.102

Ensure that AWS Elastic Container Registry (ECR) repositories are not exposed to everyone.

Critical

Modification

  • Severity

  • High

  • Critical

  • AWS HITRUST v11.0.0

  • CloudGuard AWS Default Ruleset

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

D9.AWS.CRY.69

Ensure that RDS database instance enforces SSL/TLS for all connections

High

New

  • AWS CloudGuard Best Practices

D9.AWS.NET.92

Ensure that RDS database instance doesn't use its default endpoint port

Low

New

  • AWS CloudGuard Best Practices

D9.AWS.VLN.06

Ensure Inspector Instances have continuous scanning active

Low

New

  • AWS CloudGuard Best Practices

March 01 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.NET.14

Ensure that Redis is updated regularly with security and operational updates.

Low

Modification

  • Name

  • Ensure that Redis is updated regularly with security and operational updates. Note this feature is only available to Premium tier Redis Caches.

  • Ensure that Redis is updated regularly with security and operational updates.

  • Azure LGPD regulation

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

February 22 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.LOG.12

Ensure that logging for Azure KeyVault is 'Enabled'

Low

Modification

  • Logic

  • KeyVault should have diagnosticSettings contain [ logs contain [ category='AuditEvent' and enabled=true ] ]

  • KeyVault should have diagnosticSettings contain [ logs contain [ (category='AuditEvent' or categoryGroup='audit') and enabled=true ] ]

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure NIST 800-53 Rev 5

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

February 15 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.VLN.02

Instances without Inspector runs in the last 30 days

Low

Removal

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

February 08 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.NET.18

RDS should not have been open to a large scope

High

Modification

  • Name

  • RDS should not have be open to a large scope

  • RDS should not have been open to a large scope

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.70

EksCluster should not have more than one security group

Medium

Modification

  • Name

  • EksCluster should not have more than one security groups

  • EksCluster should not have more than one security group

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.71

EksCluster should not be publicly accessed

High

Modification

  • Name

  • EksCluster should not be publicly access

  • EksCluster should not be publicly accessed

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.K8S.IAM.86

Ensure that a unique Certificate Authority is used for etcd

High

New

  • CIS Kubernetes Benchmark v1.24

February 01 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.04

Ensure S3 Bucket Policy is set to deny HTTP requests

High

Modification

  • Logic

  • S3Bucket where policy should have policy.Statement contain-all [Effect='Deny' and Condition.Bool.aws:SecureTransport='false' and (Action contain ['s3:GetObject'] or Action contain ['s3:PutObject'] or Action contain ['s3:*'] or Action contain ['*'] ) ]

  • S3Bucket where policy should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false' and ((Action contain ['s3:GetObject'] and Action contain ['s3:PutObject']) or Action contain ['s3:*'] or Action contain ['*'] ) ]

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AZU.CRY.27

Ensure storage for critical data is encrypted with Customer Managed Key

Low

Modification

  • Name

  • Ensure storage for critical data are encrypted with Customer Managed Key

  • Ensure storage for critical data is encrypted with Customer Managed Key

  • Azure CIS Foundations v. 1.4.0

  • Azure LGPD regulation

  • Azure CIS Foundations v. 1.5.0

  • Azure NIST 800-53 Rev 5

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure Dashboard System Ruleset

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.IAM.41

Ensure guest users are reviewed on a monthly basis

Low

New

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.IAM.42

Ensure That 'Guest users access restrictions' is set to 'Guest user access is restricted to properties and memberships of their own directory objects'

Low

New

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.IAM.43

Ensure that 'Users can create security groups in Azure portals, API or PowerShell' is set to 'No'

Low

New

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.NET.02

Ensure the entire Azure infrastructure doesn't have access to Azure SQL Server

High

Modification

  • Name

  • Ensure entire Azure infrastructure doesn't have access to Azure SQL Server

  • Ensure the entire Azure infrastructure doesn't have access to Azure SQL Server

  • Azure LGPD regulation

  • Azure NIST 800-53 Rev 5

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CloudGuard Network Security Alerts

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

D9.AZU.CRY.25

Ensure Function App is using the latest version of TLS encryption

High

Modification

  • Name

  • Ensure function app is using the latest version of TLS encryption

  • Ensure Function App is using the latest version of TLS encryption

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AWS.NET.91

Ensure no security groups allow ingress from ::/0 to remote server administration ports

High

New

  • AWS CIS Foundations v. 1.5.0

  • AWS CloudGuard Best Practices

D9.K8S.IAM.83

Ensure that a minimal audit policy is created (API Server)

Low

New

  • CIS Kubernetes Benchmark v1.24

D9.K8S.IAM.84

Ensure that encryption providers are appropriately configured (API Server)

High

New

  • CIS Kubernetes Benchmark v1.24

D9.K8S.IAM.85

Ensure that the API Server only makes use of Strong Cryptographic Ciphers (API Server)

High

New

  • CIS Kubernetes Benchmark v1.24

D9.AZU.NET.30

Ensure that you are using authorized IP address ranges to secure access to the API server

High

Modification

  • Name

  • Ensure that you are using authorized IP address ranges in order to secure access to the API server

  • Ensure that you are using authorized IP address ranges to secure access to the API server

  • Azure NIST 800-53 Rev 5

  • Azure CloudGuard Best Practices

D9.GCP.NET.04

Ensure VM Instance should not have public IP

High

Removal

  • GCP Security Risk Management

  • GCP LGPD regulation

  • GCP NIST 800-53 Rev 5

  • GCP PCI-DSS 4.0

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard Network Security

  • GCP HIPAA

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

January 25 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.20

Ensure AWS Kinesis Streams Keys are rotated

Low

Modification

  • Logic

  • Kinesis should have getResource('KMS', kmsKeyId) contain [ rotationStatus = true ]

  • Kinesis where encrypted should have encryptionKey.rotationStatus=true

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.21

AWS Kinesis streams are encrypted with customer managed CMK

Low

Modification

  • Logic

  • Kinesis should have getResource('KMS', kmsKeyId) contain [ isCustomerManaged = true ]

  • Kinesis should have encryptionKey.isCustomerManaged=true

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.23

Ensure that your Amazon EFS file systems are encrypted using KMS CMK customer-managed keys

Low

Modification

  • Logic

  • EFS should have getResource('KMS', encryptionKeyArn) contain [ isCustomerManaged = true ]

  • EFS should have encryptionKey.isCustomerManaged=true

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.GCP.NET.10

Ensure Master authorized networks are set to Enabled on Kubernetes Engine Clusters

Medium

Modification

  • Name

  • Ensure Master authorized networks is set to Enabled on Kubernetes Engine Clusters

  • Ensure Master authorized networks are set to Enabled on Kubernetes Engine Clusters

  • GCP CloudGuard CheckUp

  • GCP NIST 800-53 Rev 5

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Best Practices

D9.GCP.NET.11

Ensure 'Enable connecting to serial ports' is not enabled for VM Instance

High

Modification

  • Name

  • Ensure 'Ensure 'Enable connecting to serial ports' is not enabled for VM Instance

  • Ensure 'Enable connecting to serial ports' is not enabled for VM Instance

  • GCP CloudGuard CheckUp

  • GCP CIS Foundations v. 1.3.0

  • GCP Security Risk Management

  • GCP LGPD regulation

  • GCP NIST 800-53 Rev 5

  • GCP PCI-DSS 4.0

  • GCP CIS Foundations v. 2.0

  • GCP CIS Foundations v. 1.0.0

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard Network Security

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.IAM.20

Suspended user account unused for more than 6 months

High

Modification

  • Name

  • Suspended user account unused more then 6 months

  • Suspended user account unused for more than 6 months

  • GCP LGPD regulation

  • GCP NIST 800-53 Rev 5

  • GCP PCI-DSS 4.0

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.AWS.CRY.33

Ensures that AWS RDS databases are encrypted using Customer Managed Keys

Low

Modification

  • Logic

  • RDS where isStorageEncrypted=true should have getResource('KMS', kmsKeyId) contain [ isCustomerManaged = true ]

  • RDS where isStorageEncrypted=true should have encryptionKey.isCustomerManaged=true

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.35

Ensure SageMaker Notebook Instance Data Encryption is enabled

High

Modification

  • Logic

  • SageMakerNotebook should have kmsKeyId

  • SageMakerNotebook should have kmsKey

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS CloudGuard CheckUp

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.36

Ensure that SageMaker Notebook Instance Data Encryption with KMS CMKs is enabled

Low

Modification

  • Logic

  • SageMakerNotebook should have getResource('KMS', kmsKeyId) contain [ isCustomerManaged = true ]

  • SageMakerNotebook where kmsKey should have kmsKey.isCustomerManaged=true

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS PCI-DSS 4.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.GCP.AS.04

Ensure Automatic node upgrades are enabled on Kubernetes Engine Clusters nodes

High

Modification

  • Name

  • Ensure Automatic node upgrades is enabled on Kubernetes Engine Clusters nodes

  • Ensure Automatic node upgrades are enabled on Kubernetes Engine Clusters nodes

  • GCP NIST 800-53 Rev 5

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Best Practices

D9.GCP.DR.02

Ensure that Cloud SQL - MYSQL instances have Point-in-time recovery enabled

Low

Modification

  • Name

  • Ensure that Cloud SQL - MYSQL instance have Point-in-time recovery enabled

  • Ensure that Cloud SQL - MYSQL instances have Point-in-time recovery enabled

  • GCP NIST 800-53 Rev 5

  • GCP CloudGuard Best Practices

D9.AZU.NET.VirtualMachine.1270

Virtual machine administrative OMI/OMS service port (1270) is publicly accessible

High

Removal

  • Azure LGPD regulation

  • Azure Security Risk Management

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

D9.AZU.NET.VirtualMachine.5985

Virtual machine administrative OMI/OMS service port (5985) is publicly accessible

High

Removal

  • Azure LGPD regulation

  • Azure Security Risk Management

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

D9.AZU.NET.VirtualMachine.5986

Virtual machine administrative OMI/OMS service port (5986) is publicly accessible

High

Removal

  • Azure LGPD regulation

  • Azure Security Risk Management

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

January 18 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.IAM.38

Ensure Security Defaults is enabled on Azure Active Directory

High

New

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.IAM.39

Ensure That 'Users Can Register Applications' Is Set to 'No'

High

New

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.IAM.40

Ensure that 'Guest invite restrictions' is set to 'Only users assigned to specific admin roles can invite guest users'

High

New

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AWS.NET.37

Ensure no ECS Services allow ingress from 0.0.0.0/0 to ALL ports and protocols

High

Modification

  • Name

  • Ensure no ECS Services allow ingress from 0.0.0.0/0 to ALL ports and protocols

  • Ensure no ECS Services allow ingress from 0.0.0.0/0 to ALL ports and protocols

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.K8S.IAM.30

Minimize the admission of containers with the NET_RAW capability (PSP)

High

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> where items length() > 0 should have items contain [not spec.requiredDropCapabilities]

  • List<KubernetesPodSecurityPolicy> where items length() > 0 should have items contain [spec.requiredDropCapabilities contain ['NET_RAW' or 'ALL']]

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0

  • CIS Kubernetes Benchmark v1.24

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.AWS.NET.44

Ensure that AWS Elastic Load Balancers (ELB) have outbound rules in their security groups

Low

Modification

  • Name

  • Ensure that AWS Elastic Load Balancers (ELB) have no outbound rules in their security groups

  • Ensure that AWS Elastic Load Balancers (ELB) have outbound rules in their security groups

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.AS.05

Ensure that S3 buckets are not publicly accessible

High

Removal

  • None

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Best Practices

  • AWS MITRE ATT&CK Framework v10

D9.AWS.AS.1001

Ensure that S3 buckets are not publicly accessible without a condition

High

Removal

  • None

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Best Practices

  • AWS MITRE ATT&CK Framework v10

January 11 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.04

Ensure S3 Bucket Policy is set to deny HTTP requests

High

Modification

  • Logic

  • S3Bucket where policy should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false' and (Action contain ['s3:GetObject'] or Action contain ['s3:PutObject'] or Action contain ['s3:*'] or Action contain ['*'] ) ]

  • S3Bucket where policy should have policy.Statement contain-all [Effect='Deny' and Condition.Bool.aws:SecureTransport='false' and (Action contain ['s3:GetObject'] or Action contain ['s3:PutObject'] or Action contain ['s3:*'] or Action contain ['*'] ) ]

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11.3

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.20

Ensure AWS Kinesis Streams Keys are rotated

Low

Modification

  • Logic

  • Kinesis where encrypted should have getResources('KMS') contain [ rotationStatus=true and region = ~getValue('region') and ( arn=~getValue('kmsKeyId') or aliases contain [ name = ~getValue('kmsKeyId') or arn = ~getValue('kmsKeyId') ] or ~getValue('kmsKeyId') in (arn split('/')) )]

  • Kinesis should have getResource('KMS', kmsKeyId) contain [ rotationStatus = true ]

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.21

AWS Kinesis streams are encrypted with customer managed CMK

Low

Modification

  • Logic

  • Kinesis should have getResources('KMS') contain [ isCustomerManaged=true and region = ~getValue('region') and ( arn=~getValue('kmsKeyId') or aliases contain [ name = ~getValue('kmsKeyId') or arn = ~getValue('kmsKeyId') ] or ~getValue('kmsKeyId') in (arn split('/')) )]

  • Kinesis should have getResource('KMS', kmsKeyId) contain [ isCustomerManaged = true ]

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.23

Ensure that your Amazon EFS file systems are encrypted using KMS CMK customer-managed keys

Low

Modification

  • Logic

  • EFS should have getResources('KMS') contain [ isCustomerManaged=true and region = ~getValue('region') and ( arn=~getValue('encryptionKeyArn') or aliases contain [ name = ~getValue('encryptionKeyArn') or arn = ~getValue('encryptionKeyArn') ] or ~getValue('encryptionKeyArn') in (arn split('/')) )]

  • EFS should have getResource('KMS', encryptionKeyArn) contain [ isCustomerManaged = true ]

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.K8S.IAM.21

Ensure that the seccomp profile is set to docker/default in your pod definitions

High

Modification

  • Logic

  • KubernetesPod should have annotations contain [ key='seccomp.security.alpha.kubernetes.io/pod' ]

  • KubernetesPod should have (annotations contain [ key='seccomp.security.alpha.kubernetes.io/pod' ]) or (spec.containers contain [ securityContext.seccompProfile.type='RuntimeDefault' ] and spec.initContainers isEmpty() or spec.initContainers contain [ securityContext.seccompProfile.type='RuntimeDefault' ])

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • OpenShift Container Platform v3

  • CIS Kubernetes Benchmark v1.24

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.04

Ensure that the --make-iptables-util-chains argument is set to true (Kubelet)

Medium

Modification

  • Logic

  • KubernetesNode should have (kubeletData.kubeletconfig.makeIPTablesUtilChains= 'true') or (kubeletData.kubeletconfig.makeIPTablesUtilChains isEmpty())

  • KubernetesNode should have kubeletData.kubeletconfig.makeIPTablesUtilChains= 'true'

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • OpenShift Container Platform v3

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Kubernetes Benchmark v1.24

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.30

Minimize the admission of containers with the NET_RAW capability (PSP)

High

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.requiredDropCapabilities]

  • List<KubernetesPodSecurityPolicy> where items length() > 0 should have items contain [not spec.requiredDropCapabilities]

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0

  • CIS Kubernetes Benchmark v1.24

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.AWS.CRY.33

Ensures that AWS RDS databases are encrypted using Customer Managed Keys

Low

Modification

  • Logic

  • RDS where isStorageEncrypted=true should have getResources('KMS') contain [ isCustomerManaged=true and region = ~getValue('region') and ( arn=~getValue('kmsKeyId') or aliases contain [ name = ~getValue('kmsKeyId') or arn = ~getValue('kmsKeyId') ] or ~getValue('kmsKeyId') in (arn split('/')) )]

  • RDS where isStorageEncrypted=true should have getResource('KMS', kmsKeyId) contain [ isCustomerManaged = true ]

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.36

Ensure that SageMaker Notebook Instance Data Encryption with KMS CMKs is enabled

Low

Modification

  • Logic

  • SageMakerNotebook should have getResources('KMS') contain [ isCustomerManaged=true and region = ~getValue('region') and ( arn=~getValue('kmsKeyId') or aliases contain [ name = ~getValue('kmsKeyId') or arn = ~getValue('kmsKeyId') ] or ~getValue('kmsKeyId') in (arn split('/')) )]

  • SageMakerNotebook should have getResource('KMS', kmsKeyId) contain [ isCustomerManaged = true ]

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.K8S.IAM.81

Ensure that the --request-timeout argument is set as appropriate (API Server)

Low

New

  • CIS Kubernetes Benchmark v1.24

D9.K8S.IAM.82

Ensure that the --encryption-provider-config argument is set as appropriate (API Server)

High

New

  • CIS Kubernetes Benchmark v1.24

D9.K8S.MON.02

Ensure that the --service-account-lookup argument is set to true (API Server)

High

Modification

  • Logic

  • KubernetesPod where labels contain [value='kube-apiserver'] and namespace = 'kube-system' should have spec.containers with [(parsedArgs contain-none [key like 'service-account-lookup']) or (parsedArgs contain [key like 'service-account-lookup' and value = 'true'])]

  • KubernetesPod where labels contain [value='kube-apiserver'] and namespace = 'kube-system' should not have spec.containers with [parsedArgs contain [key like 'service-account-lookup' and value = 'true']]

  • CIS Kubernetes Benchmark v1.24

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.CRY.14

Ensure that the --auto-tls argument is not set to true (etcd)

Low

Modification

  • Logic

  • KubernetesPod where labels contain [value='etcd'] and namespace = 'kube-system' should have spec.containers with [(parsedArgs contain-none [key like 'auto-tls']) or (parsedArgs contain [key like 'auto-tls' and value = 'false'])]

  • KubernetesPod where labels contain [value='etcd'] and namespace = 'kube-system' should have spec.containers with [parsedArgs contain [key like 'auto-tls' and value = 'false']]

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.AZU.AKS.03

Ensure that the pod security policy is enabled in your AKS cluster

Low

Removal

  • Azure CloudGuard Best Practices

January 04 2023

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.LOG.12

Ensure that logging for Azure KeyVault is 'Enabled'

Low

Modification

  • Logic

  • KeyVault should have diagnosticSettings contain [ logs contain [ categoryGroup='audit' and enabled=true ] ]

  • KeyVault should have diagnosticSettings contain [ logs contain [ category='AuditEvent' and enabled=true ] ]

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure NIST 800-53 Rev 5

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.LOG.08

Ensure audit profile captures all the activities

Low

Modification

  • Logic

  • List<LogProfile> should have items with [ properties.categories contain [$='Write'] and properties.categories contain[$='Delete'] and properties.categories contain[$='Action'] and properties.categories length() = 3] length() > 0

  • LogProfile should have properties.categories contain [$='Write'] and properties.categories contain[$='Delete'] and properties.categories contain[$='Action'] and properties.categories length() = 3

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • No labels