Cloud Guard Compliance Updates - August 2020 - October 2021

 

October 27 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.17

Ensure hardware mfa is enabled for the 'root' account

Removal

 

 

 

AWS CloudGuard Best Practices

AWS CloudGuard SOC2 based on AICPA TSC 2017

AWS ISO 27001:2013

AWS GDPR Readiness

D9.AWS.IAM.18

Ensure virtual or hardware mfa is enabled for the 'root' account

Modification

  • Name

  • Logic

  • Ensure virtual mfa is enabled for the 'root' account

  • IamUser where name like '%root_account%' should have mfaType in('Virtual')

  • Ensure virtual or Hardware mfa is enabled for the 'root' account

  • IamUser where name like '%root_account%' should have mfaType in('Virtual','Hardware')

  • AWS CloudGuard Best Practices

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS ISO 27001:2013

  • AWS GDPR Readiness

D9.AWS.CRY.02

ELB is setup with HTTPS for secure communication

Modification

  • Name

  • Logic

  • ELB is setup with SSL for secure communication

  • ELB should have elbListeners contain [(sourceProtocol='SSL' and instanceProtocol='SSL')]

  • ELB is setup with HTTPS for secure communication

  • ELB should have elbListeners contain [(sourceProtocol='HTTPS' and instanceProtocol='HTTPS')]

  • AWS HIPAA

  • AWS Dome9 FISC

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.AS.01

Instances outside of Europe region

Modification

  • Name

  • Logic

  • Instances outside of Europe

  • Instance should have region in('eu_central_1', 'eu_west_1', 'eu_west_2','eu_west_3')

  • Instances outside of Europe region

  • Instance should have region like '%eu_%'

  • AWS GDPR Readiness

D9.AWS.CRY.37

Ensure that an API Key is required on a Method Request

Modification

  • Logic

  • ApiGateway should have resources contain-all [ (methods contain-all [ apiKeyRequired=true ]) or (methods isEmpty()) ]

  • ApiGateway should have resources contain-all [ (methods contain-all [ apiKeyRequired=true ]) or (methods isEmpty()) ] or authorizers isEmpty() = false

  • AWS CloudGuard Serverless Architectures Security

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

D9.AZU.CRY.21

Ensure that 'HTTP Version' is the latest, if used to run the web app

Modification

  • Severity

  • High

  • Low

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.IAM.06

Ensure that 'Number of methods required to reset' is set to '2'

Removal

 

 

 

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.IAM.07

Ensure that there are no guest users

Removal

 

 

 

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

D9.K8S.CRY.04

Ensure that the --kubelet-https argument is set to true (API Server)

Removal

 

 

 

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.AZU.CRY.23

Function App should only be accessible over HTTPS

Modification

  • Severity

  • High

  • Medium

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure HITRUST v9.5.0

D9.AZU.IAM.20

Overly Permissive Directory Access (Global Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.21

Overly Permissive Directory Access (Application Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.22

Overly Permissive Directory Access (Privileged Role Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.23

Overly Permissive Directory Access (Cloud Application Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.24

Overly Permissive Directory Access (User Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.25

Overly Permissive Directory Access (Helpdesk Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.GCP.DR.01

Ensure that auto backup is enabled for your Cloud SQL instance

Modification

  • Severity

  • High

  • Medium

  • GCP CloudGuard Best Practices

October 20 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.02

Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

Modification

  • Severity

  • High

  • Medium

  • AWS HIPAA

  • AWS Dome9 FISC

  • Dome9 AWS Dashboards

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

D9.GCP.AS.09

Ensure GCP VM Instances have Labels

Modification

  • Severity

  • Informational

  • Low

  • GCP CloudGuard CheckUp

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP CloudGuard Best Practices

D9.AWS.NET.1001

Default Security Groups - with network policies

Modification

  • Severity

  • High

  • Low

  • Dome9 AWS Dashboards

D9.K8S.IA.22

Insecure Code of Low Severity

New

 

 

 

  • Container Image Assurance

  • Container Image Assurance 1.0

D9.K8S.IA.23

Insecure Code of Medium Severity

New

 

 

 

  • Container Image Assurance

  • Container Image Assurance 1.0

D9.K8S.IA.24

Insecure Content of Low Severity

New

 

 

 

  • Container Image Assurance

  • Container Image Assurance 1.0

D9.K8S.IA.25

Insecure Content of Medium Severity

New

 

 

 

  • Container Image Assurance

  • Container Image Assurance 1.0

D9.AZU.NET.VirtualMachine.1270

Virtual machine administrative OMI/OMS service port (1270) is publicly accessible

New

 

 

 

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

D9.AZU.NET.VirtualMachine.5985

Virtual machine administrative OMI/OMS service port (5985) is publicly accessible

New

 

 

 

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

D9.AZU.NET.VirtualMachine.5986

Virtual machine administrative OMI/OMS service port (5986) is publicly accessible

New

 

 

 

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

D9.AZU.CRY.24

Web Application should only be accessible over HTTPS

Modification

  • Severity

  • High

  • Medium

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure HITRUST v9.5.0

D9.AZU.CRY.25

Ensure function app is using the latest version of TLS encryption

Modification

  • Severity

  • High

  • Medium

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure HITRUST v9.5.0

D9.SCA.SCA.01

Vulnerable Source Code

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.02

Malicious URL of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.03

Malicious URL of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.04

Malicious IP of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.05

Malicious IP of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.06

Malicious file of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.07

Malicious file of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.08

Insecure Code of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.09

Insecure Code of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.10

Insecure Content of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.11

Insecure Content of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.12

Package of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.13

Package of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.14

Package of Medium Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.15

Package of Low Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.16

Package of Unknown Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.17

Insecure Code of Low Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.18

Insecure Code of Medium Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.19

Insecure Content of Low Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.20

Insecure Content of Medium Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.AZU.MON.15

Ensure ASC Default policy setting 'Monitor Vulnerability Assessment' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.18

Ensure ASC Default policy setting 'Monitor Adaptive Application Whitelisting' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.22

Ensure that outbound traffic is restricted to only that which is necessary, and all other traffic denied

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.58

Overly permissive NSG Inbound rule to all traffic on ANY protocol

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.34

Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.28

Ensure that Activity Log Alert exists for Create or Update Network Security Group

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.29

Ensure that Activity Log Alert exists for Delete Network Security Group

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.30

Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.31

Ensure that activity log alert exists for the Delete Network Security Group Rule

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.47

Ensure that Azure Monitor Logs is configured to export Activity Logs

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.DR.03

Ensure that Azure Virtual Machine is assigned to an availability set

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.48

Ensure that SQL Database Auditing Retention is greater than 90 days

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.21

Ensure that 'Auditing' in SQL Servers is set to 'On'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.53

Ensure ASC Default policy setting 'SQL Auditing Monitoring Effect' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.46

Ensure that Azure Monitor Logs collects all types of activities

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.LOG.08

Ensure audit profile captures all the activities

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.LOG.02

Ensure the log profile captures activity logs for all regions including global

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.62

Ensure Cosmos DB account public network access is disabled

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.63

Ensure Cosmos DB account access is not allowed from all networks

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.59

Ensure Flow-Logs are Enabled on NSG

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.17

Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.20

Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.23

Function App should only be accessible over HTTPS

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.DR.04

Ensure that Geo Redundant Backups is enabled on PostgreSQL

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.07

Ensure that at least one Network Security Group is attached to all VMs and subnets that are public

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.22

Key vault should have purge protection enabled

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.25

Ensure function app is using the latest version of TLS encryption

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.19

Ensure Web App is using the latest version of TLS encryption

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.17

Ensure ASC Default policy setting 'Monitor JIT Network Access' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.26

Ensure that RDP access is restricted from the internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.4.VirtualMachine.3389.TCP

VirtualMachine with administrative service: Remote Desktop (TCP:3389) is too exposed to the public internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.5.VirtualMachine.3389.TCP

VirtualMachine with administrative service: Remote Desktop (TCP:3389) is exposed to a wide network scope

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.27

Ensure that SSH access is restricted from the internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.5.VirtualMachine.22.TCP

VirtualMachine with administrative service: SSH (TCP:22) is exposed to a wide network scope

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.4.VirtualMachine.22.TCP

VirtualMachine with administrative service: SSH (TCP:22) is too exposed to the public internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.4.VirtualMachine.9090.TCP

VirtualMachine with administrative service: CiscoSecure,websm (TCP:9090) is too exposed to the public internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.5.VirtualMachine.9090.TCP

VirtualMachine with administrative service: CiscoSecure,websm (TCP:9090) is exposed to a wide network scope

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.10

Ensure ASC Default policy setting 'Monitor Endpoint Protection' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.28

Ensure that Network Watcher is 'Enabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.05

Ensure that the Redis Cache accepts only SSL connections

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.28

Ensure remote debugging has been disabled for your production Azure Functions

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.34

Ensure remote debugging has been disabled for your production Web App

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.LOG.12

Ensure AuditEvent logging for Azure Key Vault is enabled

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.AKS.08

Ensure that Role Based Access Control (RBAC) is enabled in your AKS Cluster

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.06

Ensure that 'Secure transfer required' (HTTPS) is enabled for Storage Accounts

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.14

Ensure SQL server's TDE protector is encrypted with Customer-managed key

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.24

Ensure default network access rule for Storage Accounts is set to deny

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.61

Ensure that Virtual Networks Subnets have Security Groups

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.19

Ensure that Azure Virtual Network subnet is configured with a Network Security Group

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.08

Ensure ASC Default policy setting 'Monitor System Updates' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.11

Ensure Transparent Data Encryption (TDE) is enabled for SQL Databases

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.26

Ensure that 'Unattached disks' are encrypted with CMK

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.27

Ensure storage for critical data are encrypted with Customer Managed Key

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.11

Ensure ASC Default policy setting 'Monitor Disk Encryption' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.18

Ensure that 'OS and Data' disks are encrypted with CMK

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.56

Ensure ASC Default policy setting 'Storage Encryption Monitoring Effect' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.09

Ensure ASC Default policy setting 'Monitor OS Vulnerabilities' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.24

Web Application should only be accessible over HTTPS

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.02

Ensure entire Azure infrastructure doesn't have access to Azure SQL Server

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.35

Ensure Application Gateway is using the latest version of TLS encryption

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.36

Ensure Application Gateway is using Https protocol

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.IAM.15

Enable Incoming Client Certificates

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.03

Ensure that 'Threat Detection' is enabled for Azure SQL Database

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.54

Ensure ASC Default policy setting 'SQL Encryption Monitoring Effect' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.55

Ensure ASC Default policy setting 'System Configurations Monitoring Effect' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.LOG.01

Ensure that Activity Log Retention is set 365 days or greater

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.18

Ensure Azure Application Gateway Web application firewall (WAF) is enabled

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.01

Ensure that no SQL Server allows ingress from 0.0.0.0/0 (ANY IP)

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.03

Restrict Azure SQL Server accessibility to a minimal address range

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.01

Ensure that Key Vault is in use

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.12

Ensure expiration date is set for all keys

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.13

Ensure that the expiry date is set on all secrets

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.15

Ensure the key vault is recoverable - enable 'Soft Delete' setting for a Key Vault

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.IAM.03

Ensure that Azure SQL Server Admin is configured with AD Authentication

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.IAM.04

Ensure that Azure Active Directory Admin is configured for SQL Server

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.60

Ensure Flow-Logs Retention Policy is greater than 90 days

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.51

Ensure SQL Server Threat Detection is Enabled and Retention Logs are greater than 90 days

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.22

Ensure that 'Auditing' Retention on SQL Server is 'greater than 90 days'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.50

Ensure that SQL Server Auditing Retention is greater than 90 days

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.32

Ensure that Network Security Group Flow Log retention period is 'greater than 90 days'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.VLN.01

Ensure that Advanced Threat Protection (ATP) on a SQL server is set to 'Enabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.VLN.02

Ensure that ADS - 'Advanced Threat Protection types' (ATP) is set to 'All'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.29

Ensure Cosmos DB account is encrypted with customer-managed keys

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.AS.02

Ensure that Cosmos DB Account has an associated tag

New

 

 

 

  • Azure HITRUST v9.5.0

October 06 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.CRY.01

Ensure that Key Vault is in use

Modification

  • Name

  • Ensure Key Vault is in use

  • Ensure that Key Vault is in use

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure NIST CSF v1.1

  • Azure HIPAA

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

D9.K8S.IAM.21

Ensure that the seccomp profile is set to docker/default in your pod definitions

Modification

  • Name

  • Logic

  • Ensure that the seccomp profile is set to runtime/default in your pod definitions

  • KubernetesPod should have annotations contain [ key regexMatch /seccomp.security.alpha.kubernetes.io\/pod.*/ ]

  • Ensure that the seccomp profile is set to docker/default in your pod definitions

  • KubernetesPod should have annotations contain [ key regexMatch /seccomp.security.alpha.kubernetes.io\\/pod.*/ ]

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.01

Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.02

Ensure that the --rotate-certificates argument is not set to false (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.03

Ensure that the RotateKubeletServerCertificate argument is set to true (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.04

Ensure that the --kubelet-https argument is set to true (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.05

Ensure that the --token-auth-file parameter is not set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.06

Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.07

Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.08

Ensure that the --client-ca-file argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.09

Ensure that the --etcd-cafile argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.10

Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.11

Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.12

Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.13

Ensure that the --client-cert-auth argument is set to true (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.14

Ensure that the --auto-tls argument is not set to true (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.16

Prefer using secrets as files over secrets as environment variables

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.01

Ensure that the admission control plugin AlwaysAdmit is not set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.02

Ensure that the --anonymous-auth argument is set to false (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.03

Ensure that the --authorization-mode argument is not set to AlwaysAllow (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.05

Ensure that the --profiling argument is set to false (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.06

Ensure that the --kubelet-certificate-authority argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.07

Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.08

Ensure that the admission control plugin PodSecurityPolicy is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.09

Ensure that the --authorization-mode argument includes RBAC (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.10

Ensure that the --profiling argument is set to false (Scheduler)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.11

Ensure that the --terminated-pod-gc-threshold argument is set as appropriate (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.12

Ensure that the --profiling argument is set to false (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.13

Ensure that the --use-service-account-credentials argument is set to true (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.14

Ensure that the --root-ca-file argument is set as appropriate (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.15

Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.16

Ensure that the --peer-client-cert-auth argument is set to true (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.17

Ensure that the --peer-auto-tls argument is not set to true (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.20

Minimize the admission of containers wishing to share the host IPC namespace (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.21

Ensure that the seccomp profile is set to docker/default in your pod definitions

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.22

Minimize the admission of containers wishing to share the host network namespace (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.24

Minimize the admission of containers wishing to share the host process ID namespace (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.25

Minimize the admission of containers with allowPrivilegeEscalation (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.26

Minimize the admission of privileged containers (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.29

Ensure that the --anonymous-auth argument is set to false (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.30

Minimize the admission of containers with the NET_RAW capability (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.31

The default namespace should not be used

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.32

Ensure that the cluster-admin role is only used where required (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.33

Minimize access to secrets (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.34

Minimize wildcard use in Roles and ClusterRoles (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.35

Minimize access to create pods (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.36

Ensure that default service accounts are not actively used. (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.37

Ensure that Service Account Tokens are only mounted where necessary (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.46

Ensure that the --authorization-mode argument includes Node (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.47

Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.48

Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.LOG.01

Ensure that the --audit-log-path argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.LOG.02

Ensure that the --audit-log-maxage argument is set to 30 or as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.LOG.03

Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.LOG.04

Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.MON.01

Ensure that the --event-qps argument is set to 0 (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.MON.02

Ensure that the --service-account-lookup argument is set to true (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.MON.03

Ensure that the admission control plugin ServiceAccount is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.01

Ensure that the --client-ca-file argument is set as appropriate (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.02

Ensure that the --read-only-port argument is set to 0 (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.03

Ensure that the --streaming-connection-idle-timeout argument is not set to 0 (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.04

Ensure that the --make-iptables-util-chains argument is set to true (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.06

Ensure that the --insecure-bind-address argument is not set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.07

Ensure that the --insecure-port argument is set to 0 (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.08

Ensure that the --secure-port argument is not set to 0 (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.10

Ensure that the admission control plugin AlwaysPullImages is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.11

Ensure that the admission control plugin NamespaceLifecycle is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.12

Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.14

Ensure that the admission control plugin NodeRestriction is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.15

Ensure that the admission control plugin EventRateLimit is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.16

Ensure that the --request-timeout argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.20

Ensure that the --bind-address argument is set to 127.0.0.1 (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.21

Ensure that the --bind-address argument is set to 127.0.0.1 (Scheduler)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.01

Ensure that the --protect-kernel-defaults argument is set to true (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.02

Ensure that the --hostname-override argument is not set (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.03

Ensure that the --service-account-key-file argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.06

Apply Security Context to Your Pods and Containers

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

October 04 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

New

 

 

 

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.03

Ensure VPC flow logging is enabled in all VPCs

Removal

 

 

 

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.53

Ensure AWS IAM policies do not grant 'assume role' permission across all services

Modification

  • Logic

  • IamPolicy where arn unlike 'arn:aws:iam::aws%' and document.Statement contain [ Action='sts:AssumeRole' ] should not have document.Statement contain-any [Resource regexMatch /\*/ or Resource contain-any [$ regexMatch /\*/]]

  • IamPolicy should not have document.Statement contain-any [ Action='sts:AssumeRole' and Effect = 'Allow' and (Resource regexMatch /\*/ or Resource contain-any [$ regexMatch /\*/]) and Condition.StringEquals isEmpty() and Condition.StringLike isEmpty()]

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.61

Ensure that Trusted Policy Roles which can be assumed by external entities include a Condition String

Modification

  • Logic

  • IamRole where assumeRolePolicy.Statement contain [ Action='sts:AssumeRole' and Effect = 'Allow' and Principal.AWS regexMatch /(root)|(user)/] should not have assumeRolePolicy.Statement contain [Condition.StringEquals isEmpty() and Condition.StringLike isEmpty()]

  • IamRole should not have assumeRolePolicy.Statement contain-any [ Action='sts:AssumeRole' and Effect = 'Allow' and Principal.AWS regexMatch /(root)|(user)/ and (Condition.StringEquals isEmpty() and Condition.StringLike isEmpty())]

  • AWS CloudGuard Best Practices

  • AWS ITSG-33

September 29 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

 

 

 

 

 

 

 

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

 

 

 

 

 

 

 

D9.AZU.LOG.12

Ensure AuditEvent logging for Azure Key Vault is enabled

New

 

 

 

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.11

Ensure Transparent Data Encryption (TDE) is enabled for SQL Databases

Modification

  • Name

  • Severity

  • Ensure that 'Data encryption' is set to 'On' for Azure SQL Database

  • High

  • Ensure Transparent Data Encryption (TDE) is enabled for SQL Databases

  • Medium

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure Dashboard System Ruleset

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.02

Ensure that logging for Azure KeyVault is 'Enabled'

Removal

 

 

 

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.06

Ensure that 'Secure transfer required' (HTTPS) is enabled for Storage Accounts

Modification

  • Name

  • Ensure that 'Secure transfer required' is enabled for Storage Accounts

  • Ensure that 'Secure transfer required' (HTTPS) is enabled for Storage Accounts

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure Dashboard System Ruleset

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.07

Ensure that Storage account supports customer-managed keys encryption for Blobs

Modification

  • Name

  • Severity

  • Ensure that 'Storage service encryption' is enabled for the Blob Service

  • High

  • Ensure that Storage account supports customer-managed keys encryption for Blobs

  • Medium

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.08

Ensure that Storage account supports customer-managed keys encryption for Files

Modification

  • Name

  • Severity

  • Ensure that 'Storage service encryption' is enabled for the File Service

  • High

  • Ensure that Storage account supports customer-managed keys encryption for Files

  • Medium

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure Dashboard System Ruleset

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.12

Ensure expiration date is set for all keys

Modification

  • Name

  • Logic

  • Severity

  • Ensure that the expiry date is set on all keys

  • KeyVault where keys should have keys contain-none [ enabled=true and expires isEmpty() ] and keys contain-none [ enabled=true and expires before(1,'days') ]

  • High

  • Ensure expiration date is set for all keys

  • KeyVault where keys should not have keys contain [ enabled=true and expires isEmpty() ]

  • Medium

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.CRY.04

Ensure that the expiry date is set on all SQL Server keys

Removal

 

 

 

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

 

 

 

 

 

 

 

D9.AZU.MON.26

Ensure that Activity Log Alert exists for Create Policy Assignment

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Authorization/policyAssignments/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Authorization/policyAssignments/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.28

Ensure that Activity Log Alert exists for Create or Update Network Security Group

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.29

Ensure that Activity Log Alert exists for Delete Network Security Group

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/delete' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.30

Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/securityRules/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/securityRules/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.31

Ensure that activity log alert exists for the Delete Network Security Group Rule

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/securityRules/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/securityRules/delete' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.32

Ensure that Activity Log Alert exists for Create or Update Security Solution

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Security/securitySolutions/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Security/securitySolutions/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.33

Ensure that Activity Log Alert exists for Delete Security Solution

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Security/securitySolutions/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Security/securitySolutions/delete' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.34

Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule

Modification

  • Name

  • Logic

  • Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Sql/servers/firewallRules/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Sql/servers/firewallRules/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.27

Ensure that Activity Log Alert exists for Delete Policy Assignment

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Authorization/policyAssignments/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Authorization/policyAssignments/delete' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.CRY.10

Ensure that storage account access keys are periodically regenerated

Removal

 

 

 

  • Azure CloudGuard Best Practices

 

 

 

 

 

 

 

D9.AZU.MON.40

Ensure that Activity Log Alert Rule is activated for New/Updated Policy Assignments

Removal

 

 

 

  • Azure CloudGuard Best Practices

 

 

 

 

 

 

 

September 13 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.CRY.1002

S3 Buckets - without server-side-encryption enabled

Removal

 

 

 

  • Dome9 AWS Dashboards

  • AWS CloudGuard Best Practices

D9.AWS.IAM.1002

Accounts - without enforced Password Policy

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.IAM.1010

IAM Users - enabled while unused for 90 days or more

Removal

 

 

 

  • Dome9 AWS Dashboards

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.1011

IAM Users - with console password without MFA enabled

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.IAM.1012

IAM Users - with Inline IAM Policies applied

Removal

 

 

 

  • Dome9 AWS Dashboards

  • AWS HITRUST

D9.AWS.LOG.1018

S3 Buckets - without CloudTrail access logging

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.LOG.1019

S3 Buckets - without logging enabled

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.NET.1006

Instances - are not configured within a VPC

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.NET.1008

Security Groups - with SSH admin port too exposed to the public internet

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AZU.CRY.01

Ensure Key Vault is in use

Modification

  • Name

  • Ensure that KeyVault is in use

  • Ensure Key Vault is in use

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure NIST CSF v1.1

  • Azure HIPAA

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

D9.AWS.IAM.1003

Avoid the use of the 'root' account

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AZU.CRY.19

Ensure Web App is using the latest version of TLS encryption

Modification

  • Name

  • Severity

  • Ensure web app is using the latest version of TLS encryption

  • High

  • Ensure Web App is using the latest version of TLS encryption

  • Medium

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AWS.CRY.1001

Ensure rotation for customer created CMKs is enabled (Scored)

Removal

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

Removal

 

 

 

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

D9.AZU.NET.64

Ensure Cosmos DB account is using Private Endpoints

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.05

Ensure that multi-factor authentication is enabled for all privileged users

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.11

Ensure that multi-factor authentication is enabled for all non-privileged users

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.12

MFA should be enabled on accounts with read permissions on your subscription

Removal

 

 

 

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

D9.AZU.IAM.13

MFA should be enabled on accounts with write permissions on your subscription

Removal

 

 

 

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

D9.AZU.IAM.16

Overly Permissive Scope Access of Role Assignment

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.17

Overly Permissive Subscription Access (Owner over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.18

Overly Permissive Subscription Access (Contributor over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.19

Overly Permissive Subscription Access (User Access Administrator over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.26

Overly Permissive Scope Access of Role Definition

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.27

Overly Permissive Subscription Access (Authorization over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.28

Overly Permissive Subscription Access (Full Access over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.49

Ensure that SQL Server Auditing is Enabled

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.08

Ensure there is an up to date Network Diagram for your cloud network

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.33

Ensure Web App is using the latest version of TLS encryption

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.GCP.AS.02

Asset is not labeled

Removal

 

 

 

  • GCP CloudGuard Best Practices

September 05 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.IAM.08

Enable App Service Authentication on Azure App Service

Modification

  • Name

  • Severity

  • Ensure App Service Authentication is set on Azure App Service

  • High

  • Enable App Service Authentication on Azure App Service

  • Medium

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.CRY.29

Ensure Cosmos DB account is encrypted with customer-managed keys

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.62

Ensure Cosmos DB account public network access is disabled

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.63

Ensure Cosmos DB account access is not allowed from all networks

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.29

Enable WebApp Service Authentication

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.33

Ensure Web App is using the latest version of TLS encryption

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

Removal

 

 

 

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

September 01 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.GCP.IAM.14

Ensure Basic Authentication is disabled on Kubernetes Engine Clusters

Removal

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Containers Security

  • GCP HIPAA

  • GCP CloudGuard Best Practices

D9.CFT.CRY.01

Ensure all S3 buckets employ encryption-at-rest

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.02

Ensure that encryption is enabled for RDS Instances

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.03

Ensure ELB enforces recommended SSL/TLS protocol version

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.04

Ensure that AWS DynamoDB is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.05

Ensure that your Amazon EFS file systems are encrypted

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.06

Ensure that encryption of data at rest is enabled on Elasticsearch domains

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.07

Ensure that node-to-node encryption is enabled for Elasticsearch service

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.08

Ensure that the KMS key have key rotation enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.09

Ensure AWS Kinesis streams are encrypted with KMS customer master keys

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.01

Ensure that S3 Buckets are configured with 'Block public access (bucket settings)'

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.02

S3 bucket should not allow all actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.03

S3 bucket should not allow delete actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.04

S3 bucket should not allow 'get' actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.05

S3 bucket should not allow list actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.06

S3 bucket should not allow put actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.07

S3 bucket should not allow restoring object actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.08

Ensure AWS EC2 Instances use IAM Roles to control access

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.LOG.01

Ensure CloudTrail logs are encrypted at rest using KMS CMKs

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.LOG.02

Ensure CloudTrail is enabled in all regions

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.LOG.03

Ensure CloudTrail logging is enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.01

Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.02

Ensure AWS VPC subnets have automatic public IP assignment disabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.03

Ensure no security groups allow ingress from 0.0.0.0/0 to SSH (TCP:22)

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.04

Ensure no security groups allow ingress from 0.0.0.0/0 to RDP (TCP:3389)

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.05

Ensure that all authorization Type in API Gateway is not set to None

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.06

Ensure that an API Key is required on a Method Request

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.07

Ensure that S3 bucket versioning enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.OPE.01

Amazon EC2 instance must have an associated tag

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.OPE.02

Ensure AWS Lambda functions have tracing enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.OPE.03

Lambda Functions must have an associated tag

New

 

 

 

  • AWS CloudFormation Template ruleset

July 14 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.63

Unused IAM role more than 90 days

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.AS.03

Lambda Functions must have an associated tag

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.AS.04

Amazon EFS must have an associated tag

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.01

Use encrypted storage for instances that might host a database.

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.02

ELB is setup with SSL for secure communication

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.03

S3 Buckets Server Side Encryption At Rest

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.04

S3 Buckets Secure Transport (SSL)

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.05

Use Encrypted RDS storage

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.06

Remove Weak Ciphers for ELB

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.07

ELB - Recommended SSL/TLS protocol version

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.08

SSL/TLS certificates expire in one week

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.09

SSL/TLS certificates expire in one month

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.10

ELB secured listener certificate expires in one week

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.11

ELB secured listener certificate expires in one month

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.12

ALB secured listener certificate expires in one week

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.13

ALB secured listener certificate about to expire in one month

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.14

Use encryption for S3 Bucket write actions

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.15

Use KMS CMK customer-managed keys for Redshift clusters

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.16

Use secure ciphers in CloudFront distribution

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.17

Use encrypted connection between CloudFront and origin server

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.19

ECS Cluster At-Rest Encryption

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.20

AWS Kinesis Streams Keys are rotated

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.21

AWS Kinesis streams are encrypted with KMS customer master keys

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.22

Ensure that your Amazon EFS file systems are encrypted

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.23

Ensure that your Amazon EFS file systems are encrypted using KMS CMK customer-managed keys

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.24

AWS Kinesis Server data at rest has server side encryption (SSE)

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.27

Ensure ACM only has certificates with single domain names, and none with wildcard domain names

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.28

Ensure the AWS Certificate Manager (ACM) has no unused certificates

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.29

Ensure invalid or failed certificates are removed from ACM

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.30

Ensure that AWS DynamoDB is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.31

Ensure AWS ElastiCache Redis clusters have encryption for data at rest enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.32

Ensure AWS ElastiCache Redis clusters have in-transit encryption enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.33

Ensures that AWS RDS databases are encrypted using Customer Managed Keys

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.34

Ensure AWS Redshift instances are encrypted

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.35

Ensure SageMaker Notebook Instance Data Encryption is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.36

Ensure that SageMaker Notebook Instance Data Encryption with KMS CMKs is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.37

Ensure that an API Key is required on a Method Request

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.38

Ensure to update the Security Policy of the Network Load Balancer

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.40

Ensure that all the expired Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates managed by AWS Certificate Manager are removed in order to adhere to Amazon Security Best Practices.

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.41

Ensure that IamGroup does not have Inline policies

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.42

Ensure that the Viewer Protocol policy is compliant to only use the HTTPS protocol

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.43

Ensure in-transit and at-rest encryption is enabled for Amazon EMR clusters

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.44

Ensure Amazon SQS queues enforce Server-Side Encryption (SSE)

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.46

Ensure that node-to-node encryption is enabled for Elasticsearch service

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.47

Ensure that Amazon SNS topics enforce Server-Side Encryption (SSE)

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.48

Ensure that AWS Secret Manager Secret rotation is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.49

Ensure that AWS Secret Manager Secret rotation interval is smaller than 30 days

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.50

Ensure that AWS Secrets Manager service enforces data-at-rest encryption using KMS CMKs

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.51

Ensure that AWS SNS topic is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.52

Ensure that AWS SQS is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.53

Ensure that sensitive parameters are encrypted

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.54

ACM Has a soon to be Expired Certificates

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.55

ACM Has a PENDING_VALIDATION Certificates

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.DNS.01

Expired Route 53 Domain Names

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.DNS.02

Enable AWS Route 53 Domain Auto Renew

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.DNS.03

Enable AWS Route 53 Domain Transfer Lock

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.DNS.04

AWS Route 53 Domain Name Renewal (7 days before expiration)

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.DNS.05

AWS Route 53 Domain Name Renewal (30 days before expiration)

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.DR.01

Ensure AWS RDS instances have Automatic Backup set up

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.DR.02

Ensure AWS RDS instances have Multi-Availability Zone enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.DR.03

Ensure AWS RDS retention policy is at least 7 days

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.DR.04

Ensure Amazon DynamoDB tables have continuous backups enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.01

Avoid the use of the 'root' account

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.02

Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.03

Credentials (with first activated accessKey) unused for 90 days or more should be disabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.04

Credentials (with password enabled) unused for 90 days or more should be disabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.05

Credentials (with second activated accessKey) unused for 90 days or more should be disabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.06

Ensure first access key is rotated every 90 days or less

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.07

Ensure second access key is rotated every 90 days or less

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.08

Ensure IAM password policy requires at least one uppercase letter

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.09

Ensure IAM password policy require at least one lowercase letter

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.10

Ensure IAM password policy require at least one symbol

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.11

Password Policy must require at least one number

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.12

Ensure IAM password policy requires minimum length of 14 or greater

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.14

Ensure IAM password policy prevents password reuse

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.15

Ensure IAM password policy expires passwords within 90 days or less

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.16

Ensure no root account access key exists

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.17.HIPAA

Ensure MFA is enabled for the 'root' account

New

 

 

 

  • AWS HITRUST

D9.AWS.IAM.18

Ensure HARDWARE MFA is enabled for the 'root' account

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.20

Ensure IAM policies are attached only to groups or roles

New

 

 

 

  • AWS HITRUST

D9.AWS.IAM.27

Ensure IAM policies that allow full '*:*' administrative privileges are not created

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.28

S3 bucket should not be world-listable from anonymous users

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.29

S3 bucket should not be world-listable

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.30

S3 bucket should not be world-writable from anonymous users

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.31

S3 bucket should not be world-writable

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.32

S3 bucket should not have writable permissions from anonymous users

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.33

S3 bucket should not have world-writable permissions

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.34

S3 bucket should not have world-readable permissions from anonymous users

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.35

S3 bucket should not have world-readable permissions

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.36

S3 bucket should not allow delete actions from all principals

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.37

S3 bucket should not allow get actions from all principals

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.38

S3 bucket should not allow list actions from all principals

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.40

S3 bucket should not allow all actions from all principals

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.41

S3 bucket should not allow put or restore actions from all principals

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.42

S3 buckets should not grant any external privileges via ACL

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.43

S3 bucket should have versioning MFA delete enabled

New

 

 

 

  • AWS HITRUST

D9.AWS.IAM.44

Use managed policies instead of inline IAM Policies

New

 

 

 

  • AWS HITRUST

D9.AWS.IAM.45

Ensure that your Amazon Lambda functions do not share the same AWS IAM execution role

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.46

Lambda Functions with Admin Privileges are not created

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.47

Ensure there are no inline policies attached to the ECS service

New

 

 

 

  • AWS HITRUST

D9.AWS.IAM.48

Prefer using IAM roles for tasks rather than using IAM roles for an instance

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.49

ECS Service with Admin Roles

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.51

Ensure AWS IAM users have no more than one active Access Key

New

 

 

 

  • AWS HITRUST

D9.AWS.IAM.52

Ensure AWS IAM policies allow only the required privileges for each role

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.53

Ensure AWS IAM policies do not grant 'assume role' permission across all services

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.54

Ensure AWS EC2 Instances use IAM Roles to control access

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.55

Ensure that Lambda Functions with overly permissive policies are not created

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.56

Ensure that SQS policy won't allow all actions from all principals

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.57

Ensure SNS Topics aren't publicly accessible

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.58

Ensure SNS Topics administrative actions aren’t publicly executable

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.59

Ensure that VPC Endpoint policy won't allow all actions

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.62

Ensure that Role do not have Administrator Access

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.1009

Ensure IAM policies are attached only to groups or roles

New

 

 

 

  • AWS HITRUST

D9.AWS.IAM.1010

IAM Users - enabled while unused for 90 days or more

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.1012

IAM Users - with Inline IAM Policies applied

New

 

 

 

  • AWS HITRUST

D9.AWS.IAM.1019

IamUser with Admin or wide permissions without MFA enabled

New

 

 

 

  • AWS HITRUST

D9.AWS.LOG.01

Ensure multi-regions trail exists for each AWS CloudTrail

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.02

Ensure CloudTrail log file validation is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.03

Ensure CloudTrail trails are integrated with CloudWatch

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.04

Ensure AWS Config is enabled in all regions

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.05

Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.06

Ensure CloudTrail logs are encrypted at rest using KMS CMKs

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.07

Ensure CloudTrail is enabled in all regions

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.08

Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.09

Ensure rotation for customer created CMKs is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.10

S3 bucket CloudTrail logs ACL should not allow public access

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.12

S3 bucket should have server access logging enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.13

ELB is created with Access logs enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.14

Ensure VPC Flow Logging is Enabled in all Applicable Regions

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.15

Enable ALB Elastic Load Balancer v2 (ELBv2) access log

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.16

Ensure that your AWS CloudTrail logging bucket has MFA enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.17

Ensure AWS Elastic MapReduce (EMR) clusters capture detailed log data to Amazon S3

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.18

Ensure that AWS EKS Cluster control plane logging is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.19

Ensure that object-level logging is enabled for S3 buckets

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.20

Ensure Network firewall flow logging is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.21

Ensure Network firewall alerts logging is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.01

Ensure a log metric filter and alarm exist for unauthorized API calls

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.02

Ensure a log metric filter and alarm exist for Management Console sign-in without MFA

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.03

Ensure a log metric filter and alarm exist for usage of 'root' account

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.04

Ensure a log metric filter and alarm exist for IAM policy changes

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.05

Ensure a log metric filter and alarm exist for CloudTrail configuration changes

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.06

Ensure a log metric filter and alarm exist for AWS Management Console authentication failures

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.07

Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.08

Ensure a log metric filter and alarm exist for S3 bucket policy changes

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.09

Ensure a log metric filter and alarm exist for AWS Config configuration changes

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.10

Ensure a log metric filter and alarm exist for security group changes

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.11

Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.12

Ensure a log metric filter and alarm exist for changes to network gateways

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.13

Ensure a log metric filter and alarm exist for route table changes

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.14

Ensure a log metric filter and alarm exist for VPC changes

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.15

Ensure appropriate subscribers to each SNS topic

New

 

 

 

  • AWS HITRUST

D9.AWS.MON.16

Ensure that the configuration recorder is set to 'on' and set S3 Bucket and SNS topic as your delivery channel

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.17

Ensure NAT gateway state is available

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.MON.19

Ensure SNS topic have active subscriptions

New

 

 

 

  • AWS HITRUST

D9.AWS.MON.20

Ensure 'Auto accept shared attachments' is disabled, to avoid unknown cross account attachments to your Transit Gateway

New

 

 

 

  • AWS HITRUST

D9.AWS.NET.01

Ensure no security groups allow ingress from 0.0.0.0/0 to SSH (TCP:22)

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.02

Ensure no security groups allow ingress from 0.0.0.0/0 to RDP (TCP:3389)

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.03

Ensure VPC flow logging is enabled in all VPCs

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.04

Ensure the default security group of every VPC restricts all traffic

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.06

Ensure S3 buckets are not publicly accessible

New

 

 

 

  • AWS HITRUST

D9.AWS.NET.08

Ensure no security groups allow ingress from 0.0.0.0/0 to ALL ports and protocols

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.09

Restrict outbound traffic to that which is necessary, and specifically deny all other traffic

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.12

Instances are Configured under Virtual Private Cloud

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.13

Security Groups must be defined under a Virtual Private Cloud

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.15

Remove Unused Security Groups

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.16

RDS should not have Public Interface

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.17

RDS should not have Public Interface open to a public scope

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.18

RDS should not have be open to a large scope

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.19

S3 bucket should have versioning enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.20

Ensure that Static website hosting is disabled on your S3 bucket

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.23

Security Groups - with admin ports too exposed to the public internet

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.27

Instances with Direct Connect virtual interface should not have public interfaces

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.28

RDS Databases with Direct Connect virtual interface should not have public interfaces

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.29

Public AMI

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.33

ECS Cluster should not have running container instances with unconnected agents

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.34

Ensure that at least one instance is registered with an ECS Cluster

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.35

Make sure that ALB is protected by a WAF

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.36

AWS Cloud Front - WAF Integration

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.37

Ensure no ECS Services allow ingress from 0.0.0.0/0 to ALL ports and protocols

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.38

Ensure that at least one Load Balancer is attached to the service

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.40

Ensure AWS Application Load Balancer (ALB) listeners block connection requests over HTTP

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.41

Ensure AWS CloudFront distribution with access logging is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.42

Ensure AWS CloudFront web distribution with geo restriction is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.43

Ensure AWS CloudFront web distributions use custom (and not default) SSL certificates

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.44

Ensure that AWS Elastic Load Balancers (ELB) have no outbound rules in their security groups

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.46

Ensure AWS NAT Gateways are being utilized instead of the default route

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.47

Ensure AWS VPC subnets have automatic public IP assignment disabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.49

Ensure that SageMaker Notebook does not have direct internet access

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.50

Ensure that AWS Elastic Load Balancers (ELB) have inbound rules in their security groups

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.51

Ensure AWS Redshift clusters are not publicly accessible

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.52

Ensure that the API Endpoint type in API Gateway is set to Private and is not exposed to the public internet

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.54

Ensure that AWS EKS Cluster endpoint access is not public

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.55

Ensure that the VPC Endpoint status is Available state

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.56

Ensure that Security Groups are not open to all

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.57

Remove Unused Security Groups that are open to all

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.58

Ensure that AWS S3 Bucket block public ACLs is enabled at the account level or at the Bucket level

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.59

Ensure to define VPC associations and propagations yourself to keep track of all routes and connections to and from your Transit gateway

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.60

Ensure that NAT gateway is not associated in a private subnet

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.61

Ensure Auto Scaling group being used with multiple Availability zones

New

 

 

 

  • AWS HITRUST

D9.AWS.NET.62

Ensure Network firewall delete protection enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.63

Ensure Network firewall have subnet change protection enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.64

Ensure Network firewall have policy change protection enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.66

Ensure Network firewall status is not FAILED

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.67

Ensure that all authorization Type in API Gateway are not set to None

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.68

Ensure that all requestValidatorId in API Gateway are not null

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.70

EksCluster should not have more then one security groups

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.71

EksCluster should not be publicly access

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.01

Invalid CPU or Memory Value Specified

New

 

 

 

  • AWS HITRUST

D9.AWS.OPE.02

Container metadata

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.03

Enable container's health checks

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.05

Ensure AWS EBS Volumes are attached to instances

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.06

Ensure only usable Customer Managed Keys are in the AWS KMS

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.07

Ensure AWS Lambda functions have tracing enabled

New

 

 

 

  • AWS HITRUST

D9.AWS.OPE.08

Ensure AWS RDS automatic minor upgrades are enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.10

Identifies unused AWS VPCs

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.12

Ensure there is a Dead Letter Queue configured for each Amazon SQS queue

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.13

Ensure NAT gateway has a name tag

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.14

Ensure Transit gateway have a name tag

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.16

Ensure VPC Endpoint has a name tag

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.19

Ensure SQS Dead-letter queue is not configured to send messages to the source queue

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.20

Ensure Auto Scaling group does not have suspended processes

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.OPE.21

Ensure Auto Scaling group have scaling cooldown configured

New

 

 

 

  • AWS HITRUST

D9.AWS.PRE.01

Credentials report was generated in the last 24 hours

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.PRE.02

Enforce Password Policy

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.VLN.01

EC2 Instance - there shouldn't be any High level findings in Inspector Scans

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.VLN.02

Instances without Inspector runs in the last 30 days

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.VLN.03

Amazon GuardDuty service is enabled

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.VLN.04

Amazon System Manager Document should not be publicly available

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.VLN.05

Ensure that public System Manager Documents include parameters

New

 

 

 

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.CRY.45

Ensure that encryption of data at rest is enabled on Elasticsearch domains

New

 

 

 

  • AWS ITSG-33

D9.AWS.IAM.17

Ensure VIRTUAL MFA is enabled for the 'root' account

New

 

 

 

  • AWS ITSG-33

D9.AWS.IAM.61

Ensure that Trusted Policy Roles which can be assumed by external entities include a Condition String

New

 

 

 

  • AWS ITSG-33

D9.AWS.NET.26

Determine if CloudFront CDN is in use

New

 

 

 

  • AWS ITSG-33

D9.AWS.NET.48

Ensure that SageMaker is placed in VPC

New

 

 

 

  • AWS ITSG-33

D9.AWS.NET.53

Enforce creation of ElasticSearch domains within your VPCs

New

 

 

 

  • AWS ITSG-33

July 12 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.GCP.NET.AG2.4.VMInstance.22.TCP

VMInstance with administrative service: SSH (TCP:22) is too exposed to the public internet

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.4.VMInstance.3389.TCP

VMInstance with administrative service: Remote Desktop (TCP:3389) is too exposed to the public internet

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.4.VMInstance.9090.TCP

VMInstance with administrative service: CiscoSecure,websm (TCP:9090) is too exposed to the public internet

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.5.VMInstance.22.TCP

VMInstance with administrative service: SSH (TCP:22) is exposed to a wide network scope

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.5.VMInstance.3389.TCP

VMInstance with administrative service: Remote Desktop (TCP:3389) is exposed to a wide network scope

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.5.VMInstance.9090.TCP

VMInstance with administrative service: CiscoSecure,websm (TCP:9090) is exposed to a wide network scope

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG4.VMInstance.22.TCP

VMInstance with administrative service: SSH (TCP:22) is too exposed to the public internet

Removal

 

 

 

  • GCP CloudGuard CheckUp

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG4.VMInstance.3389.TCP

VMInstance with administrative service: Remote Desktop (TCP:3389) is too exposed to the public internet

Removal

 

 

 

  • GCP CloudGuard CheckUp

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG4.VMInstance.9090.TCP

VMInstance with administrative service: CiscoSecure,websm (TCP:9090) is too exposed to the public internet

Removal

 

 

 

  • GCP CloudGuard CheckUp

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG5.VMInstance.22.TCP

VMInstance with administrative service: SSH (TCP:22) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard CheckUp

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG5.VMInstance.3389.TCP

VMInstance with administrative service: Remote Desktop (TCP:3389) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard CheckUp

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG5.VMInstance.9090.TCP

VMInstance with administrative service: CiscoSecure,websm (TCP:9090) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard CheckUp

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.11211.TCP

VMInstance with unencrypted Memcached (TCP:11211) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.11211.UDP

VMInstance with unencrypted Memcached (UDP:11211) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.1521.TCP

VMInstance with unencrypted Oracle DB (TCP:1521) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.2483.TCP

VMInstance with unencrypted Oracle DB (TCP:2483) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.2483.UDP

VMInstance with unencrypted Oracle DB (UDP:2483) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.27017.TCP

VMInstance with unencrypted Mongo (TCP:27017) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.389.TCP

VMInstance with unencrypted LDAP (TCP:389) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.389.UDP

VMInstance with unencrypted LDAP (UDP:389) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.61620.TCP

VMInstance with unencrypted Cassandra OpsCenter Monitoring (TCP:61620) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.6379.TCP

VMInstance with unencrypted Redis (TCP:6379) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.7000.TCP

VMInstance with unencrypted Cassandra Internode Communication (TCP:7000) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.7199.TCP

VMInstance with unencrypted Cassandra Monitoring (TCP:7199) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.8888.TCP

VMInstance with unencrypted Cassandra OpsCenter Website (TCP:8888) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.9042.TCP

VMInstance with unencrypted Cassandra Client (TCP:9042) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.9160.TCP

VMInstance with unencrypted Cassandra Thrift (TCP:9160) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.9200.TCP

VMInstance with unencrypted Elastic search (TCP:9200) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.1.VMInstance.9300.TCP

VMInstance with unencrypted Elastic search (TCP:9300) is exposed to the public internet

New

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.11211.TCP

VMInstance with unencrypted Memcached (TCP:11211) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.11211.UDP

VMInstance with unencrypted Memcached (UDP:11211) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.1521.TCP

VMInstance with unencrypted Oracle DB (TCP:1521) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.2483.TCP

VMInstance with unencrypted Oracle DB (TCP:2483) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.2483.UDP

VMInstance with unencrypted Oracle DB (UDP:2483) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.27017.TCP

VMInstance with unencrypted Mongo (TCP:27017) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.389.TCP

VMInstance with unencrypted LDAP (TCP:389) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.389.UDP

VMInstance with unencrypted LDAP (UDP:389) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.61620.TCP

VMInstance with unencrypted Cassandra OpsCenter Monitoring (TCP:61620) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.6379.TCP

VMInstance with unencrypted Redis (TCP:6379) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.7000.TCP

VMInstance with unencrypted Cassandra Internode Communication (TCP:7000) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.7199.TCP

VMInstance with unencrypted Cassandra Monitoring (TCP:7199) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.8888.TCP

VMInstance with unencrypted Cassandra OpsCenter Website (TCP:8888) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.9042.TCP

VMInstance with unencrypted Cassandra Client (TCP:9042) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.9160.TCP

VMInstance with unencrypted Cassandra Thrift (TCP:9160) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.9200.TCP

VMInstance with unencrypted Elastic search (TCP:9200) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG1.VMInstance.9300.TCP

VMInstance with unencrypted Elastic search (TCP:9300) is exposed to the public internet

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.110.TCP

VMInstance with service POP3(TCP:110) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.11214.TCP

VMInstance with service Memcached SSL(TCP:11214) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.11214.UDP

VMInstance with service Memcached SSL(UDP:11214) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.11215.TCP

VMInstance with service Memcached SSL(TCP:11215) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.11215.UDP

VMInstance with service Memcached SSL(UDP:11215) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.135.TCP

VMInstance with service MSSQL Debugger(TCP:135) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.137.TCP

VMInstance with service NetBIOS Name Service(TCP:137) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.137.UDP

VMInstance with service NetBIOS Name Service(UDP:137) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.138.TCP

VMInstance with service NetBios Datagram Service(TCP:138) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.138.UDP

VMInstance with service NetBios Datagram Service(UDP:138) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.139.TCP

VMInstance with service NetBios Session Service(TCP:139) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.139.UDP

VMInstance with service NetBios Session Service(UDP:139) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.1433.TCP

VMInstance with service MSSQL Server(TCP:1433) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.1434.TCP

VMInstance with service MSSQL Admin(TCP:1434) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.1434.UDP

VMInstance with service MSSQL Browser Service(UDP:1434) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.161.UDP

VMInstance with service SNMP(UDP:161) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.23.TCP

VMInstance with service Telnet(TCP:23) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.2382.TCP

VMInstance with service SQL Server Analysis Service browser(TCP:2382) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.2383.TCP

VMInstance with service SQL Server Analysis Services(TCP:2383) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.2484.TCP

VMInstance with service Oracle DB SSL(TCP:2484) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.2484.UDP

VMInstance with service Oracle DB SSL(UDP:2484) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.25.TCP

VMInstance with service SMTP(TCP:25) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.27018.TCP

VMInstance with service Mongo Web Portal(TCP:27018) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.3000.TCP

VMInstance with service Prevalent known internal port(TCP:3000) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.3020.TCP

VMInstance with service CIFS / SMB(TCP:3020) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.3306.TCP

VMInstance with service MySQL(TCP:3306) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.445.TCP

VMInstance with service Microsoft-DS(TCP:445) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.4505.TCP

VMInstance with service SaltStack Master(TCP:4505) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.4506.TCP

VMInstance with service SaltStack Master(TCP:4506) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.53.UDP

VMInstance with service DNS(UDP:53) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.5432.TCP

VMInstance with service Postgres SQL(TCP:5432) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.5432.UDP

VMInstance with service Postgres SQL(UDP:5432) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.5500.TCP

VMInstance with service VNC Listener(TCP:5500) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.5900.TCP

VMInstance with service VNC Server(TCP:5900) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.61621.TCP

VMInstance with service Cassandra OpsCenter agent(TCP:61621) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.636.TCP

VMInstance with service LDAP SSL(TCP:636) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.7001.TCP

VMInstance with service Cassandra(TCP:7001) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.8000.TCP

VMInstance with service Known internal web port(TCP:8000) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.8080.TCP

VMInstance with service Known internal web port(TCP:8080) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.8140.TCP

VMInstance with service Puppet Master(TCP:8140) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG10.VMInstance.9000.TCP

VMInstance with service Hadoop Name Node(TCP:9000) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.11211.TCP

VMInstance with unencrypted Memcached (TCP:11211) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.11211.UDP

VMInstance with unencrypted Memcached (UDP:11211) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.1521.TCP

VMInstance with unencrypted Oracle DB (TCP:1521) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.2483.TCP

VMInstance with unencrypted Oracle DB (TCP:2483) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.2483.UDP

VMInstance with unencrypted Oracle DB (UDP:2483) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.27017.TCP

VMInstance with unencrypted Mongo (TCP:27017) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.389.TCP

VMInstance with unencrypted LDAP (TCP:389) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.389.UDP

VMInstance with unencrypted LDAP (UDP:389) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.61620.TCP

VMInstance with unencrypted Cassandra OpsCenter Monitoring (TCP:61620) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.6379.TCP

VMInstance with unencrypted Redis (TCP:6379) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.7000.TCP

VMInstance with unencrypted Cassandra Internode Communication (TCP:7000) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.7199.TCP

VMInstance with unencrypted Cassandra Monitoring (TCP:7199) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.8888.TCP

VMInstance with unencrypted Cassandra OpsCenter Website (TCP:8888) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.9042.TCP

VMInstance with unencrypted Cassandra Client (TCP:9042) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.9160.TCP

VMInstance with unencrypted Cassandra Thrift (TCP:9160) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.9200.TCP

VMInstance with unencrypted Elastic search (TCP:9200) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG2.VMInstance.9300.TCP

VMInstance with unencrypted Elastic search (TCP:9300) is exposed to a large network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.11211.TCP

VMInstance with unencrypted Memcached (TCP:11211) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.11211.UDP

VMInstance with unencrypted Memcached (UDP:11211) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.1521.TCP

VMInstance with unencrypted Oracle DB (TCP:1521) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.2483.TCP

VMInstance with unencrypted Oracle DB (TCP:2483) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.2483.UDP

VMInstance with unencrypted Oracle DB (UDP:2483) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.27017.TCP

VMInstance with unencrypted Mongo (TCP:27017) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.389.TCP

VMInstance with unencrypted LDAP (TCP:389) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.389.UDP

VMInstance with unencrypted LDAP (UDP:389) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.61620.TCP

VMInstance with unencrypted Cassandra OpsCenter Monitoring (TCP:61620) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.6379.TCP

VMInstance with unencrypted Redis (TCP:6379) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.7000.TCP

VMInstance with unencrypted Cassandra Internode Communication (TCP:7000) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.7199.TCP

VMInstance with unencrypted Cassandra Monitoring (TCP:7199) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.8888.TCP

VMInstance with unencrypted Cassandra OpsCenter Website (TCP:8888) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.9042.TCP

VMInstance with unencrypted Cassandra Client (TCP:9042) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.9160.TCP

VMInstance with unencrypted Cassandra Thrift (TCP:9160) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.9200.TCP

VMInstance with unencrypted Elastic search (TCP:9200) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG3.VMInstance.9300.TCP

VMInstance with unencrypted Elastic search (TCP:9300) is exposed to a small network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.110.TCP

Public VMInstance with service POP3(TCP:110) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.11214.TCP

Public VMInstance with service Memcached SSL(TCP:11214) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.11214.UDP

Public VMInstance with service Memcached SSL(UDP:11214) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.11215.TCP

Public VMInstance with service Memcached SSL(TCP:11215) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.11215.UDP

Public VMInstance with service Memcached SSL(UDP:11215) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.135.TCP

Public VMInstance with service MSSQL Debugger(TCP:135) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.137.TCP

Public VMInstance with service NetBIOS Name Service(TCP:137) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.137.UDP

Public VMInstance with service NetBIOS Name Service(UDP:137) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.138.TCP

Public VMInstance with service NetBios Datagram Service(TCP:138) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.138.UDP

Public VMInstance with service NetBios Datagram Service(UDP:138) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.139.TCP

Public VMInstance with service NetBios Session Service(TCP:139) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.139.UDP

Public VMInstance with service NetBios Session Service(UDP:139) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.1433.TCP

Public VMInstance with service MSSQL Server(TCP:1433) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.1434.TCP

Public VMInstance with service MSSQL Admin(TCP:1434) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.1434.UDP

Public VMInstance with service MSSQL Browser Service(UDP:1434) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.161.UDP

Public VMInstance with service SNMP(UDP:161) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.23.TCP

Public VMInstance with service Telnet(TCP:23) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.2382.TCP

Public VMInstance with service SQL Server Analysis Service browser(TCP:2382) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.2383.TCP

Public VMInstance with service SQL Server Analysis Services(TCP:2383) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.2484.TCP

Public VMInstance with service Oracle DB SSL(TCP:2484) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.2484.UDP

Public VMInstance with service Oracle DB SSL(UDP:2484) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.25.TCP

Public VMInstance with service SMTP(TCP:25) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.27018.TCP

Public VMInstance with service Mongo Web Portal(TCP:27018) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.3000.TCP

Public VMInstance with service Prevalent known internal port(TCP:3000) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.3020.TCP

Public VMInstance with service CIFS / SMB(TCP:3020) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.3306.TCP

Public VMInstance with service MySQL(TCP:3306) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.445.TCP

Public VMInstance with service Microsoft-DS(TCP:445) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.4505.TCP

Public VMInstance with service SaltStack Master(TCP:4505) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.4506.TCP

Public VMInstance with service SaltStack Master(TCP:4506) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.53.UDP

Public VMInstance with service DNS(UDP:53) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.5432.TCP

Public VMInstance with service Postgres SQL(TCP:5432) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.5432.UDP

Public VMInstance with service Postgres SQL(UDP:5432) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.5500.TCP

Public VMInstance with service VNC Listener(TCP:5500) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.5900.TCP

Public VMInstance with service VNC Server(TCP:5900) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.61621.TCP

Public VMInstance with service Cassandra OpsCenter agent(TCP:61621) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.636.TCP

Public VMInstance with service LDAP SSL(TCP:636) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.7001.TCP

Public VMInstance with service Cassandra(TCP:7001) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.8000.TCP

Public VMInstance with service Known internal web port(TCP:8000) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.8080.TCP

Public VMInstance with service Known internal web port(TCP:8080) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.8140.TCP

Public VMInstance with service Puppet Master(TCP:8140) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG6.VMInstance.9000.TCP

Public VMInstance with service Hadoop Name Node(TCP:9000) is exposed to the entire internet

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.110.TCP

Public VMInstance with service POP3(TCP:110) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.11214.TCP

Public VMInstance with service Memcached SSL(TCP:11214) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.11214.UDP

Public VMInstance with service Memcached SSL(UDP:11214) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.11215.TCP

Public VMInstance with service Memcached SSL(TCP:11215) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.11215.UDP

Public VMInstance with service Memcached SSL(UDP:11215) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.135.TCP

Public VMInstance with service MSSQL Debugger(TCP:135) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.137.TCP

Public VMInstance with service NetBIOS Name Service(TCP:137) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.137.UDP

Public VMInstance with service NetBIOS Name Service(UDP:137) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.138.TCP

Public VMInstance with service NetBios Datagram Service(TCP:138) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.138.UDP

Public VMInstance with service NetBios Datagram Service(UDP:138) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.139.TCP

Public VMInstance with service NetBios Session Service(TCP:139) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.139.UDP

Public VMInstance with service NetBios Session Service(UDP:139) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.1433.TCP

Public VMInstance with service MSSQL Server(TCP:1433) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.1434.TCP

Public VMInstance with service MSSQL Admin(TCP:1434) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.1434.UDP

Public VMInstance with service MSSQL Browser Service(UDP:1434) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.161.UDP

Public VMInstance with service SNMP(UDP:161) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.23.TCP

Public VMInstance with service Telnet(TCP:23) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.2382.TCP

Public VMInstance with service SQL Server Analysis Service browser(TCP:2382) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.2383.TCP

Public VMInstance with service SQL Server Analysis Services(TCP:2383) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.2484.TCP

Public VMInstance with service Oracle DB SSL(TCP:2484) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.2484.UDP

Public VMInstance with service Oracle DB SSL(UDP:2484) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.25.TCP

Public VMInstance with service SMTP(TCP:25) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.27018.TCP

Public VMInstance with service Mongo Web Portal(TCP:27018) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.3000.TCP

Public VMInstance with service Prevalent known internal port(TCP:3000) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.3020.TCP

Public VMInstance with service CIFS / SMB(TCP:3020) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.3306.TCP

Public VMInstance with service MySQL(TCP:3306) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.445.TCP

Public VMInstance with service Microsoft-DS(TCP:445) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.4505.TCP

Public VMInstance with service SaltStack Master(TCP:4505) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.4506.TCP

Public VMInstance with service SaltStack Master(TCP:4506) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.53.UDP

Public VMInstance with service DNS(UDP:53) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.5432.TCP

Public VMInstance with service Postgres SQL(TCP:5432) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.5432.UDP

Public VMInstance with service Postgres SQL(UDP:5432) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.5500.TCP

Public VMInstance with service VNC Listener(TCP:5500) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.5900.TCP

Public VMInstance with service VNC Server(TCP:5900) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.61621.TCP

Public VMInstance with service Cassandra OpsCenter agent(TCP:61621) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.636.TCP

Public VMInstance with service LDAP SSL(TCP:636) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.7001.TCP

Public VMInstance with service Cassandra(TCP:7001) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.8000.TCP

Public VMInstance with service Known internal web port(TCP:8000) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.8080.TCP

Public VMInstance with service Known internal web port(TCP:8080) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.8140.TCP

Public VMInstance with service Puppet Master(TCP:8140) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG7.VMInstance.9000.TCP

Public VMInstance with service Hadoop Name Node(TCP:9000) is exposed to a wide public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.110.TCP

Public VMInstance with service POP3(TCP:110) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.11214.TCP

Public VMInstance with service Memcached SSL(TCP:11214) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.11214.UDP

Public VMInstance with service Memcached SSL(UDP:11214) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.11215.TCP

Public VMInstance with service Memcached SSL(TCP:11215) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.11215.UDP

Public VMInstance with service Memcached SSL(UDP:11215) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.135.TCP

Public VMInstance with service MSSQL Debugger(TCP:135) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.137.TCP

Public VMInstance with service NetBIOS Name Service(TCP:137) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.137.UDP

Public VMInstance with service NetBIOS Name Service(UDP:137) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.138.TCP

Public VMInstance with service NetBios Datagram Service(TCP:138) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.138.UDP

Public VMInstance with service NetBios Datagram Service(UDP:138) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.139.TCP

Public VMInstance with service NetBios Session Service(TCP:139) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.139.UDP

Public VMInstance with service NetBios Session Service(UDP:139) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.1433.TCP

Public VMInstance with service MSSQL Server(TCP:1433) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.1434.TCP

Public VMInstance with service MSSQL Admin(TCP:1434) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.1434.UDP

Public VMInstance with service MSSQL Browser Service(UDP:1434) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.161.UDP

Public VMInstance with service SNMP(UDP:161) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.23.TCP

Public VMInstance with service Telnet(TCP:23) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.2382.TCP

Public VMInstance with service SQL Server Analysis Service browser(TCP:2382) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.2383.TCP

Public VMInstance with service SQL Server Analysis Services(TCP:2383) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.2484.TCP

Public VMInstance with service Oracle DB SSL(TCP:2484) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.2484.UDP

Public VMInstance with service Oracle DB SSL(UDP:2484) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.25.TCP

Public VMInstance with service SMTP(TCP:25) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.27018.TCP

Public VMInstance with service Mongo Web Portal(TCP:27018) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.3000.TCP

Public VMInstance with service Prevalent known internal port(TCP:3000) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.3020.TCP

Public VMInstance with service CIFS / SMB(TCP:3020) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.3306.TCP

Public VMInstance with service MySQL(TCP:3306) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.445.TCP

Public VMInstance with service Microsoft-DS(TCP:445) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.4505.TCP

Public VMInstance with service SaltStack Master(TCP:4505) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.4506.TCP

Public VMInstance with service SaltStack Master(TCP:4506) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.53.UDP

Public VMInstance with service DNS(UDP:53) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.5432.TCP

Public VMInstance with service Postgres SQL(TCP:5432) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.5432.UDP

Public VMInstance with service Postgres SQL(UDP:5432) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.5500.TCP

Public VMInstance with service VNC Listener(TCP:5500) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.5900.TCP

Public VMInstance with service VNC Server(TCP:5900) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.61621.TCP

Public VMInstance with service Cassandra OpsCenter agent(TCP:61621) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.636.TCP

Public VMInstance with service LDAP SSL(TCP:636) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.7001.TCP

Public VMInstance with service Cassandra(TCP:7001) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.8000.TCP

Public VMInstance with service Known internal web port(TCP:8000) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.8080.TCP

Public VMInstance with service Known internal web port(TCP:8080) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.8140.TCP

Public VMInstance with service Puppet Master(TCP:8140) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG8.VMInstance.9000.TCP

Public VMInstance with service Hadoop Name Node(TCP:9000) is exposed to a small public network

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.110.TCP

VMInstance with service POP3(TCP:110) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.11214.TCP

VMInstance with service Memcached SSL(TCP:11214) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.11214.UDP

VMInstance with service Memcached SSL(UDP:11214) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.11215.TCP

VMInstance with service Memcached SSL(TCP:11215) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.11215.UDP

VMInstance with service Memcached SSL(UDP:11215) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.135.TCP

VMInstance with service MSSQL Debugger(TCP:135) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.137.TCP

VMInstance with service NetBIOS Name Service(TCP:137) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.137.UDP

VMInstance with service NetBIOS Name Service(UDP:137) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.138.TCP

VMInstance with service NetBios Datagram Service(TCP:138) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.138.UDP

VMInstance with service NetBios Datagram Service(UDP:138) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.139.TCP

VMInstance with service NetBios Session Service(TCP:139) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.139.UDP

VMInstance with service NetBios Session Service(UDP:139) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.1433.TCP

VMInstance with service MSSQL Server(TCP:1433) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.1434.TCP

VMInstance with service MSSQL Admin(TCP:1434) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.1434.UDP

VMInstance with service MSSQL Browser Service(UDP:1434) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.161.UDP

VMInstance with service SNMP(UDP:161) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.23.TCP

VMInstance with service Telnet(TCP:23) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.2382.TCP

VMInstance with service SQL Server Analysis Service browser(TCP:2382) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.2383.TCP

VMInstance with service SQL Server Analysis Services(TCP:2383) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.2484.TCP

VMInstance with service Oracle DB SSL(TCP:2484) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.2484.UDP

VMInstance with service Oracle DB SSL(UDP:2484) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.25.TCP

VMInstance with service SMTP(TCP:25) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.27018.TCP

VMInstance with service Mongo Web Portal(TCP:27018) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.3000.TCP

VMInstance with service Prevalent known internal port(TCP:3000) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.3020.TCP

VMInstance with service CIFS / SMB(TCP:3020) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.3306.TCP

VMInstance with service MySQL(TCP:3306) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.445.TCP

VMInstance with service Microsoft-DS(TCP:445) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.4505.TCP

VMInstance with service SaltStack Master(TCP:4505) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.4506.TCP

VMInstance with service SaltStack Master(TCP:4506) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.53.UDP

VMInstance with service DNS(UDP:53) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.5432.TCP

VMInstance with service Postgres SQL(TCP:5432) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.5432.UDP

VMInstance with service Postgres SQL(UDP:5432) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.5500.TCP

VMInstance with service VNC Listener(TCP:5500) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.5900.TCP

VMInstance with service VNC Server(TCP:5900) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.61621.TCP

VMInstance with service Cassandra OpsCenter agent(TCP:61621) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.636.TCP

VMInstance with service LDAP SSL(TCP:636) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.7001.TCP

VMInstance with service Cassandra(TCP:7001) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.8000.TCP

VMInstance with service Known internal web port(TCP:8000) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.8080.TCP

VMInstance with service Known internal web port(TCP:8080) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.8140.TCP

VMInstance with service Puppet Master(TCP:8140) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.NET.AG9.VMInstance.9000.TCP

VMInstance with service Hadoop Name Node(TCP:9000) is exposed to a wide network scope

Removal

 

 

 

  • GCP CloudGuard Network Alerts

  • GCP CloudGuard Best Practices

D9.GCP.11.11

Deprecated ruleset

New

 

 

 

  • [Deprecated] GCP CloudGuard Network Alerts

June 23 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.CRY.1001

Ensure rotation for customer created CMKs is enabled (Scored)

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.DR.04

Ensure Amazon DynamoDB tables have continuous backups enabled

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.55

Ensure that Lambda Functions with overly permissive policies are not created

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.LOG.20

Ensure Network firewall flow logging is enabled

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.NET.66

Ensure Network firewall status is not FAILED

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.1019

IamUser with Admin or wide permissions without MFA enabled

Removal

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.1020

Ensure IAM Role does not allow '*' in trusted entities

Removal

 

 

 

  • AWS CloudGuard Best Practices

D9.AZU.CRY.10

Ensure that storage account access keys are periodically regenerated

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.05

Ensure that multi-factor authentication is enabled for all privileged users

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.11

Ensure that multi-factor authentication is enabled for all non-privileged users

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.12

MFA should be enabled on accounts with read permissions on your subscription

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.13

MFA should be enabled on accounts with write permissions on your subscription

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.LOG.01

Ensure that Activity Log Retention is set 365 days or greater

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.LOG.07

Ensure that a Log Profile exists

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.LOG.08

Ensure audit profile captures all the activities

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.05

Change Control for Network Security Group Configuration

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.08

Ensure there is an up to date Network Diagram for your cloud network

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.32

Ensure Virtual Network Gateway is configured with Cryptographic Algorithm

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.GCP.AS.02

Asset is not labeled

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.LOG.02

Ensure Cloud SQL - PostgreSQL server has log_checkpoints database flag set to on

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.LOG.03

Ensure Cloud SQL - PostgreSQL server has log_connections and log_disconnections database flags set to on

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.LOG.04

Ensure Cloud SQL - PostgreSQL server has log_lock_waits database flag set to on

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.LOG.05

Ensure Cloud SQL - PostgreSQL server has log_temp_files database flag set to '0' - (on)

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.LOG.06

Ensure Cloud SQL - PostgreSQL server has log_min_duration_statement database flag set to '-1' - (off)

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.NET.05

Ensure there is an up to date Network Diagram for your cloud network

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.VLN.03

Ensure Cloud SQL - SQL Server instance has 'cross db ownership chaining' database flag set to off

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.VLN.04

Ensure Cloud SQL - SQL Server instance has 'contained database authentication' database flag set to off

New

 

 

 

  • GCP CloudGuard Best Practices

D9.ALI.CRY.01

Ensure that 'Secure transfer required' is Enabled

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.CRY.02

Ensure that OSS bucket server side encryption using KMS is enabled

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.CRY.03

Ensure that ECS Disks are encrypted

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.CRY.04

Ensure that ECS Virtual Machine's Disks are encrypted

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.01

Ensure no root account access key exists

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.02

Ensure MFA is enabled for the 'root' account

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.03

Avoid the use of the 'root' account

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.04

Ensure users not logged on for 90 days or longer are disabled for console logon

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.05

Ensure RAM users have no more than one active Access Key

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.06

Ensure RAM policies are attached only to groups or roles

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.07

Ensure ECS Instances use RAM roles to control access

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.08

Ensure RAM policies that allow full access administrative privileges are not created

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.09

Ensure RAM password policy prevents password reuse

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.10

Ensure RAM password policy requires at least one uppercase letter

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.11

Ensure RAM password policy requires at least one lowercase letter

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.12

Ensure RAM password policy require at least one symbol

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.13

Ensure RAM password policy require at least one number

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.14

Ensure RAM password policy expires passwords within 90 days or less

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.15

Ensure RAM password policy temporarily blocks logon after 5 incorrect logon attempts within an hour

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.16

Ensure RAM password policy requires minimum length of at least 14

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.IAM.17

Ensure that OSS bucket is not anonymously or publicly accessible

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.LOG.01

Ensure that logging is enabled for OSS buckets

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.NET.01

Instances are Configured under Virtual Private Cloud

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.NET.02

Ensure legacy networks does not exist

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.NET.03

Ensure no security groups allow ingress from 0.0.0.0/0 to port 22

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.NET.04

Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.NET.05

Ensure no security groups allow ingress from 0.0.0.0/0 to ALL ports and protocols

New

 

 

 

  • Alibaba cloud ruleset

D9.ALI.NET.06

Restrict outbound traffic to that which is necessary, and specifically deny all other traffic

New

 

 

 

  • Alibaba cloud ruleset

June 13 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.CRY.05

Use Encrypted RDS storage

Modification

  • Logic

  • RDS should have isStorageEncrypted = 'false'

  • RDS should have isStorageEncrypted = 'true'

  • AWS HIPAA

  • AWS Dome9 FISC

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS MAS TRM Framework

  • AWS NIST 800-171

June 02 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.CRY.05

Use Encrypted RDS storage

Modification

  • Logic

  • RDS should have isStorageEncrypted = 'true' and kmsKeyId

  • RDS should have isStorageEncrypted = 'false'

  • AWS HIPAA

  • AWS Dome9 FISC

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS MAS TRM Framework

  • AWS NIST 800-171

D9.AWS.CRY.07

ELB - Recommended SSL/TLS protocol version

Modification

  • Logic

  • ELB should not have elbListeners with [ policies contain [ attributes contain-any [$ in ('Protocol-SSLv3', 'Protocol-TLSv1') ] ] ]

  • ELB should not have elbListeners with [ policies contain [ attributes contain-any ] ]

  •  

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

D9.GCP.AS.09

Ensure GCP VM Instances have Labels

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

D9.GCP.AS.02

Asset is not labeled

Removal

 

 

 

  • GCP CloudGuard CheckUp

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard Best Practices

D9.AZU.MON.33

Ensure that Activity Log Alert exists for Delete Security Solution

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='operationName equals Microsoft.Security/securitySolutions/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Security/securitySolutions/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.MON.34

Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='operationName equals Microsoft.Sql/servers/firewallRules/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Sql/servers/firewallRules/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.IAM.14

Enable Function App Service Authentication

Modification

  • Name

  • Enable App Service Authentication

  • Enable Function App Service Authentication

  • Azure CloudGuard Best Practices

D9.AZU.IAM.16

Overly Permissive Scope Access of Role Assignment

Modification

  • Name

  • Overly Permissive Scope Access

  • Overly Permissive Scope Access of Role Assignment

  • Azure CloudGuard Best Practices

D9.AZU.IAM.26

Overly Permissive Scope Access of Role Definition

Modification

  • Name

  • Overly Permissive Scope Access

  • Overly Permissive Scope Access of Role Definition

  • Azure CloudGuard Best Practices

D9.AZU.IAM.29

Enable WebApp Service Authentication

Modification

  • Name

  • Enable App Service Authentication

  • Enable WebApp Service Authentication

  • Azure CloudGuard Best Practices

D9.ALI.IAM.08

Ensure RAM policies that allow full access administrative privileges are not created

Modification

  • Name

  • Ensure RAM policies that allow full '*:*' administrative privileges are not created

  • Ensure RAM policies that allow full access administrative privileges are not created

  • Alibaba preview

May 26 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.ALI.CRY.03

Ensure that ECS Disks are encrypted

New

 

 

 

  • Alibaba preview

D9.ALI.CRY.04

Ensure that ECS Virtual Machine's Disks are encrypted

New

 

 

 

  • Alibaba preview

May 19 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.NET.69

Inctance that have public image details

Removal

 

 

 

  • AWS CloudGuard Best Practices

D9.ALI.CRY.01

Ensure that 'Secure transfer required' is Enabled

New

 

 

 

  • Alibaba preview

D9.ALI.CRY.02

Ensure that OSS bucket server side encryption using KMS is enabled

New

 

 

 

  • Alibaba preview

D9.ALI.IAM.17

Ensure that OSS bucket is not anonymously or publicly accessible

New

 

 

 

  • Alibaba preview

D9.ALI.LOG.01

Ensure that logging is enabled for OSS buckets

New

 

 

 

  • Alibaba preview

May 10 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.IAM.06

Ensure that 'Number of methods required to reset' is set to '2'

Modification

  • Logic

  • User should have userCredentialRegistrationDetails.selfServicePasswordResetAuthMethods >1

  • User should have userCredentialRegistrationDetails.selfServicePasswordResetAuthMethods.length() >1

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.MON.27

Ensure that Activity Log Alert exists for Delete Policy Assignment

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.36

Ensure that Activity Log Alert Rule is activated for New/Updated SQL Servers Firewall Rules

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.37

Ensure that Activity Log Alert Rule is activated for New/Updated Network Security Groups

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.38

Ensure that Activity Log Alert Rule is activated for New/Updated Network Security Group Rules

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.39

Ensure that Activity Log Alert Rule is activated for New/Updated Security Solutions

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.41

Ensure that Activity Log Alert Rule is activated for Deleted SQL Servers Firewall Rules

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.42

Ensure that Activity Log Alert Rule is activated for Deleted Network Security Groups

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.43

Ensure that Activity Log Alert Rule is activated for Deleted Network Security Group Rules

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.44

Ensure that Activity Log Alert Rule is activated for Deleted Security Solutions

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.45

Ensure that Activity Log Alert Rule is activated for New/Updated Security Plicies

Removal

 

 

 

  • Azure CloudGuard Best Practices

 

 

April 5, 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.CRY.28

Ensure remote debugging has been disabled for your production Azure Functions

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.14

Enable App Service Authentication

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.15

Enable Incoming Client Certificates

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.16

Overly Permissive Scope Access

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.17

Overly Permissive Subscription Access (Owner over the whole Subscription)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.18

Overly Permissive Subscription Access (Contributor over the whole Subscription)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.19

Overly Permissive Subscription Access (User Access Administrator over the whole Subscription)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.20

Overly Permissive Directory Access (Global Administrator)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.21

Overly Permissive Directory Access (Application Administrator)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.22

Overly Permissive Directory Access (Privileged Role Administrator)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.23

Overly Permissive Directory Access (Cloud Application Administrator)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.24

Overly Permissive Directory Access (User Administrator)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.25

Overly Permissive Directory Access (Helpdesk Administrator)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.26

Overly Permissive Scope Access

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.27

Overly Permissive Subscription Access (Authorization over the whole Subscription)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.IAM.28

Overly Permissive Subscription Access (Full Access over the whole Subscription)

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.LOG.11

Ensure that Application Service Logs are Enabled for Containerized Function Apps

New

 

 

 

Azure CloudGuard Best Practices

D9.AZU.MON.35

Ensure that Health Check is enabled for your Function App

New

 

 

 

Azure CloudGuard Best Practices

D9.TF.AZU.NET.04

Ensure that RDP access is restricted from the internet

Modification

Logic

azurerm_network_security_group where security_rule with [ direction='Inbound' ] should not have ( security_rule with [ (destination_port_ranges contain ['3389']) and (protocol in ('Tcp','*')) and (access='Allow') and (source_port_range in('*', '0.0.0.0/0')) ] )

azurerm_network_security_group where security_rule with [ direction='Inbound' ] should not have ( security_rule with [ (destination_port_ranges contain ['3389'] or destination_port_range contain ['3389']) and (protocol in ('Tcp','*')) and (access='Allow') and (source_port_range in('*', '0.0.0.0/0')) ] )

Terraform Azure CIS Foundations

D9.TF.AZU.NET.05

Ensure that SSH access is restricted from the internet

Modification

Logic

azurerm_network_security_group where security_rule with [ direction='Inbound' ] should not have ( security_rule with [ (destination_port_ranges contain ['22']) and (protocol in ('Tcp','*')) and (access='Allow') and (source_port_range in('*', '0.0.0.0/0')) ] )

azurerm_network_security_group where security_rule with [ direction='Inbound' ] should not have ( security_rule with [ (destination_port_ranges contain ['22'] or destination_port_range contain ['22']) and (protocol in ('Tcp','*')) and (access='Allow') and (source_port_range in('*', '0.0.0.0/0')) ] )

Terraform Azure CIS Foundations

D9.GCP.IAM.02

Ensure that corporate login credentials are used instead of Gmail accounts

Modification

Name, Description, Remediation, References

GCP PCI-DSS 3.2
GCP NIST 800-53 Rev 4
GCP ISO 27001:2013
GCP HIPAA
GCP NIST CSF v1.1
GCP CloudGuard SOC2 based on AICPA TSC 2017
GCP CIS Foundations v. 1.0.0
GCP CSA CCM v.3.0.1
GCP CloudGuard Best Practices

D9.GCP.IAM.03

Ensure that multi-factor authentication is enabled for all non-service accounts

Modification

Description, Remediation

 

GCP HIPAA

D9.GCP.IAM.06

Ensure that multi-factor authentication is enabled for admin users

New

 

 

 

GCP CloudGuard Best Practices

D9.GCP.IAM.12

Avoid using pre-IAM basic (primitive) roles

 

 

 

 

GCP CloudGuard Best Practices

D9.GCP.IAM.15

Ensure permissions to impersonate a service account are not granted at project level

Modification

Name, Description, Remediation, References, Logic

GcpIamUser should not have roleNames contain [ $ in ('roles/iam.serviceAccountActor', 'roles/iam.serviceAccountUser', 'roles/iam.serviceAccountTokenCreator') ]

GcpIamPolicy should not have bindings contain-any [ role in ('roles/iam.workloadIdentityUser', 'roles/iam.serviceAccountUser', 'roles/iam.serviceAccountTokenCreator') ]

GCP CloudGuard Best Practices
GCP HIPAA

D9.GCP.IAM.18

Ensure that Separation of duties is enforced while assigning service account related roles to users

New

 

 

 

GCP CloudGuard Best Practices

D9.GCP.IAM.19

User did not log in the past 90 days

New

 

 

 

GCP CloudGuard Best Practices

D9.GCP.IAM.20

Suspended user account unused more then 6 months

New

 

 

 

GCP CloudGuard Best Practices

March 10, 2021

 

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.MON.26

Ensure that Activity Log Alert exists for Create Policy Assignment

New

 

 

 

Azure CIS Foundations v. 1.1.0
Azure CIS Foundations v. 1.2.0
Azure CIS Foundations v. 1.3.0

D9.AZU.MON.27

Ensure that Activity Log Alert exists for Delete Policy Assignment

New

 

 

 

Azure CIS Foundations v. 1.3.0

D9.AZU.MON.28

Ensure that Activity Log Alert exists for Create or Update Network Security Group

New

 

 

 

Azure CIS Foundations v. 1.1.0
Azure CIS Foundations v. 1.2.0
Azure CIS Foundations v. 1.3.0

D9.AZU.MON.29

Ensure that Activity Log Alert exists for Delete Network Security Group

New

 

 

 

Azure CIS Foundations v. 1.1.0
Azure CIS Foundations v. 1.2.0
Azure CIS Foundations v. 1.3.0

D9.AZU.MON.30

Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule

New

 

 

 

Azure CIS Foundations v. 1.1.0
Azure CIS Foundations v. 1.2.0
Azure CIS Foundations v. 1.3.0

D9.AZU.MON.31

Ensure that activity log alert exists for the Delete Network Security Group Rule

New

 

 

 

Azure CIS Foundations v. 1.1.0
Azure CIS Foundations v. 1.2.0
Azure CIS Foundations v. 1.3.0

D9.AZU.MON.32

Ensure that Activity Log Alert exists for Create or Update Security Solution

New

 

 

 

Azure CIS Foundations v. 1.1.0
Azure CIS Foundations v. 1.2.0
Azure CIS Foundations v. 1.3.0

D9.AZU.MON.33

Ensure that Activity Log Alert exists for Create or Update Security Solution

New

 

 

 

Azure CIS Foundations v. 1.1.0
Azure CIS Foundations v. 1.2.0
Azure CIS Foundations v. 1.3.0

D9.AZU.MON.34

Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule

New

 

 

 

Azure CIS Foundations v. 1.1.0
Azure CIS Foundations v. 1.2.0
Azure CIS Foundations v. 1.3.0

D9.GCP.IAM.09

Ensure that Cloud Storage bucket is not anonymously and/or publicly accessible

Modification

Remediation, reference

 

GCP PCI-DSS 3.2
GCP NIST 800-53 Rev 4
GCP HIPAA
GCP Dashboard System Ruleset
GCP ISO 27001:2013
GCP CIS Foundations v. 1.0.0
GCP NIST CSF v1.1
GCP CloudGuard Best Practices

D9.GCP.IAM.16

Storage bucket access control should be with uniform bucket-level access

New

 

 

 

GCP CloudGuard Best Practices

D9.GCP.IAM.17

Storage Bucket default ACL / ACL should not allow public access

New

 

 

 

GCP CloudGuard Best Practices

D9.GCP.LOG.01

Ensure that Cloud Storage bucket has usage logs enabled

Modification

Name, description, remediation, severity,reference

GCP CSA CCM v.3.0.1
GCP PCI-DSS 3.2
GCP NIST 800-53 Rev 4
GCP HIPAA
GCP Dashboard System Ruleset
GCP ISO 27001:2013
GCP CIS Foundations v. 1.0.0
GCP NIST CSF v1.1
GCP CloudGuard Best Practices

D9.GCP.IAM.04

Ensure that there are only GCP-managed service account keys for each service account

Modification

description,logic,remediation,reference

ServiceAccount should not have keys with [ managedBy = 'User' ]

ServiceAccount where name unlike '%CloudGuard%' or (name like '%CloudGuard%' and roles contain-any [not $ in ('roles/viewer', 'roles/iam.securityReviewer')]) should not have keys with [ managedBy = 'User' ]

GCP CIS Foundations v. 1.0.0
GCP HIPAA
GCP CloudGuard Best Practices

D9.GCP.IAM.05

Ensure that Service Account has no Admin privileges

Modification

Name, description,logic,remediation,reference

ServiceAccount should not have roles contain-any [($ like '%Admin') or ($ like '%admin') or $ in ('roles/owner', 'roles/editor') ]

ServiceAccount should not have roles contain-any [ ($ like '%admin') or $ in ('roles/owner', 'roles/editor') ]

GCP HIPAA
GCP CIS Foundations v. 1.0.0
GCP Dashboard System Ruleset
GCP CloudGuard Best Practices

D9.GCP.IAM.06

Ensure that IAM users are not assigned Service Account User role at project level

Removal

 

 

 

GCP CIS Foundations v. 1.0.0
GCP CloudGuard Best Practices

D9.GCP.IAM.11

Ensure that service accounts are not granted with permissions to use other service accounts or set iam policies

Modification

Name, description,logic,remediation,reference

ServiceAccount should not have roles contain [ 'roles/iam.serviceAccountAdmin' ] and roles contain [ 'roles/iam.serviceAccountUser' ]

ServiceAccount should not have roles contain-any [ $ like 'roles/iam.serviceAccount%' ] or roles contain-any [ $ like 'roles/iam.securityAdmin' ]

GCP CIS Foundations v. 1.0.0
GCP CloudGuard Best Practices

D9.GCP.IAM.12

Ensure that Separation of duties is enforced while assigning KMS related roles to users

Removal

 

 

 

GCP CIS Foundations v. 1.0.0
GCP CloudGuard Best Practices

March 7, 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.1019

IamUser with Admin or wide permissions without MFA enabled

 

 

 

 

 

D9.AZU.CRY.27

Ensure storage for critical data are encrypted with Customer Managed Key

 

 

 

 

 

D9.AWS.AS.02

S3 Buckets outside of Europe

 

 

 

 

 

D9.AZU.VLN.01

Ensure that Advanced Threat Protection (ATP) on a SQL server is set to 'Enabled'

 

 

 

 

 

D9.AZU.MON.25

Ensure that VA setting 'Also send email notifications to admins and subscription owners' is set for a SQL server

 

 

 

 

 

D9.AZU.LOG.10

Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server

 

 

 

 

 

D9.AZU.CRY.14

Ensure SQL server's TDE protector is encrypted with Customer-managed key

 

 

 

 

 

D9.AZU.CRY.18

Ensure that 'OS and Data' disks are encrypted with CMK

 

 

 

 

 

D9.AZU.CRY.26

Ensure that 'Unattached disks' are encrypted with CMK

 

 

 

 

 

February 16, 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.60

Ensure that Role names cannot be enumeratable

Modification

Logic

IamRole should not have name in('0','1','2','3','4','5','6','7','8','9','A','ADS','API','APIGateway','AWS','Aaron','Abram','Account','Adelia','Adell','Admin','Administrator','Agustin','Ai','Alert_Logic_Cloud_Defender','Alexa','AlexaForBusiness','Alfonzo','Ali','Alica','Alisia','Allan','Almeda','Alpha','Alvera','Amado','AmazonRedShift','Amberly','Amos','Analytics','Anderson','Anette','Angele','Angie','Annalisa','Anne','Annice','Antonetta','Antonia','Antwan','AppStream2','AppStream2.0','AppSync','Argelia','Argentina','Arnoldo','Artifact','Arvilla','Athena','Audit','AutoScaling','Avery','Ayanna','B','Bari','Bastion','Batch','Benton','Bethel','Billing','Bobette','Brandie','Brenton','Bret','Britt','Bruce','Bryan','Bryant','Brynn','Buddy','C','CF','CLI','Caitlin','Caleb','Carlotta','CertificateManager','Chauncey','Cheri','Chery','Chime','Chris','Cicely','Clark','Cloud9','CloudCheckr','CloudFormation','CloudFront','CloudHSM','CloudMGR','CloudSearch','CloudSploitRole','CloudTrail','CloudWatch','CodeBuild','CodeCommit','CodeDeploy','CodePipeline','CodeStar','Cognito','Coleman','Comprehend','Config','Configuration','Connect','Cordell','Coretta','Corrine','Curt','Curtis','D','DB','DBAdmin','DMS','DS','DSWebAppsScanningRole','Dane','Darnell','Darrel','Darrin','DataPipeline','DataScientist','DatabaseAdministrator','DatadogAWSIntegrationRole','Db','Debrah','DeepLens','Deetta','Default','Delores','Deloris','Demarcus','Demo','Dena','Denice','Denita','Dennis','Derick','Desirae','Dev','Developer','DeviceFarm','Dewey','Dick','Dino','DirectConnect','DirectoryService','Dirk','Docker','Domenic','Dominique','Donn','Dyan','DynamoDB','E','EBS','EC2','ECS','EFS','EKS','EMR','EMR-Test','EMR-test','EMR_Test','EMR_test','Eboni','Echo','Eddie','ElastiCache','ElasticTranscoder','ElasticsearchService','Elia','Elisabeth','Elsy','Emelda','Emely','Encryption','Erick','Ervin','Ester','Eugenia','Eugenie','External','F','Fabian','Fallon','Faye','Felton','Fernando','Fidel','Floyd','Frankie','FreeRTOS','G','Gala','GameLift','Gene','Georgie','Gertha','Gertie','Gia','Giuseppe','Glacier','Global','GlobalLog','Glue','Graham','Greengrass','Gregg','GuardDuty','H','Hacker','Haywood','Hedwig','Hilario','Hilda','Hoyt','I','IAM','IT','Ian','Ina','Inspector','Intern','IoT1-Click','IoT1Click','IoTAnalytics','IoTCore','IoTDeviceDefender','IoTDeviceManagement','J','Jacinto','Jackson','Jacque','Jade','Jammie','Janita','Jc','Jeanetta','Jenine','Jeremiah','Jewel','Joan','Joanie','Jodie','Joesph','Josue','Judson','Julee','Juliette','K','K8s','KVS','Kaci','Karine','Katy','Keith','Kenna','Kermit','Kiana','Kimiko','Kinesis','KinesisVideoStreams','Kirby','KochavaReadS3','Kops','Korey','Kristian','Kube','KubernetesNode','L','Lacey','Lady','Lakiesha','Lambda','Lang','Lanny','Lashandra','Lauren','Leatrice','Lenard','Leona','Les','Lex','Lightsail','Lillian','Linh','Linnie','Logger','Logging','Loggly_aws','Logs','Loni','Lucie','Lucius','Luke','M','ML','MQ','MachineLearning','Macie','Madeline','Malisa','Marcell','Marcos','Margery','Margrett','Maria','Maribel','Marin','Marlon','Marshall','Maryanna','Marylou','Master','Mathilda','Matthew','Mauricio','Mauro','Maximo','MediaConvert','MediaLive','MediaPackage','MediaStore','MediaTailor','Mee','Melania','Melany','Melody','Meridith','Mesos','Michale','Micheal','Michell','Mickie','MigrationHub','Mikel','Milford','Miquel','Mirna','Misc','Miscellaneous','MobileAnalytics','MobileHub','Mohamed','Molly','Monitor','Monitoring','Monroe','MtSecurityScan','MyRole','N','Natacha','Neida','Neil','Neptune','NetAdmin','NetAdministrator','NetworkAdmin','NetworkAdministrator','Nevada','NewRelic-Infrastructure-AWS-Integration','Ngoc','Nobuko','Norris','Numbers','Nyla','O','Odis','OktaSSO','Onie','OpsClarity-Access','OpsWorks','Orbitera','Orville','P','Palmer','Parker','PenTest','PenetrationTest','PenetrationTester','Pentest','Percy','Phil','Pierre','Pinpoint','Polly','Porsche','Porsha','PowerUser','Poweruser','Pusher','Q','QuickSight','R','RDS','Raeann','Ramona','Rancher','Randal','Randy','ReadOnly','Readonly','RedShift','RedlineAccess','Reggie','Regina','Reina','Rekognition','Renee','Reta','Rhona','Richard','Rickey','Rico','Rigoberto','Robbie','Robbin','Rocky','Roger','Role','Root','RootRole','Rosalind','Rosio','Route53','Royce','Ruben','Rueben','S','S3','SES','SMS','SNS','SQS','SSO','SWF','SageMaker','Salvador','Sammy','Scarlett','Scheduler','SecAudit','SecretsManager','SecurityAudit','See','Server','Service','Seth','Shakira','Shannon','Shaquana','Shara','Shared','Shelia','Shelley','Sherryl','Shield','Shon','Sidney','Silas','SimpleEmailService','SingleSign-On','SingleSignOn','Snowball','Son','Song','Soraya','Spark','Stackdriver','StepFunctions','Storage','StorageGateway','Sumerian','Support','Sylvester','Synthia','Syreeta','SysAdmin','SysAdministrator','SystemAdmin','SystemAdministrator','SystemsManager','T','Tanja','Task','TaskScheduler','Temp','Temporary','Teodoro','Terrilyn','Test','Testing','Thomasine','ThreatStackRole','Tia','Tiana','Timer','Tommie','Tonisha','Tory','Transcribe','Translate','Tresa','Trinidad','Truman','TrustedAdvisor','Tyisha','U','Ulysses','Uploader','Ursula','User','V','VPC','VPC_NAT','VPN','Valentine','Verona','W','WAF','Walter','Waltraud','Waylon','Werner','Wilma','Wilmer','WorkDocs','WorkMail','WorkSpaces','X','X-Ray','XRay','Y','Yahaira','Yer','Yolanda','Z','Zandra','a','aaron','abram','account','adelia','adell','adm','admin','administrator','ads','agustin','ai','alert_logic_cloud_defender','alertlogic','alexa','alexaforbusiness','alfonzo','ali','alica','alisia','allan','almeda','alpha','alvera','amado','amazonredshift','amberly','amos','analytics','anderson','anette','angele','angie','annalisa','anne','annice','antonetta','antonia','antwan','api','apigateway','appstream2','appstream2.0','appsync','argelia','argentina','arnoldo','artifact','arvilla','athena','audit','autoscaling','avery','aws','ayanna','b','bari','bastion','batch','benton','bethel','billing','bobette','bp-cloudhealth','brandie','brenton','bret','britt','bruce','bryan','bryant','brynn','buddy','bulletproof','c','caitlin','caleb','carlotta','cb-access','certificatemanager','cf','chauncey','cheri','chery','chime','chris','cicely','clark','cli','cloud9','cloudability','cloudbreak','cloudcheckr','cloudcraft','cloudformation','cloudfront','cloudhsm','cloudmgr','cloudsearch','cloudsploit','cloudsploitrole','cloudtrail','cloudwatch','codebuild','codecommit','codedeploy','codepipeline','codestar','cognito','coleman','comprehend','config','configuration','connect','cordell','coretta','corrine','curt','curtis','d','dane','darnell','darrel','darrin','databaseadministrator','datadog','datadogawsintegrationrole','datapipeline','datascientist','db','dbadmin','debrah','deeplens','deepsecurity','deetta','default','delores','deloris','demarcus','demo','dena','denice','denita','dennis','derick','desirae','dev','developer','devicefarm','dewey','dick','dino','directconnect','directoryservice','dirk','dms','docker','domenic','dominique','donn','ds','dswebappsscanningrole','dyan','dynamodb','dynatrace','e','eboni','ebs','ec2','echo','ecs','eddie','efs','eks','elasticache','elasticsearchservice','elastictranscoder','elia','elisabeth','elsy','emelda','emely','emr','emr-test','emr_test','encryption','erick','ervin','ester','eugenia','eugenie','external','f','fabian','fallon','faye','felton','fernando','fidel','floyd','frankie','freertos','freshservice','g','gala','gamelift','gene','georgie','gertha','gertie','gia','giuseppe','glacier','global','globallog','globus','glue','graham','greengrass','gregg','guardduty','h','hacker','haywood','hedwig','hilario','hilda','hoyt','i','iam','ian','ina','inspector','instaclustr','intern','iot1-click','iot1click','iotanalytics','iotcore','iotdevicedefender','iotdevicemanagement','it','j','jacinto','jackson','jacque','jade','jammie','janita','jc','jeanetta','jenine','jeremiah','jewel','joan','joanie','jodie','joesph','josue','judson','julee','juliette','k','k8s','kaci','karine','katy','keith','kenna','kermit','keyWatch','keywatch','kiana','kimiko','kinesis','kinesisvideostreams','kirby','kochava','kochavareads3','kops','korey','kristian','kube','kubernetes','kubernetesnode','kvs','l','lacey','lady','lakiesha','lambda','lang','lanny','lashandra','lauren','leatrice','lenard','leona','les','lex','lightsail','lillian','linh','linnie','logger','logging','loggly','loggly-role','loggly_aws','logs','loni','lucie','lucius','luke','m','machinelearning','macie','madeline','malisa','manage','management','management-admin','marcell','marcos','margery','margrett','maria','maribel','marin','marlon','marshall','maryanna','marylou','master','mathilda','matthew','mauricio','mauro','maximo','mediaconvert','medialive','mediapackage','mediastore','mediatailor','mediatemple','mee','melania','melany','melody','meridith','mesos','michale','micheal','michell','mickie','migrationhub','mikel','milford','miquel','mirna','misc','miscellaneous','ml','mobileanalytics','mobilehub','mohamed','molly','mongodb','monitor','monitoring','monroe','mq','mtsecurityscan','myMMSRole','myRole','mymmsrole','myrole','n','natacha','neida','neil','neptune','netadmin','netadministrator','networkadmin','networkadministrator','nevada','newrelic','newrelic-infrastructure-aws-integration','ngoc','nobuko','norris','numbers','nyla','o','odis','okta','oktasso','onie','opsclarity','opsclarity-access','opsworks','orbitera','orville','p','palmer','parker','penetrationtest','penetrationtester','pentest','percy','phil','pierre','pinpoint','polly','porsche','porsha','poweruser','pusher','q','quicksight','r','raeann','ramona','rancher','randal','randy','rds','readonly','redline','redline13','redlineaccess','redshift','reggie','regina','reina','rekognition','renee','reta','rhona','richard','rickey','rico','rigoberto','robbie','robbin','rocky','roger','role','roleWatch','rolewatch','root','rootRole','rootrole','rosalind','rosio','route53','royce','ruben','rueben','s','s3','s3stat','sa','sagemaker','salvador','sammy','scarlett','scheduler','secaudit','secretsmanager','securityaudit','see','server','service','ses','seth','shakira','shannon','shaquana','shara','shared','shelia','shelley','sherryl','shield','shon','sidney','signalfx','silas','simpleemailservice','singlesign-on','singlesignon','skeddly','sms','snowball','sns','son','song','soraya','spark','sqs','sso','stackdriver','stepfunctions','storage','storagegateway','sumerian','support','swf','sylvester','synthia','syreeta','sysadmin','sysadministrator','systemadmin','systemadministrator','systemsmanager','t','tanja','task','taskscheduler','temp','temporary','teodoro','teraproc','teraproc-access','terrilyn','test','testing','thomasine','threatstack','threatstackrole','tia','tiana','timer','tommie','tonisha','tory','transcribe','translate','tresa','trinidad','truman','trustedadvisor','tyisha','u','ulysses','uploader','ursula','user','v','valentine','verona','vmimport','vpc','vpc_nat','vpn','w','waf','walter','waltraud','waylon','werner','wilma','wilmer','workdocs','workmail','workspaces','workspaces_DefaultRole','workspaces_defaultrole','x','x-ray','xray','y','yahaira','yer','yolanda','z','zandra')

IamRole should not have name in($Enumeratable_Role_Names)

AWS CloudGuard Best Practices

D9.AZU.IAM.11

Ensure that multi-factor authentication is enabled for all non-privileged users

Removal

 

 

 

Azure CIS Foundations v. 1.2.0
Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.IAM.05

Ensure that multi-factor authentication is enabled for all privileged users

Removal

 

 

 

Azure Security Benchmark
Azure CIS Foundations v. 1.2.0
Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

February 10, 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.06

Ensure first access key is rotated every 90 days or less

Modification

Logic

IamUser where firstAccessKey.isActive='true' should not have firstAccessKey.lastRotated after(-90, 'days')

IamUser where firstAccessKey.isActive='true' should not have firstAccessKey.lastRotated before(-90, 'days')

AWS CIS Foundations v. 1.0.0
AWS CIS Foundations v. 1.1.0
AWS MAS TRM Framework
AWS CSA CCM v.3.0.1
AWS PCI-DSS 3.2
AWS CloudGuard Well Architected Framework
AWS NIST CSF v1.1
AWS NIST 800-53 Rev 4
AWS HIPAA
AWS CIS Foundations v. 1.2.0
AWS CloudGuard Best Practices
AWS NIST 800-171
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS GDPR Readiness
AWS ISO 27001:2013

D9.AWS.IAM.07

Ensure second access key is rotated every 90 days or less

Modification

Logic

IamUser where secondAccessKey.isActive='true' should not have secondAccessKey.lastRotated after(-90, 'days')

IamUser where secondAccessKey.isActive='true' should not have secondAccessKey.lastRotated before(-90, 'days')

AWS CIS Foundations v. 1.0.0
AWS CIS Foundations v. 1.1.0
AWS MAS TRM Framework
AWS CSA CCM v.3.0.1
AWS PCI-DSS 3.2
AWS CloudGuard Well Architected Framework
AWS NIST CSF v1.1
AWS NIST 800-53 Rev 4
AWS HIPAA
AWS CIS Foundations v. 1.2.0
AWS CloudGuard Best Practices
AWS NIST 800-171
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS GDPR Readiness
AWS ISO 27001:2013

February 03, 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

 

D9.AWS.IAM.06

Ensure first access key is rotated every 90 days or less

Modification

Logic

IamUser where createDate before(-90, 'days') and firstAccessKey.isActive='true' should have (firstAccessKey.lastRotated after(-90, 'days') and firstAccessKey.lastUsedDate > firstAccessKey.lastRotated )

IamUser where firstAccessKey.isActive='true' should not have firstAccessKey.lastRotated after(-90, 'days')

AWS CIS Foundations v. 1.0.0
AWS CIS Foundations v. 1.1.0
AWS MAS TRM Framework
AWS CSA CCM v.3.0.1
AWS PCI-DSS 3.2
AWS CloudGuard Well Architected Framework
AWS NIST CSF v1.1
AWS NIST 800-53 Rev 4
AWS HIPAA
AWS CIS Foundations v. 1.2.0
AWS CloudGuard Best Practices
AWS NIST 800-171
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS GDPR Readiness
AWS ISO 27001:2013

 

D9.AWS.IAM.07

Ensure second access key is rotated every 90 days or less

Modification

Logic

IamUser where createDate before(-90, 'days') and secondAccessKey.isActive='true' should have (secondAccessKey.lastRotated after(-90, 'days') and secondAccessKey.lastUsedDate > secondAccessKey.lastRotated )

IamUser where secondAccessKey.isActive='true' should not have secondAccessKey.lastRotated after(-90, 'days')

 

AWS CIS Foundations v. 1.0.0
AWS CIS Foundations v. 1.1.0
AWS MAS TRM Framework
AWS CSA CCM v.3.0.1
AWS PCI-DSS 3.2
AWS CloudGuard Well Architected Framework
AWS NIST CSF v1.1
AWS NIST 800-53 Rev 4
AWS HIPAA
AWS CIS Foundations v. 1.2.0
AWS CloudGuard Best Practices
AWS NIST 800-171
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS GDPR Readiness
AWS ISO 27001:2013

D9.AWS.IAM.60

Ensure that Role names cannot be enumeratable

New

 

 

 

AWS CloudGuard Best Practices

 

D9.AWS.VLN.05

nsure that public System Manager Documents include parameters

New

 

 

 

AWS CloudGuard Best Practices

 

January 27, 2021

Rule ID

 

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.VLN.02

Ensure that  ADS - 'Advanced Threat Protection types' (ATP)  is set to 'All'

New

 

 

 

Azure ISO 27001:2013
Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.VLN.01

Ensure that AZURE DEFENDER FOR SQL and Advanced Threat Protection (ATP) on a SQL server is set to 'On'

Modification

Remediation

 

 

Azure Security Benchmark
Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.MON.25

Ensure that ADS - ATP 'Administrator and subscription owner' is 'Enabled'

Remediation

Remediation

 

 

Azure ISO 27001:2013
Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.MON.24

Ensure that ADS - ATP 'Send alerts to' is set

Modification

Remediation

 

 

Azure ISO 27001:2013
Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.IAM.05

Ensure that multi-factor authentication is enabled for all privileged users

Modification

Logic, description

User should have userCredentialRegistrationDetails.isRegisterWithMfa=true

RoleAssignment should have (properties contain [getResource('User', principalId) contain [userCredentialRegistrationDetails.isRegisterWithMfa=true]] and properties contain [getResources('RoleDefinition',roleDefinitionId) contain [properties.roleName in ('Owner','Contributor')]])

Azure Security Benchmark
Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.IAM.11

Ensure that multi-factor authentication is enabled for all non-privileged users

New

 

 

 

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.IAM.12

Multi-Factor Authentication (MFA) should be enabled for all subscription accounts with read privileges to prevent a breach of accounts or resources.

New

 

 

 

Azure Security Benchmark

D9.AZU.IAM.13

Multi-Factor Authentication (MFA) should be enabled for all subscription accounts with write privileges to prevent a breach of accounts or resources.

New

 

 

 

Azure Security Benchmark

January 20, 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.CRY.46

Ensure that node-to-node encryption is enabled for Elasticsearch service

Modification

Logic

ElasticSearchDomain should have nodeToNodeEncryptionOptions.enabled=false

ElasticSearchDomain should not have nodeToNodeEncryptionOptions.enabled=false

AWS CloudGuard Best Practices

D9.AZU.MON.21

Ensure that 'Auditing' in SQL Servers is set to 'On'

New

 

 

 

Azure ISO 27001:2013

D9.AZU.MON.22

Ensure that 'Auditing' Retention on SQL Server is 'greater than 90 days'

New

 

 

 

Azure ISO 27001:2013

D9.AZU.MON.24

Ensure that ADS - ATP 'Send alerts to' is set

New

 

 

 

Azure ISO 27001:2013

D9.AZU.MON.25

Ensure that ADS - ATP 'Administrator and subscription owner' is 'Enabled'

New

 

 

 

Azure ISO 27001:2013

D9.TF.AWS.VLN.02

Ensure SSM Documents are not Publicly Exposed

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.CRY.53

Ensure Sensitive Parameters are Encrypted

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.NET.01

nsure no security groups allow ingress from 0.0.0.0/0 to SSH (TCP:22)

Modification

Logic

aws_security_group should not have ingress with [(from_port<=22 and to_port>=22) and (cidr_blocks contain ['0.0.0.0:0'] or ipv6_cidr_blocks contain ['::/0'])]

aws_security_group should not have ingress with [(from_port<=22 and to_port>=22) and (cidr_blocks contain ['0.0.0.0/0'] or ipv6_cidr_blocks contain ['::/0'])]

Terraform AWS CIS Foundations

D9.TF.AWS.NET.02

Ensure no security groups allow ingress from 0.0.0.0/0 to RDP (TCP:3389)

Modification

Logic

aws_security_group should not have ingress with [(from_port<=3389 and to_port>=3389) and (cidr_blocks contain ['0.0.0.0:0'] or ipv6_cidr_blocks contain ['::/0'])]

aws_security_group should not have ingress with [(from_port<=3389 and to_port>=3389) and (cidr_blocks contain ['0.0.0.0/0'] or ipv6_cidr_blocks contain ['::/0'])]

Terraform AWS CIS Foundations

D9.AWS.IAM.27

Ensure IAM policies that allow full '*:*' administrative privileges are not created

Modification

Logic

IamPolicy where (arn!='arn:aws:iam::aws:policy/AdministratorAccess' or arn!='arn:aws-us-gov:iam::aws:policy/AdministratorAccess') and document.Statement contain-any [Effect = 'Allow' and (Resource ='*' or Resource contain[$='*'] ) and (Action ='*' or Action contain[$='*']) ] should have users isEmpty() and roles isEmpty() and groups isEmpty()

IamPolicy where (arn!='arn:aws:iam::aws:policy/AdministratorAccess' and arn!='arn:aws-us-gov:iam::aws:policy/AdministratorAccess') and document.Statement contain-any [Effect = 'Allow' and (Resource ='*' or Resource contain[$='*'] ) and (Action ='*' or Action contain[$='*']) ] should have users isEmpty() and roles isEmpty() and groups isEmpty()

AWS CIS Foundations v. 1.1.0
AWS PCI-DSS 3.2
AWS MAS TRM Framework
AWS CloudGuard Well Architected Framework
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS NIST CSF v1.1
AWS CSA CCM v.3.0.1
AWS GDPR Readiness
WS NIST 800-53 Rev 4
AWS HIPAA
AWS ISO 27001:2013
AWS CIS Foundations v. 1.2.0
AWS CloudGuard Best Practices
AWS NIST 800-171
AWS Dashboard System Ruleset

January 04, 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.CRY.18

Ensure that 'OS disk' are encrypted

modification

Logic

VirtualMachine where isScaleSetVm=false should have disks contain-all [ encrypted=true ]

VirtualMachine should have (disks contain [getResource('Disk',name,'name') contain [properties.encryptionSettingsCollection.enabled=true]])

Azure Security Benchmark
Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0
Azure CloudGuard CheckUp

D9.GCP.CRY.02

Ensure 'Block Project-wide SSH keys' enabled for non-windows VM instances

modification

Logic

VMInstance where not (disks contain [ licenses contain [ $ like '%windows%' ] ]) should have metadata.items contain-any [ key='block-project-ssh-keys' and value='true']

VMInstance where not (disks contain [ licenses contain [ $ like '%windows%' ] ]) should have metadata.items contain-any [ key='block-project-ssh-keys' and value regexMatch /TRUE/i ]

GCP PCI-DSS 3.2
GCP CIS Foundations v. 1.0.0
GCP ISO 27001:2013
GCP NIST 800-53 Rev 4
GCP NIST CSF v1.1
GCP CloudGuard Best Practices

D9.GCP.CRY.03

Ensure oslogin is enabled for a Project

modification

Logic

Project should have metadata.items contain [ key='enable-oslogin' and value='TRUE' ]

Project should have metadata.items contain [ key='enable-oslogin' and value regexMatch /TRUE/i ]

GCP PCI-DSS 3.2
GCP CIS Foundations v. 1.0.0
GCP ISO 27001:2013
GCP NIST 800-53 Rev 4
GCP NIST CSF v1.1
GCP CloudGuard Best Practices
GCP HIPAA
GCP CloudGuard CheckUp

D9.GCP.CRY.04

Ensure oslogin is enabled for a Virtual Machine

modification

Logic

VMInstance should have metadata.items contain [ key='enable-oslogin' and value='TRUE' ]

VMInstance should have metadata.items contain [ key='enable-oslogin' and value regexMatch /TRUE/i ]

GCP PCI-DSS 3.2
GCP ISO 27001:2013
GCP NIST 800-53 Rev 4
GCP NIST CSF v1.1
GCP CloudGuard Best Practices

D9.GCP.IAM.01

Ensure that instances are not configured to use the default service account with full access to all Cloud APIs

modification

Logic

VMInstance should not have serviceAccounts contain [ scopes contain-any ['https://www.googleapis.com/auth/cloud-platform']]

VMInstance should not have serviceAccounts contain [ isDefaultServiceAccount=true and scopes contain [ 'https://www.googleapis.com/auth/cloud-platform' or 'cloud-platform' ] ]

GCP PCI-DSS 3.2
GCP Dashboard System Ruleset
GCP NIST 800-53 Rev 4
GCP ISO 27001:2013
GCP NIST CSF v1.1
GCP HIPAA
GCP CIS Foundations v. 1.0.0
GCP CSA CCM v.3.0.1
GCP CloudGuard Best Practices

D9.AZU.CRY.22

Key vault should have purge protection enabled

New

 

 

 

Azure Security Benchmark
Azure CloudGuard Best Practices

D9.AZU.IAM.10

Managed identity should be used in your Function App

New

 

 

 

Azure Security Benchmark
Azure CloudGuard Best Practices

D9.AZU.CRY.26

Unattached disks should be encrypted

New

 

 

 

Azure Security Benchmark
Azure CloudGuard Best Practices

D9.AZU.CRY.23

Function App should only be accessible over HTTPS

New

 

 

 

Azure Security Benchmark
Azure CloudGuard Best Practices

D9.AZU.CRY.24

Web Application should only be accessible over HTTPS

New

 

 

 

Azure Security Benchmark
Azure CloudGuard Best Practices

D9.AZU.CRY.25

Latest TLS version should be used in your Function App

New

 

 

 

Azure Security Benchmark
Azure CloudGuard Best Practices

December 22, 2020

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.VLN.04

Amazon System Manager Document should not be publicly available

New

 

 

 

AWS CloudGuard Best Practices

D9.AWS.CRY.53

Ensure that sensitive parameters are encrypted

New

 

 

 

AWS CloudGuard Best Practices

December 21, 2020

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.27

Ensure IAM policies that allow full '*:*' administrative privileges are not created

Modification

Logic

IamPolicy where arn!='arn:aws:iam::aws:policy/AdministratorAccess' and document.Statement contain-any [Effect = 'Allow' and (Resource ='*' or Resource contain[$='*'] ) and (Action ='*' or Action contain[$='*']) ] should have users isEmpty() and roles isEmpty() and groups isEmpty()

IamPolicy where (arn!='arn:aws:iam::aws:policy/AdministratorAccess' or arn!='arn:aws-us-gov:iam::aws:policy/AdministratorAccess') and document.Statement contain-any [Effect = 'Allow' and (Resource ='*' or Resource contain[$='*'] ) and (Action ='*' or Action contain[$='*']) ] should have users isEmpty() and roles isEmpty() and groups isEmpty()

AWS CIS Foundations v. 1.1.0
AWS PCI-DSS 3.2
AWS MAS TRM Framework
AWS CloudGuard Well Architected Framework
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS NIST CSF v1.1
AWS CSA CCM v.3.0.1
AWS GDPR Readiness
WS NIST 800-53 Rev 4
AWS HIPAA
AWS ISO 27001:2013
AWS CIS Foundations v. 1.2.0
AWS CloudGuard Best Practices
AWS NIST 800-171
AWS Dashboard System Ruleset

D9.AWS.CRY.02

ELB is setup with SSL for secure communication

Modification

Logic

ELB should have elbListeners contain [(sourceProtocol='HTTPS' and instanceProtocol='HTTPS')]

ELB should have elbListeners contain [(sourceProtocol='SSL' and instanceProtocol='SSL')]

AWS MAS TRM Framework
AWS CSA CCM v.3.0.1
AWS PCI-DSS 3.2
AWS CloudGuard Well Architected Framework
AWS NIST CSF v1.1
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS NIST 800-53 Rev 4
AWS CloudGuard Best Practices
AWS GDPR Readiness
AWS HIPAA
AWS ISO 27001:2013
AWS NIST 800-171

D9.AZU.IAM.09

Ensure that Register with Azure Active Directory is enabled on App Service

New

 

 

 

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.CRY.21

Ensure that 'HTTP Version' is the latest, if used to run the web app

New

 

 

 

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.VLN.01

Ensure that AZURE DEFENDER FOR SQL and Advanced Threat Protection (ATP) on a SQL server is set to 'On'

New

 

 

 

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.MON.24

Ensure that ADS - ATP 'Send alerts to' is set

New

 

 

 

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.MON.25

Ensure that ADS - ATP 'Administrator and subscription owner' is 'Enabled'

New

 

 

 

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

December 09, 2020

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.TF.AWS.CRY.44

Ensure Amazon SQS queues enforce Server-Side Encryption (SSE)

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.CRY.47

Ensure that Amazon SNS topics enforce Server-Side Encryption (SSE)

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.CRY.49

Ensure that AWS Secret Manager Secret rotation interval is smaller than 30 days

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.CRY.50

Ensure that AWS Secrets Manager service enforces data-at-rest encryption using KMS CMKs

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.CRY.51

Ensure that AWS SNS topic is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.CRY.52

Ensure that AWS SQS is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.IAM.56

Ensure that SQS policy won't allow all actions from all principals

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.IAM.57

Ensure SNS Topics aren't publicly accessible

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.IAM.58

Ensure SNS Topics administrative actions aren’t publicly executable

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.IAM.59

Ensure that VPC Endpoint policy won't allow all actions

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.MON.20

Ensure 'Auto accept shared attachments' is disabled, to avoid unknown cross account attachments to your Transit Gateway

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.NET.59

Ensure to define VPC associations and propagations yourself to keep track of all routes and connections to and from your Transit gateway

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.NET.61

Ensure Auto Scaling group being used with multiple Availability zones

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.NET.62

Ensure Network firewall delete protection enabled

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.NET.63

Ensure Network firewall have subnet change protection enabled

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.NET.64

Ensure Network firewall have policy change protection enabled

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.NET.65

Ensure Network firewall resides in a dedicated subnet

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.OPE.12

Ensure there is a Dead Letter Queue configured for each Amazon SQS queue

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.OPE.13

Ensure NAT gateway has a name tag

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.OPE.14

Ensure Transit gateway have a name tag

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.OPE.16

Ensure VPC Endpoint has a name tag

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.OPE.20

Ensure Auto Scaling group does not have suspended processes

New

 

 

 

Terraform AWS CIS Foundations

D9.TF.AWS.OPE.21

Ensure Auto Scaling group have scaling cooldown configured

New

 

 

 

Terraform AWS CIS Foundations

D9.AWS.CRY.44

Ensure Amazon SQS queues enforce Server-Side Encryption (SSE)

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.CRY.47

Ensure that Amazon SNS topics enforce Server-Side Encryption (SSE)

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.CRY.51

Ensure that AWS SNS topic is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.CRY.52

Ensure that AWS SQS is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.CRY.48

Ensure that AWS Secret Manager Secret rotation is enabled

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.CRY.49

Ensure that AWS Secret Manager Secret rotation interval is smaller than 30 days

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.CRY.50

Ensure that AWS Secrets Manager service enforces data-at-rest encryption using KMS CMKs

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.IAM.56

Ensure that SQS policy won't allow all actions from all principals

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.IAM.57

Ensure SNS Topics aren't publicly accessible

Modification

Logic, Reference, remediation

SnsTopic where policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*')] should not have policy.Statement contain [Condition.StringEquals isEmpty()]

SnsTopic where policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*')] should have policy.Statement contain [Condition]

AWS CloudGuard Best Practices

D9.AWS.IAM.58

Ensure SNS Topics administrative actions aren’t publicly executable

Modification

Logic, Reference, remediation

SnsTopic should not have policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*') and (Action contain-any ['SNS:GetTopicAttributes' or 'SNS:SetTopicAttributes' or 'SNS:AddPermission' or 'SNS:RemovePermission' or 'SNS:DeleteTopic' or 'SNS:ListSubscriptionsByTopic' or 'SNS:Publish'])]

SnsTopic should not have policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*') and (Action contain-any ['SNS:GetTopicAttributes' or 'SNS:SetTopicAttributes' or 'SNS:AddPermission' or 'SNS:RemovePermission' or 'SNS:DeleteTopic' or 'SNS:ListSubscriptionsByTopic']) and Condition isEmpty()]

AWS CloudGuard Best Practices

D9.AWS.IAM.59

Ensure that VPC Endpoint policy won't allow all actions

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.MON.17

Ensure NAT gateway state is available

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.MON.19

Ensure SNS topic have active subscriptions

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.MON.20

Ensure 'Auto accept shared attachments' is disabled, to avoid unknown cross account attachments to your Transit Gateway

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.NET.55

Ensure that the VPC Endpoint status is Available state

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.NET.59

Ensure to define VPC associations and propagations yourself to keep track of all routes and connections to and from your Transit gateway

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.NET.60

Ensure that NAT gateway is not associated in a private subnet

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.OPE.12

Ensure there is a Dead Letter Queue configured for each Amazon SQS queue

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.OPE.13

Ensure NAT gateway has a name tag

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.OPE.14

Ensure Transit gateway have a name tag

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.OPE.16

Ensure VPC Endpoint has a name tag

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.OPE.19

Ensure SQS Dead-letter queue is not configured to send messages to the source queue

Modification

Reference, remediation

 

 

AWS CloudGuard Best Practices

D9.AWS.VLN.02

Instances without Inspector runs in the last 30 days

Modification

Logic

Instance should have scanners.scans contain [source = 'Inspector' and startTime after(-30, 'days') and state in ('COMPLETED') ]

Instance where region in('eu_central_1','eu_west_1','eu_west_2','ap_south_1','us_west_1','us_east_1','us_east_2','us_west_2','ap_northeast_2','eu_north_1','ap_southeast_2','ap_northeast_1','us_gov_east_1','us_gov_west_1') should have scanners.scans contain [source = 'Inspector' and startTime after(-30, 'days') and state in ('COMPLETED') ]

AWS MAS TRM Framework
AWS CloudGuard Well Architected Framework
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS GDPR Readiness
AWS ISO 27001:2013
AWS NIST CSF v1.1
AWS NIST 800-53 Rev 4
AWS PCI-DSS 3.2
AWS CloudGuard Best Practices
AWS NIST 800-171

D9.AZU.CRY.12

Ensure that the expiry date is set on all keys

Modification

Logic

KeyVault where keys should have keys contain [ enabled=true and expires after(1,'days') ]

KeyVault where keys should have keys contain-none [ enabled=true and expires isEmpty() ] and keys contain-none [ enabled=true and expires before(1,'days') ]

Azure NIST 800-171
Azure CloudGuard Best Practices
Azure PCI-DSS 3.2
Azure CSA CCM v.3.0.1
Azure CIS Foundations v. 1.0.0
Azure HIPAA
Azure GDPR Readiness
Azure NIST 800-53 Rev 4
Azure CloudGuard SOC2 based on AICPA TSC 2017
Azure CIS Foundations v. 1.1.0
Azure ISO 27001:2013
Azure NIST CSF v1.1

D9.AZU.CRY.13

Ensure that the expiry date is set on all secrets

Modification

Logic

KeyVault where secrets should have secrets contain [ enabled=true and expires after(1,'days') ]

KeyVault where secrets should have secrets contain-none [ enabled=true and expires isEmpty() ] and secrets contain-none [ enabled=true and expires before(1,'days') ]

Azure NIST 800-171
Azure CloudGuard Best Practices
Azure PCI-DSS 3.2
Azure CSA CCM v.3.0.1
Azure CIS Foundations v. 1.0.0
Azure HIPAA
Azure GDPR Readiness
Azure NIST 800-53 Rev 4
Azure CloudGuard SOC2 based on AICPA TSC 2017
Azure CIS Foundations v. 1.1.0
Azure ISO 27001:2013
Azure NIST CSF v1.1

D9.AZU.LOG.04

Ensure server parameter 'log_duration' is set to 'ON' for PostgreSQL Database Server

Modification

Logic

PostgreSQL where logsConfiguration contain [ name='log_duration' ] should have logsConfiguration with [ value='ON' ]

PostgreSQL should have logsConfiguration contain [ name='log_duration' and value='on' ]

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.LOG.05

Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server

Modification

Logic

PostgreSQL should have logsConfiguration with [ value='ON'] where name='connection_throttling'

PostgreSQL should have logsConfiguration contain [ name='connection_throttling' and value='on' ]

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.LOG.09

Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server

Modification

Logic

PostgreSQL where logsConfiguration contain [ name='log_connections' ] should have logsConfiguration with [ value='on' ]

PostgreSQL should have logsConfiguration contain [ name='log_connections' and value='on' ]

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AWS.OPE.11

Ensure that the Auto Scaling Group has an associated ELB

Removal

 

 

 

AWS MAS TRM Framework
AWS CloudGuard Best Practices

December 07, 2020

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.02

Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

Reference

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.IAM.12

Ensure IAM password policy requires minimum length of 14 or greater

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.IAM.14

Ensure IAM password policy prevents password reuse

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.IAM.25

Ensure a support role has been created to manage incidents with AWS Support

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.LOG.04

Ensure AWS Config is enabled in all regions

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.LOG.05

Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.LOG.06

Ensure CloudTrail logs are encrypted at rest using KMS CMKs

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.LOG.07

Ensure CloudTrail is enabled in all regions

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.LOG.08

Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible

Reference

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.LOG.09

Ensure rotation for customer created CMKs is enabled

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

 

New - Moved to Logging

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.01

Ensure a log metric filter and alarm exist for unauthorized API calls

Logic, Reference, remediation

Modification

List<CloudTrail> should have items with [hasSNSSubscriber='true' and metricFilters with [filterPattern isFilterPatternEqual('{ ($.errorCode = UnauthorizedOperation) || ($.errorCode =AccessDenied) || ($.eventName!=HeadBucket) }')] length() > 0]

List<CloudTrail> should have items with [hasSNSSubscriber='true' and metricFilters with [filterPattern isFilterPatternEqual('{ ($.errorCode = UnauthorizedOperation) || ($.errorCode =AccessDenied) }')] length() > 0]

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.02

Ensure a log metric filter and alarm exist for Management Console sign-in without MFA

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.04

Ensure a log metric filter and alarm exist for IAM policy changes

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.05

Ensure a log metric filter and alarm exist for CloudTrail configuration changes

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.06

Ensure a log metric filter and alarm exist for AWS Management Console authentication failures

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.07

Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.08

Ensure a log metric filter and alarm exist for S3 bucket policy changes

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.09

Ensure a log metric filter and alarm exist for AWS Config configuration changes

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.10

Ensure a log metric filter and alarm exist for security group changes

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.11

Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.12

Ensure a log metric filter and alarm exist for changes to network gateways

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.13

Ensure a log metric filter and alarm exist for route table changes

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.MON.14

Ensure a log metric filter and alarm exist for VPC changes

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

D9.AWS.NET.04

Ensure the default security group of every VPC restricts all traffic

Reference, remediation

Modification

 

 

AWS CIS Foundations v. 1.3.0

December 02, 2020

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

 

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

 

D9.AWS.NET.66

Ensure Network firewall status is not FAILED

New

 

 

 

AWS CloudGuard Best Practices

D9.AZU.LOG.02

Ensure the log profile captures activity logs for all regions including global

Modification

Logic

LogProfile should have properties.locations length()>=34

LogProfile should have properties.locations length()>=65

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.AWS.DR.03

Ensure AWS RDS retention policy is at least 7 days

Modification

Logic

RDS should have backupRetentionPeriod>7

RDS should have backupRetentionPeriod>6

AWS CloudGuard Well Architected Framework
AWS MAS TRM Framework
AWS CloudGuard Best Practices

D9.AZU.NET.24

Ensure default network access rule for Storage Accounts is set to deny

Modification

Logic

StorageAccount should not have networkRuleSet.defaultAction='Allow' or networkRuleSet.ipRules contain-any [ ipAddressOrRange isPublic() ]

StorageAccount should not have networkRuleSet.defaultAction='Allow'

Azure CloudGuard Best Practices
Azure CIS Foundations v. 1.1.0

D9.GCP.NET.18

Ensure Kubernetes Engine Clusters legacy compute engine metadata endpoints are disabled

Modification

Logic

GkeCluster should not have nodePools contain [ config.metadata.disable-legacy-endpoints = true ]

GkeCluster should have nodePools contain [ config.metadata.disable-legacy-endpoints = true ]

GCP CloudGuard Containers Security
GCP CloudGuard Best Practices

D9.AWS.NET.30

ECS Cluster should have active services onlysure that the --repair-malformed-updates argument is set to false (API Server)

Removal

 

 

 

AWS CloudGuard Network Alerts
AWS CloudGuard CheckUp
AWS CloudGuard Best Practices
AWS CloudGuard Containers Security
AWS CloudGuard Well Architected Framework
AWS CloudGuard Network Alerts for default VPC components
AWS MAS TRM Framework

D9.AWS.NET.31

ECS Cluster should not have services without running tasks

Removal

 

 

 

AWS CloudGuard Network Alerts
AWS CloudGuard Best Practices
AWS CloudGuard Containers Security
AWS CloudGuard Well Architected Framework
AWS CloudGuard Network Alerts for default VPC components
AWS MAS TRM Framework

D9.AWS.NET.32

ECS Cluster instances must be placed in a VPC

Removal

 

 

 

AWS CloudGuard Network Alerts
AWS CloudGuard Best Practices
AWS CSA CCM v.3.0.1
AWS CloudGuard Containers Security
AWS CloudGuard Well Architected Framework
AWS CloudGuard Network Alerts for default VPC components
AWS MAS TRM Framework

D9.AWS.NET.45

Ensure AWS EC2 instances with public IP addresses block unrestricted traffic (0.0.0.0/0) to their subnets

Removal

 

 

 

AWS CloudGuard Best Practices
AWS CloudGuard Well Architected Framework
AWS MAS TRM Framework

D9.AWS.OPE.04

Ensure there is at least one task in the deployment in RUNNING status

Removal

 

 

 

AWS CloudGuard Best Practices
AWS CloudGuard Containers Security
AWS CloudGuard Well Architected Framework
AWS MAS TRM Framework

D9.AWS.IAM.39

S3 bucket should not allow put actions from all principals

Removal

 

 

 

AWS PCI-DSS 3.2
AWS CloudGuard Best Practices
AWS HIPAA
AWS CloudGuard S3 Bucket Security
AWS NIST 800-53 Rev 4
AWS ISO 27001:2013
AWS NIST CSF v1.1
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS CloudGuard Serverless Architectures Security
AWS CloudGuard Well Architected Framework
AWS NIST 800-171
AWS CCPA Framework
AWS MAS TRM Framework

October 02, 2020

Rules Removed

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.K8S.NET.09

Ensure that the --repair-malformed-updates argument is set to false (API Server)

High

CIS Kubernetes Benchmark v1.4.0
Kubernetes v.1.13 CloudGuard Best Practices
Kubernetes NIST.SP.800-190

D9.GCP.NET.05

Ensure there is an up to date Network Diagram for your cloud network

Medium

GCP NIST CSF v1.1
GCP ISO 27001:2013
GCP PCI-DSS 3.2
GCP NIST 800-53 Rev 4
GCP CSA CCM v.3.0.1
GCP CloudGuard Network Alerts
GCP CloudGuard Best Practices
GCP CloudGuard Network Security

New Rules

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.AWS.CRY.48

Ensure that AWS Secret Manager Secret rotation is enabled

High

AWS CloudGuard Best Practices

D9.AWS.NET.56

Ensure that Security Groups are not open to all

Medium

AWS CloudGuard Best Practices

D9.AWS.NET.57

Remove Unused Security Groups that are open to all

Medium

AWS CloudGuard Best Practices

D9.AWS.IAM.55

Ensure that Lambda Functions with overly permissive policies are not created

High

AWS CloudGuard Best Practices

D9.AWS.CRY.49

Ensure that AWS Secret Manager Secret rotation interval is smaller than 30 days

Medium

AWS CloudGuard Best Practices

D9.AWS.CRY.50

Ensure that AWS Secrets Manager service enforces data-at-rest encryption using KMS CMKs

High

AWS CloudGuard Best Practices

D9.AWS.NET.58

Ensure that AWS S3 Bucket block public ACLs is enabled at the account level or at the Bucket level

High

AWS CloudGuard Best Practices

Rule Changes

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.AWS.IAM.46

Ensure that Lambda Functions with Admin Privileges are not created

Low

name
severity
logic

AWS HIPAA
AWS CloudGuard Well Architected Framework
AWS CloudGuard Serverless Architectures Security
AWS CCPA Framework
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS NIST CSF v1.1
AWS CSA CCM v.3.0.1
AWS MAS TRM Framework
AWS GDPR Readiness
AWS PCI-DSS 3.2
AWS ISO 27001:2013
AWS NIST 800-53 Rev 4
AWS CloudGuard Best Practices

D9.AWS.NET.15

Remove Unused Security Groups

Medium

logic

AWS HIPAA
AWS CloudGuard Well Architected Framework
AWS Dashboard
AWS CloudGuard SOC2 based on AICPA TSC 2017
AWS NIST CSF v1.1
AWS CSA CCM v.3.0.1
AWS MAS TRM Framework
AWS PCI-DSS 3.2
AWS ISO 27001:2013
AWS NIST 800-53 Rev 4
AWS CloudGuard Network Alerts
AWS CloudGuard Best Practices
AWS CloudGuard Network Alerts for default VPC components

D9.AZU.NET.26

Ensure that RDP access is not permitted from the entire internet

High

name
logic

Azure CIS Foundations v. 1.1.0
Azure CloudGuard Best Practices

D9.AZU.NET.27

Ensure that SSH access is not permitted from the entire internet

High

name

Azure CIS Foundations v. 1.1.0
Azure CloudGuard Best Practices

D9.AWS.CRY.26.PCI

Ensure that ElastiCache for Redis version is compliant with AWS PCI DSS requirements

High

logic

AWS CloudGuard Well Architected Framework
AWS PCI-DSS 3.2

August 11, 2020

Rules Removed

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.AZU.AKS.04

Duplicate - Ensure that you are using authorized IP address ranges in order to secure access to the API server

High

Azure CloudGuard Network Alerts
Azure CloudGuard Best Practices

D9.GCP.NET.06

Deprecated - Unused firewall rules

Medium

GCP CloudGuard Network Alerts
GCP CloudGuard Best Practices

June 29, 2020

New Rules

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.AWS.LOG.17

Ensure AWS Elastic MapReduce (EMR) clusters capture detailed log data to Amazon S3

Medium

AWS Dome9 Best Practices

D9.AWS.CRY.43

Ensure in-transit and at-rest encryption is enabled for Amazon EMR clusters

High

AWS Dome9 Best Practices

D9.AWS.CRY.44

Ensure Amazon SQS queues enforce Server-Side Encryption (SSE)

High

AWS Dome9 Best Practices

D9.AWS.OPE.12

Ensure there is a Dead Letter Queue configured for each Amazon SQS queue

Low

AWS Dome9 Best Practices

D9.AWS.CRY.45

Ensure that encryption of data at rest is enabled on Elasticsearch domains

High

AWS Dome9 Best Practices

D9.AWS.CRY.46

Ensure that node-to-node encryption is enabled for Elasticsearch service

High

AWS Dome9 Best Practices

D9.AWS.NET.53

Enforce creation of ElasticSearch domains within your VPCs

Medium

AWS Dome9 Best Practices

D9.AWS.NET.54

Ensure that AWS EKS Cluster endpoint access is not public

Medium

AWS Dome9 Best Practices

D9.AWS.LOG.18

Ensure that AWS EKS Cluster control plane logging is enabled

Medium

AWS Dome9 Best Practices

D9.AWS.MON.16

Ensure that the configuration recorder is set to 'on' and set S3 Bucket and SNS topic as your delivery channel

High

AWS Dome9 Best Practices

D9.AWS.CRY.47

Ensure that Amazon SNS topics enforce Server-Side Encryption (SSE)

High

AWS Dome9 Best Practices

D9.AWS.LOG.19

Ensure that object-level logging is enabled for S3 buckets

High

AWS Dome9 Best Practices

D9.AWS.NET.55

Ensure that the VPC Endpoint status is Available state

High

AWS Dome9 Best Practices

D9.AZU.NET.30

Ensure that you are using authorized IP address ranges in order to secure access to the API server

High

Azure Dome9 Best Practices

D9.AZU.NET.31

Ensure that firewall rules are enabled and configured for Analysis services server

High

Azure Dome9 Best Practices

D9.AZU.IAM.05

Ensure that multi-factor authentication is enabled for all privileged users

High

Azure Dome9 Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.IAM.06

Ensure that 'Number of methods required to reset' is set to '2'

Low

Azure Dome9 Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.IAM.08

Ensure that there are no guest users

High

Azure Dome9 Best Practices
Azure CIS Foundations v. 1.1.0

D9.GCP.CRY.06

Ensure PubSub service is encrypted, with customer managed encryption keys.

High

GCP Dome9 Best Practices

D9.GCP.AS.06

Ensure that all the deployed cloud functions are in 'active' mode

Low

GCP Dome9 Best Practices

D9.GCP.MON.01

Ensure that at least one event trigger was configured in your function

High

GCP Dome9 Best Practices

Rule Changes

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.AWS.NET.35

Make sure that ALB is protected by a WAF

Medium

Logic

AWS Dome9 Best Practices
AWS Dome9 Well Architected Framework
AWS MAS TRM Framework

D9.AWS.IAM.42

S3 buckets should not grant any external privileges via ACL

High

Logic

AWS NIST 800-53 Rev 4
AWS ISO 27001:2013
AWS NIST CSF v1.1
AWS Dome9 Serverless Architectures Security
AWS Dome9 Best Practices
AWS Dome9 S3 Bucket Security
AWS Dome9 Serverless Architectures Security
AWS Dome9 SOC2 based on AICPA TSC 2017
AWS Dome9 Well Architected Framework
AWS MAS TRM Framework

D9.AWS.NET.20

Ensure that Static website hosting is disabled on your S3 bucket

High

Name and Description

AWS Dome9 Best Practices
AWS Dome9 Well Architected Framework
AWS Dome9 S3 Bucket Security
AWS Dome9 Network Alerts for default VPC components
AWS Dome9 Network AlertsAWS ISO 27001:2013
AWS Dome9 SOC2 based on AICPA TSC 2017
AWS MAS TRM Framework

D9.K8S.NET.20

Ensure that the --bind-address argument is set to 127.0.0.1 (Controller Manager)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.21

Ensure that the --bind-address argument is set to 127.0.0.1 (Scheduler)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.29

Ensure that the --anonymous-auth argument is set to false (API Server)

Low

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.04

Ensure that the --basic-auth-file argument is not set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.05

Ensure that the --insecure-allow-any-token argument is not set (API Server)

Low

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.04

Ensure that the --kubelet-https argument is set to true (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.06

Ensure that the --insecure-bind-address argument is not set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.07

Ensure that the --insecure-port argument is set to 0 (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.08

Ensure that the --secure-port argument is not set to 0 (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.05

Ensure that the --profiling argument is set to false (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.09

Ensure that the --repair-malformed-updates argument is set to false (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.01

Ensure that the admission control plugin AlwaysAdmit is not set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.10

Ensure that the admission control plugin AlwaysPullImages is set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.11

Ensure that the admission control plugin NamespaceLifecycle is set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.LOG.01

Ensure that the --audit-log-path argument is set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.LOG.02

Ensure that the --audit-log-maxage argument is set to 30 or as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.LOG.03

Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.LOG.04

Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.12

Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.05

Ensure that the --token-auth-file parameter is not set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.06

Ensure that the --kubelet-certificate-authority argument is set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.07

Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.MON.02

Ensure that the --service-account-lookup argument is set to true (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.08

Ensure that the admission control plugin PodSecurityPolicy is set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.OPE.03

Ensure that the --service-account-key-file argument is set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.06

Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.MON.03

Ensure that the admission control plugin ServiceAccount is set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.07

Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.08

Ensure that the --client-ca-file argument is set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.09

Ensure that the --etcd-cafile argument is set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.13

Ensure that the --authorization-mode argument is set to Node (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.14

Ensure that the admission control plugin NodeRestriction is set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.15

Ensure that the admission control plugin EventRateLimit is set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.LOG.05

Ensure that the AdvancedAuditing argument is not set to false (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.16

Ensure that the --request-timeout argument is set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.09

Ensure that the --authorization-mode argument includes RBAC (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.10

Ensure that the --profiling argument is set to false (Scheduler)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.17

Ensure that the --address argument is set to 127.0.0.1 (Scheduler)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.11

Ensure that the --terminated-pod-gc-threshold argument is set as appropriate (Controller Manager)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.12

Ensure that the --profiling argument is set to false (Controller Manager)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.13

Ensure that the --use-service-account-credentials argument is set to true (Controller Manager)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.10

Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.14

Ensure that the --root-ca-file argument is set as appropriate (Controller Manager)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.11

Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.18

Ensure that the --address argument is set to 127.0.0.1 (Controller Manager)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.12

Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.13

Ensure that the --client-cert-auth argument is set to true (etcd)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.14

Ensure that the --auto-tls argument is not set to true (etcd)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.15

Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.16

Ensure that the --peer-client-cert-auth argument is set to true (etcd)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.17

Ensure that the --peer-auto-tls argument is not set to true (etcd)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.NET.19

Ensure that the admission control plugin DenyEscalatingExec is set (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.CRY.15

Ensure that the --experimental-encryption-provider-config argument is set as appropriate (API Server)

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

May 19, 2020

New Rules

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.K8S.IAM.32

Ensure that the cluster-admin role is only used where required (RBAC)

Low

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.33

Minimize access to secrets (RBAC)

Low

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.34

Minimize wildcard use in Roles and ClusterRoles (RBAC)

Low

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.35

Minimize access to create pods (RBAC)

Low

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.36

Ensure that default service accounts are not actively used. (RBAC)

Medium

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

D9.K8S.IAM.37

Ensure that Service Account Tokens are only mounted where necessary (RBAC)

Low

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190
CIS Kubernetes Benchmark v1.5.1

Rule Changes

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.AWS.IAM.53

Ensure AWS IAM policies do not grant 'assume role' permission across all services

High

Logic

AWS Dome9 Best Practices
AWS Dome9 Well Architected Framework

May 12, 2020

New Rules

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.K8S.LOG.05

Ensure that the --audit-log-path argument is set (API Server)

High

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.NET.17

Ensure that the --bind-address argument is set to 127.0.0.1 (Controller Manager)

High

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.NET.18

Ensure that the --bind-address argument is set to 127.0.0.1 (Scheduler)

High

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.20

Minimize the admission of containers wishing to share the host network namespace (PSP)

High

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.21

Minimize the admission of containers wishing to share the host process ID namespace (PSP)

High

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.22

Minimize the admission of containers with allowPrivilegeEscalation (PSP)

High

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.23

Minimize the admission of privileged containers (PSP)

Medium

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.24

Minimize the admission of root containers (PSP)

Medium

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.25

Create administrative boundaries between resources using namespaces

Low

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.26

Ensure that the --anonymous-auth argument is set to false (API Server)

Low

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.29

Ensure that the seccomp profile is set to docker/default in your pod definitions

Low

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.27

Minimize the admission of containers with the NET_RAW capability (PSP)

Low

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.K8S.IAM.28

The default namespace should not be used

Low

CIS Kubernetes Benchmark v1.5.0
Kubernetes NIST.SP.800-190
Kubernetes Dome9 Best Practices

D9.AWS.CRY.42

Ensure that the Viewer Protocol policy is compliant to only use the HTTPS protocol

High

AWS Dome9 Best Practices

D9.GCP.NET.23

Ensure that you have an authorized network when connecting directly to a Cloud SQL instance on a Public IP

High

GCP Dome9 Best Practices

D9.GCP.DR.01

Ensure that auto backup is enabled for your Cloud SQL instance

High

GCP Dome9 Best Practices

D9.GCP.CRY.07

Ensure to use SSL/TLS certificates to encrypt data when using Public IP on your Cloud SQL instance

High

GCP Dome9 Best Practices

D9.GCP.CRY.06

Ensure to have customer managed encryption keys(CMEK) to manage permissions

High

GCP Dome9 Best Practices

D9.AZU.AKS.03

Ensure that the pod security policy is enabled in your AKS cluster

High

Azure Dome9 Best Practices

D9.AZU.AKS.04

Ensure that you are using authorized IP address ranges in order to secure access to the API server

High

Azure Dome9 Best Practices

D9.AZU.AKS.05

Ensure that a network policy is in place to secure traffic between pods

High

Azure Dome9 Best Practices

Rule Changes

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.K8S.OPE.06

Apply Security Context to Your Pods and Containers

High

Severity

CIS Kubernetes Benchmark v1.4.0
Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190 [PREVIEW]

D9.K8S.IAM.19

Do not admit root containers

High

Severity

CIS Kubernetes Benchmark v1.4.0
Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190 [PREVIEW]

D9.K8S.IAM.20

Ensure that the seccomp profile is set to docker/default in your pod definitions

High

Severity

CIS Kubernetes Benchmark v1.4.0
Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190 [PREVIEW]

D9.AZU.AKS.01

Ensure that Container Registry has locks

High

Name


Azure Dome9 Best Practices

D9.AZU.NET.01

Ensure that SQL server access is restricted from the internet

High

Name

Azure Dome9 Network Alerts
Azure Dome9 Best Practices
Azure CIS Foundations v. 1.0.0
Azure PCI-DSS 3.2
Azure NIST 800-53 Rev 4
Azure CSA CCM v.3.0.1
Azure ISO 27001:2013
Azure NIST CSF v1.1
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure HIPAA
Azure CIS Foundations v. 1.1.0
Azure Dome9 Network Security Alerts

D9.GCP.NET.03

Asset does not contain a security tag

Medium

Logic

GCP PCI-DSS 3.2
GCP NIST 800-53 Rev 4
GCP ISO 27001:2013
GCP NIST CSF v1.1
GCP Dome9 Network Alerts
GCP Dome9 Best Practices
GCP Dome9 Network Security

D9.AZU.LOG.07

Ensure that a Log Profile exists

High

Remediation

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AZU.LOG.02

Ensure the log profile captures activity logs for all regions including global

High

Remediation

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AZU.LOG.08

Ensure audit profile captures all the activities

Medium

Remediation

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AZU.LOG.01

Ensure that Activity Log Retention is set 365 days or greater

Medium

Remediation

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AZU.CRY.18

Ensure that 'OS disk' are encrypted

Medium

Logic

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AZU.DR.03

Ensure that Azure Virtual Machine is assigned to an availability set

Medium

Logic

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AZU.NET.07

Ensure that at least one Network Security Group is attached to all VMs and subnets that are public

High

Logic

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AWS.CRY.55

Ensure that IamGroup does not have Inline policies

Medium

RuleID

AWS Dome9 Best Practices

D9.AWS.DR.04

Ensure Amazon DynamoDB tables have continuous backups enabled

High

Logic and Remediation

AWS Dome9 Well Architected Framework

D9.AWS.IAM.53

Ensure AWS IAM policies do not grant 'assume role' permission across all services

High

Logic

AWS Dome9 Well Architected Framework
AWS Dome9 Best Practices

D9.AZU.CRY.08

Ensure that 'Storage service encryption' is enabled for the File Service

High

Description

Azure HIPAA
Azure CIS Foundations v. 1.0.0
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure CSA CCM v.3.0.1
Azure ISO 27001:2013
Azure GDPR Readiness
Azure PCI-DSS 3.2
Azure NIST 800-53 Rev 4
Azure Dome9 Best Practices

D9.K8S.IAM.18

Ensure that Containers are not running in privileged mode

High

Logic

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190

D9.K8S.IAM.21

Ensure that the seccomp profile is set to runtime/default in your pod definitions

Low

 

CIS Kubernetes Benchmark v1.4.0
Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190

D9.AWS.NET.46

Ensure AWS NAT Gateways are being utilized instead of the default route

Medium

Logic

AWS Dome9 Well Architected Framework
AWS Dome9 Best Practices

Rules Removed

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.AWS.CRY.39

Ensure Amazon DynamoDB tables enforce Server-Side Encryption (SSE)

High

AWS Dome9 Well Architected Framework

D9.AZU.MON.02-Deprecated

Ensure that 'Auditing' is enabled for Azure SQL Database

Medium

Azure HIPAA
Azure CIS Foundations v. 1.0.0
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure CSA CCM v.3.0.1
Azure ISO 27001:2013
Azure GDPR Readiness
Azure PCI-DSS 3.2
Azure NIST CSF v1.1
Azure NIST 800-53 Rev 4
Azure Dome9 Best Practices

D9.AZU.MON.05 - Deprecated

Ensure that 'Send alerts to' is enabled for Azure SQL Database

Medium

Azure HIPAA
Azure CIS Foundations v. 1.0.0
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure CSA CCM v.3.0.1
Azure ISO 27001:2013
Azure GDPR Readiness
Azure PCI-DSS 3.2
Azure NIST CSF v1.1
Azure NIST 800-53 Rev 4
Azure Dome9 Best Practices

D9.AZU.MON.06 - Deprecated

Ensure that 'Email service and co-administrators' is 'Enabled' for Azure SQL Database

Low

Azure HIPAA
Azure CIS Foundations v. 1.0.0
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure CSA CCM v.3.0.1
Azure ISO 27001:2013
Azure GDPR Readiness
Azure PCI-DSS 3.2
Azure NIST CSF v1.1
Azure NIST 800-53 Rev 4
Azure Dome9 Best Practices

D9.AZU.MON.07 - Deprecated

Ensure that 'Auditing' Retention is 'greater than 90 days' for Azure SQL Database

Low

Azure HIPAA
Azure CIS Foundations v. 1.0.0
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure CSA CCM v.3.0.1
Azure ISO 27001:2013
Azure GDPR Readiness
Azure PCI-DSS 3.2
Azure NIST CSF v1.1
Azure NIST 800-53 Rev 4
Azure Dome9 Best Practices

D9.K8S.CRY.16 - Deprecated

Ensure that there are no services with Port 80 (HTTP) open on the node port

High

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190

D9.K8S.OPE.05 - Deprecated

Ensure there are no nodes with kubelet version under 1.11

High

Kubernetes v.1.13 Dome9 Best Practices
Kubernetes NIST.SP.800-190

D9.AZU.MON.20 - Deprecated

Ensure ASC Default policy setting "Monitor SQL Encryption" is not "Disabled"

Medium

Azure Dome9 Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.MON.19 - Deprecated

Ensure ASC Default policy setting "Monitor SQL Auditing" is not "Disabled"

Medium

Azure Dome9 Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.MON.16 - Deprecated

Ensure ASC Default policy setting "Monitor Storage Blob Encryption" is not "Disabled"

Medium

Azure Dome9 Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.MON.13 - Deprecated

Ensure ASC Default policy setting "Monitor Web Application Firewall" is not "Disabled"

Medium

Azure Dome9 Best Practices
Azure CIS Foundations v. 1.1.0

D9.AZU.MON.12 - Deprecated

Ensure ASC Default policy setting "Monitor Network Security Groups" is not "Disabled"

Medium

Azure Dome9 Best Practices
Azure CIS Foundations v. 1.1.0

 

February 04, 2020

Rule Changes

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.K8S.NET.20

Ensure pods outside of kube-system do not have access to node volume

High

Logic

Kubernetes Best Practices
Kubernetes NIST 800-190

D9.AWS.IAM.32

S3 bucket should not have writable permissions from anonymous users

High

Remediation

AWS NIST 800-53 Rev 4
AWS NIST CSF v1.1
AWS PCI-DSS 3.2
AWS HIPAA
AWS Dome9 Best Practices
AWS Dome9 S3 Bucket Security
AWS ISO 27001:2013
AWS Dome9 Serverless Architectures Security
AWS Dome9 SOC2 based on AICPA TSC 2017
AWS Dome9 Well Architected Framework

D9.AWS.IAM.34

S3 bucket should not have world-readable permissions from anonymous users

High

Remediation

AWS NIST 800-53 Rev 4
AWS NIST CSF v1.1
AWS PCI-DSS 3.2
AWS HIPAA
AWS Dome9 Best Practices
AWS Dome9 S3 Bucket Security
AWS ISO 27001:2013
AWS Dome9 Serverless Architectures Security
AWS Dome9 SOC2 based on AICPA TSC 2017
AWS Dome9 Well Architected Framework

D9.AZU.NET.27

Ensure that SSH access is restricted from the internet

High

Logic

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

New Rules

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.GCP.CRY.05

Use customer-managed encryption keys (CMEK) for BigQuery to control encryption
Use Cloud KMS keys to protect your data in BigQuery also known as AES-256 keys

Medium

GCP Dome9 Best Practices
GCP PCI-DSS 3.2
GCP NIST 800-53 Rev 4
GCP NIST CSF v1.1
GCP ISO 27001:2013
GCP CIS Foundations v. 1.0.0

D9.AWS.OPE.11

Ensure that the Auto Scaling Group has an associated ELB

Medium

AWS Dome9 Best Practices

D9.AWS.CRY.40

Ensure that all the expired Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates managed by AWS Certificate Manager are removed in order to adhere to Amazon Security Best Practices.

Medium

AWS Dome9 Best Practices

D9.AZU.CRY.18

Ensure that 'OS disk' are encrypted

Medium

Azure CIS Foundations v. 1.0.0
Azure Dome9 Best Practices

D9.AWS.CRY.55

Ensure that IamGroup does not have Inline policies

Medium

AWS Dome9 Best Practices

November 29, 2019

Rule Changes

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.AWS.NET.06

Ensure S3 buckets are not publicly accessible

High

Logic

AWS NIST 800-53 Rev 4
AWS NIST CSF v1.1
AWS PCI-DSS 3.2
AWS CSA CCM v.3.0.1
AWS HIPAA
AWS Dome9 Best Practices
AWS Dome9 S3 Bucket Security
AWS Dome9 Network Alerts
AWS Dome9 Network Alerts for default VPC components
AWS ISO 27001:2013
AWS Dome9 Serverless Architectures Security
AWS Dome9 SOC2 based on AICPA TSC 2017

D9.AWS.NET.46

Ensure AWS NAT Gateways are being utilized instead of the default route

Medium

Name

AWS Dome9 Best Practices

New Rules

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.GCP.OPE.01

Ensure auto upgrades for an existing node pool

High

GCP Dome9 Best Practices

GCP Dome9 Containers Security

October 24, 2019

Rule Changes

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.AZU.NET.25

Ensure 'Trusted Microsoft Services' is enabled for Storage Account access

High

logic

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AZU.LOG.01

Ensure that Activity Log Retention is set 365 days or greater

Medium

logic

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AZU.CRY.16

Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)

Medium

logic

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AWS.IAM.27

Ensure IAM policies that allow full "*:*" administrative privileges are not created

High

logic

AWS CIS Foundations v. 1.2.0
AWS HIPAA
AWS Dome9 Hygiene Scan
AWS ISO 27001:2013
AWS CSA CCM v.3.0.1
AWS PCI-DSS 3.2
AWS NIST 800-53 Rev 4
AWS NIST CSF v1.1
AWS Dome9 SOC2 based on AICPA TSC 2017
AWS Dome9 Best Practices
AWS GDPR Readiness
AWS CIS Foundations v. 1.1.0

D9.AWS.MON.10

Ensure a log metric filter and alarm exist for security group changes

Medium

logic

AWS CIS Foundations v. 1.2.0
AWS Dome9 Hygiene Scan
AWS ISO 27001:2013
AWS CSA CCM v.3.0.1
AWS PCI-DSS 3.2
AWS NIST 800-53 Rev 4
AWS NIST CSF v1.1
AWS Dome9 SOC2 based on AICPA TSC 2017
AWS Dome9 Best Practices
AWS GDPR Readiness
AWS CIS Foundations v. 1.1.0

D9.AWS.MON.08

Ensure a log metric filter and alarm exist for S3 bucket policy changes

Medium

logic

AWS CIS Foundations v. 1.2.0
AWS HIPAA
AWS Dome9 S3 Bucket Security
AWS Dome9 Hygiene Scan
AWS ISO 27001:2013
AWS CSA CCM v.3.0.1
AWS PCI-DSS 3.2
AWS NIST 800-53 Rev 4
AWS NIST CSF v1.1
AWS Dome9 SOC2 based on AICPA TSC 2017
AWS Dome9 Best Practices
AWS GDPR Readiness
AWS Dome9 Serverless Architectures Security
AWS CIS Foundations v. 1.1.0

D9.AWS.CRY.17

Use encrypted connection between CloudFront and origin server

High

logic

AWS HIPAA
AWS Dome9 Hygiene Scan
AWS ISO 27001:2013
AWS CSA CCM v.3.0.1
AWS PCI-DSS 3.2
AWS NIST 800-53 Rev 4
AWS NIST CSF v1.1
AWS Dome9 SOC2 based on AICPA TSC 2017
AWS Dome9 Best Practices

 

New Rules

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.AWS.NET.AG6.Instance.23.TCP

Public Instance with service 'Telnet' (TCP:23) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.Instance.445.TCP

Public Instance with service 'Microsoft-DS' (TCP:445) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.Instance.53.UDP

Public Instance with service 'DNS' (UDP:53) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ELB.23.TCP

Public ELB with service 'Telnet' (TCP:23) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ELB.445.TCP

Public ELB with service 'Microsoft-DS' (TCP:445) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ELB.53.UDP

Public ELB with service 'DNS' (UDP:53) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.NetworkLoadBalancer.23.TCP

Public NetworkLoadBalancer with service 'Telnet' (TCP:23) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.NetworkLoadBalancer.445.TCP

Public NetworkLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.NetworkLoadBalancer.53.UDP

Public NetworkLoadBalancer with service 'DNS' (UDP:53) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ApplicationLoadBalancer.23.TCP

Public ApplicationLoadBalancer with service 'Telnet' (TCP:23) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ApplicationLoadBalancer.445.TCP

Public ApplicationLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ApplicationLoadBalancer.53.UDP

Public ApplicationLoadBalancer with service 'DNS' (UDP:53) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.Instance.5500.TCP

Public Instance with service 'VNC Listener' (TCP:5500) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.Instance.5900.TCP

Public Instance with service 'VNC Server' (TCP:5900) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ELB.5500.TCP

Public ELB with service 'VNC Listener' (TCP:5500) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ELB.5900.TCP

Public ELB with service 'VNC Server' (TCP:5900) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.NetworkLoadBalancer.5500.TCP

Public NetworkLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.NetworkLoadBalancer.5900.TCP

Public NetworkLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ApplicationLoadBalancer.5500.TCP

Public ApplicationLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG6.ApplicationLoadBalancer.5900.TCP

Public ApplicationLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to the entire internet

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.Instance.23.TCP

Public Instance with service 'Telnet' (TCP:23) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.Instance.445.TCP

Public Instance with service 'Microsoft-DS' (TCP:445) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.Instance.53.UDP

Public Instance with service 'DNS' (UDP:53) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ELB.23.TCP

Public ELB with service 'Telnet' (TCP:23) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ELB.445.TCP

Public ELB with service 'Microsoft-DS' (TCP:445) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ELB.53.UDP

Public ELB with service 'DNS' (UDP:53) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.NetworkLoadBalancer.23.TCP

Public NetworkLoadBalancer with service 'Telnet' (TCP:23) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.NetworkLoadBalancer.445.TCP

Public NetworkLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.NetworkLoadBalancer.53.UDP

Public NetworkLoadBalancer with service 'DNS' (UDP:53) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ApplicationLoadBalancer.23.TCP

Public ApplicationLoadBalancer with service 'Telnet' (TCP:23) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ApplicationLoadBalancer.445.TCP

Public ApplicationLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ApplicationLoadBalancer.53.UDP

Public ApplicationLoadBalancer with service 'DNS' (UDP:53) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.Instance.5500.TCP

Public Instance with service 'VNC Listener' (TCP:5500) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.Instance.5900.TCP

Public Instance with service 'VNC Server' (TCP:5900) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ELB.5500.TCP

Public ELB with service 'VNC Listener' (TCP:5500) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ELB.5900.TCP

Public ELB with service 'VNC Server' (TCP:5900) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.NetworkLoadBalancer.5500.TCP

Public NetworkLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.NetworkLoadBalancer.5900.TCP

Public NetworkLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ApplicationLoadBalancer.5500.TCP

Public ApplicationLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG7.ApplicationLoadBalancer.5900.TCP

Public ApplicationLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to a wide public network

High

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.Instance.23.TCP

Public Instance with service 'Telnet' (TCP:23) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.Instance.445.TCP

Public Instance with service 'Microsoft-DS' (TCP:445) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.Instance.53.UDP

Public Instance with service 'DNS' (UDP:53) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ELB.23.TCP

Public ELB with service 'Telnet' (TCP:23) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ELB.445.TCP

Public ELB with service 'Microsoft-DS' (TCP:445) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ELB.53.UDP

Public ELB with service 'DNS' (UDP:53) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.NetworkLoadBalancer.23.TCP

Public NetworkLoadBalancer with service 'Telnet' (TCP:23) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.NetworkLoadBalancer.445.TCP

Public NetworkLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.NetworkLoadBalancer.53.UDP

Public NetworkLoadBalancer with service 'DNS' (UDP:53) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ApplicationLoadBalancer.23.TCP

Public ApplicationLoadBalancer with service 'Telnet' (TCP:23) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ApplicationLoadBalancer.445.TCP

Public ApplicationLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ApplicationLoadBalancer.53.UDP

Public ApplicationLoadBalancer with service 'DNS' (UDP:53) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.Instance.5500.TCP

Public Instance with service 'VNC Listener' (TCP:5500) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.Instance.5900.TCP

Public Instance with service 'VNC Server' (TCP:5900) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ELB.5500.TCP

Public ELB with service 'VNC Listener' (TCP:5500) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ELB.5900.TCP

Public ELB with service 'VNC Server' (TCP:5900) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.NetworkLoadBalancer.5500.TCP

Public NetworkLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.NetworkLoadBalancer.5900.TCP

Public NetworkLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ApplicationLoadBalancer.5500.TCP

Public ApplicationLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG8.ApplicationLoadBalancer.5900.TCP

Public ApplicationLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to a small public network

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.Instance.23.TCP

Instance with service 'Telnet' (TCP:23) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.Instance.445.TCP

Instance with service 'Microsoft-DS' (TCP:445) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.Instance.53.UDP

Instance with service 'DNS' (UDP:53) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ELB.23.TCP

ELB with service 'Telnet' (TCP:23) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ELB.445.TCP

ELB with service 'Microsoft-DS' (TCP:445) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ELB.53.UDP

ELB with service 'DNS' (UDP:53) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.NetworkLoadBalancer.23.TCP

NetworkLoadBalancer with service 'Telnet' (TCP:23) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.NetworkLoadBalancer.445.TCP

NetworkLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.NetworkLoadBalancer.53.UDP

NetworkLoadBalancer with service 'DNS' (UDP:53) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ApplicationLoadBalancer.23.TCP

ApplicationLoadBalancer with service 'Telnet' (TCP:23) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ApplicationLoadBalancer.445.TCP

ApplicationLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ApplicationLoadBalancer.53.UDP

ApplicationLoadBalancer with service 'DNS' (UDP:53) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.Instance.5500.TCP

Instance with service 'VNC Listener' (TCP:5500) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.Instance.5900.TCP

Instance with service 'VNC Server' (TCP:5900) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ELB.5500.TCP

ELB with service 'VNC Listener' (TCP:5500) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ELB.5900.TCP

ELB with service 'VNC Server' (TCP:5900) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.NetworkLoadBalancer.5500.TCP

NetworkLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.NetworkLoadBalancer.5900.TCP

NetworkLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ApplicationLoadBalancer.5500.TCP

ApplicationLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG9.ApplicationLoadBalancer.5900.TCP

ApplicationLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to a wide network scope

Medium

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ApplicationLoadBalancer.23.TCP

ApplicationLoadBalancer with service 'Telnet' (TCP:23) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ApplicationLoadBalancer.445.TCP

ApplicationLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ApplicationLoadBalancer.53.UDP

ApplicationLoadBalancer with service 'DNS' (UDP:53) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ApplicationLoadBalancer.5500.TCP

ApplicationLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ApplicationLoadBalancer.5900.TCP

ApplicationLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ELB.23.TCP

ELB with service 'Telnet' (TCP:23) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ELB.445.TCP

ELB with service 'Microsoft-DS' (TCP:445) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ELB.53.UDP

ELB with service 'DNS' (UDP:53) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ELB.5500.TCP

ELB with service 'VNC Listener' (TCP:5500) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.ELB.5900.TCP

ELB with service 'VNC Server' (TCP:5900) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.Instance.23.TCP

Instance with service 'Telnet' (TCP:23) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.Instance.445.TCP

Instance with service 'Microsoft-DS' (TCP:445) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.Instance.53.UDP

Instance with service 'DNS' (UDP:53) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.Instance.5500.TCP

Instance with service 'VNC Listener' (TCP:5500) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.Instance.5900.TCP

Instance with service 'VNC Server' (TCP:5900) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.NetworkLoadBalancer.23.TCP

NetworkLoadBalancer with service 'Telnet' (TCP:23) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.NetworkLoadBalancer.445.TCP

NetworkLoadBalancer with service 'Microsoft-DS' (TCP:445) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.NetworkLoadBalancer.53.UDP

NetworkLoadBalancer with service 'DNS' (UDP:53) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.NetworkLoadBalancer.5500.TCP

NetworkLoadBalancer with service 'VNC Listener' (TCP:5500) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

D9.AWS.NET.AG10.NetworkLoadBalancer.5900.TCP

NetworkLoadBalancer with service 'VNC Server' (TCP:5900) is exposed to a small network scope

Low

AWS Dome9 Network Alerts
AWS Dome9 Best Practices

September 24, 2019

Rule Changes

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.AZU.AKS.01

Ensure that Container Registry has locks

High

Name

Azure Dome9 Best Practices

D9.AWS.CRY.19

ECS Cluster At-Rest Encryption

High

Remediation

AWS Dome9 Best Practices

D9.AZU.CRY.14

Ensure SQL server TDE protector is encrypted with BYOK (Use your own key)

Medium

Compliance Tag

Azure CIS Foundations v. 1.1.0

 

D9.AZU.NET.02

Ensure entire Azure infrastructure doesn't have access to Azure SQL Server

High

Logic

Azure CSA CCM v.3.0.1
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure NIST CSF v1.1
Azure ISO 27001:2013
Azure NIST 800-53 Rev 4
Azure Dome9 Best Practices
Azure Dome9 Network Alerts
Azure HIPAA

D9.AWS.CRY.30

Ensure that AWS DynamoDB is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

High

Name

AWS Dome9 Best Practices

D9.AWS.CRY.37

Ensure that an API Key is required on a Method Request

Medium

Logic

AWS Dome9 Best Practices
AWS Dome9 Serverless Architectures Security

Rules Removed

 

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.AZU.MON.02

Ensure that 'Auditing' is enabled for Azure SQL Database

Medium

Azure CIS Foundations v. 1.1.0

D9.AZU.MON.07

Ensure that 'Auditing' Retention is 'greater than 90 days' for Azure SQL Database

Low

Azure CIS Foundations v. 1.1.0

D9.AZU.MON.03

Ensure that 'Threat Detection' is enabled for Azure SQL Database

Medium

Azure CIS Foundations v. 1.1.0

D9.AZU.MON.05

Ensure that 'Send alerts to' is enabled for Azure SQL Database

Medium

Azure CIS Foundations v. 1.1.0

D9.AZU.MON.06

Ensure that 'Email service and co-administrators' is 'Enabled' for Azure SQL Database

Low

Azure CIS Foundations v. 1.1.0

D9.AZU.IAM.01

Avoid using names like 'Admin' for an Azure SQL Server Active Directory Administrator account

Medium

Azure CIS Foundations v. 1.1.0

 

August 28, 2019

Rule Changes

 

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.AZU.CRY.08

Ensure that 'Storage service encryption' is enabled for the File Service

High

Description

Azure CSA CCM v.3.0.1
Azure ISO 27001:2013
Azure NIST 800-53 Rev 4
Azure PCI-DSS 3.2
Azure HIPAA
Azure GDPR Readiness
Azure CIS Foundations v. 1.0.0
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure Dome9 Best Practices

D9.AZU.CRY.14

Ensure SQL server TDE protector is encrypted with BYOK (Use your own key)

Medium

Name

Azure CIS Foundations v. 1.1.0
Azure Dome9 Best Practices

D9.AWS.IAM.18

Ensure HARDWARE MFA is enabled for the 'root' account

High

Description

AWS CIS Foundations v. 1.1.0
AWS CIS Foundations v. 1.2.0
AWS GDPR Readiness
AWS Dome9 SOC2 based on AICPA TSC 2017
AWS PCI-DSS 3.2
AWS ISO 27001:2013
AWS CSA CCM v.3.0.1
AWS NIST CSF v1.1
AWS NIST 800-53 Rev 4
AWS Dome9 Best Practices

D9.AZU.NET.14

Ensure that Redis is updated regularly with security and operational updates. Note this feature is only available to Premium tier Redis Caches.

High

Description

Azure Dome9 Network Alerts
Azure Dome9 Best Practices

D9.GCP.GKE.07

Ensure Container-Optimized OS (cos) is used for Kubernetes Engine Clusters Node image

High

Logic

GCP Dome9 Best Practices
GCP CIS Foundations v. 1.0.0

D9.AZU.NET.21

Ensure that Azure Virtual network peering is connected

Low

Logic

Azure Dome9 Best Practices

D9.AWS.CRY.36

Ensure that SageMaker Notebook Instance Data Encryption with KMS CMKs is enabled

High

Logic

AWS Dome9 Best Practices

 

 

August 20, 2019

New Rules

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.AWS.CRY.38

Ensure to update the Security Policy of the Network Load Balancer

High

AWS Dome9 Best Practices

D9.AWS.NET.52

Ensure that the API Endpoint type in API Gateway is set to Private and is not exposed to the public internet

high

AWS Dome9 Serverless Architectures Security
AWS Dome9 Best Practices

D9.AWS.CRY.37

Ensure that an API Key is required on a Method Request

Medium

AWS Dome9 Serverless Architectures Security
AWS Dome9 Best Practices

D9.AZU.CRY.07

Ensure that 'Storage service encryption' is enabled for the Blob Service

High

Azure Dome9 Best Practices

D9.AZU.CRY.08

Ensure that 'Storage service encryption' is enabled for the File Service

High

Azure Dome9 Best Practices

D9.AZU.NET.24

Ensure default network access rule for Storage Accounts is set to deny

High

Azure Dome9 Best Practices

D9.AZU.NET.25

Ensure 'Trusted Microsoft Services' is enabled for Storage Account access

High

Azure Dome9 Best Practices

D9.AZU.CRY.17

Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server

High

Azure Dome9 Best Practices

D9.AZU.LOG.03

Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL Database Server

Medium

Azure Dome9 Best Practices

D9.AZU.LOG.04

Ensure server parameter 'log_duration' is set to 'ON' for PostgreSQL Database Server

Medium

Azure Dome9 Best Practices

D9.AZU.LOG.05

Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server

Medium

Azure Dome9 Best Practices

D9.AZU.LOG.06

Ensure server parameter 'log_retention_days' is greater than 3 days for PostgreSQL Database Server

Medium

Azure Dome9 Best Practices

D9.AZU.MON.08

Ensure ASC Default policy setting "Monitor System Updates" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.09

Ensure ASC Default policy setting "Monitor OS Vulnerabilities" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.10

Ensure ASC Default policy setting "Monitor Endpoint Protection" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.11

Ensure ASC Default policy setting "Monitor Disk Encryption" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.12

Ensure ASC Default policy setting "Monitor Network Security Groups" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.13

Ensure ASC Default policy setting "Monitor Web Application Firewall" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.14

Ensure ASC Default policy setting "Enable Next Generation Firewall(NGFW) Monitoring" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.15

Ensure ASC Default policy setting "Monitor Vulnerability Assessment" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.16

Ensure ASC Default policy setting "Monitor Storage Blob Encryption" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.17

Ensure ASC Default policy setting "Monitor JIT Network Access" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.18

Ensure ASC Default policy setting "Monitor Adaptive Application Whitelisting" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.19

Ensure ASC Default policy setting "Monitor SQL Auditing" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.MON.20

Ensure ASC Default policy setting "Monitor SQL Encryption" is not "Disabled"

Medium

Azure Dome9 Best Practices

D9.AZU.IAM.04

Ensure that Azure Active Directory Admin is configured for SQL Server

High

Azure Dome9 Best Practices

D9.AZU.NET.26

Ensure that RDP access is restricted from the internet

High

Azure Dome9 Best Practices

D9.AZU.NET.27

Ensure that SSH access is restricted from the internet

High

Azure Dome9 Best Practices

D9.AZU.NET.28

Ensure that Network Watcher is 'Enabled'

High

Azure Dome9 Best Practices

D9.AZU.CRY.15

Ensure the key vault is recoverable - enable "Soft Delete" setting for a Key Vault

Medium

Azure Dome9 Best Practices

D9.AZU.CRY.14

Ensure SQL server's TDE protector is encrypted with BYOK (Use your own key)

Medium

Azure Dome9 Best Practices

D9.AZU.LOG.07

Ensure that a Log Profile exists

High

Azure Dome9 Best Practices

D9.AZU.LOG.01

Ensure that Activity Log Retention is set 365 days or greater

Medium

Azure Dome9 Best Practices

D9.AZU.LOG.08

Ensure audit profile captures all the activities

Medium

Azure Dome9 Best Practices

D9.AZU.LOG.09

Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server

Medium

Azure Dome9 Best Practices

D9.AZU.LOG.02

Ensure the log profile captures activity logs for all regions including global

High

Azure Dome9 Best Practices

D9.AZU.CRY.16

Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)

Medium

Azure Dome9 Best Practices

D9.AZU.NET.29

Ensure that inbound traffic is restricted to only that which is necessary, and all other traffic denied

High

Azure Dome9 Best Practices

 

Rule Changes

 

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

Rule ID

Rule Name

Severity

Updated Fields

Affected Bundles

D9.AZU.NET.21

Ensure that Azure Virtual network peering is connected

Low

Logic

Azure Dome9 Best Practices

D9.AZU.NET.22

Ensure that outbound traffic is restricted to only that which is necessary, and all other traffic denied

High

Logic

Azure Dome9 Best Practices

D9.AZU.CRY.12

Ensure that the expiry date is set on all keys

High

Logic

Azure CSA CCM v.3.0.1

Azure HIPAA

Azure Dome9 SOC2 based on AICPA TSC 2017

Azure PCI-DSS 3.2

Azure CIS Foundations v. 1.0.0

Azure NIST 800-53 Rev 4

Azure GDPR Readiness

Azure NIST CSF v1.1

Azure ISO 27001:2013

Azure Dome9 Best Practices

D9.AZU.CRY.13

Ensure that the expiry date is set on all secrets

High

Logic

Azure CSA CCM v.3.0.1

Azure HIPAA

Azure Dome9 SOC2 based on AICPA TSC 2017

Azure PCI-DSS 3.2

Azure CIS Foundations v. 1.0.0

Azure NIST 800-53 Rev 4

Azure GDPR Readiness

Azure NIST CSF v1.1

Azure ISO 27001:2013

Azure Dome9 Best Practices

 

Rules Removed

 

Rule ID

Rule Name

Severity

Affected Bundles

Rule ID

Rule Name

Severity

Affected Bundles

D9.AZU.MON.03

Ensure that 'Threat Detection' is enabled for Azure SQL Database

Medium

Azure CSA CCM v.3.0.1
Azure HIPAA
Azure PCI-DSS 3.2
Azure GDPR Readiness
Azure NIST CSF v1.1
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure ISO 27001:2013
Azure NIST 800-53 Rev 4

D9.AZU.CRY.10

Ensure that storage account access keys are periodically regenerated

Medium

Azure CSA CCM v.3.0.1
Azure HIPAA
Azure PCI-DSS 3.2
Azure GDPR Readiness
Azure NIST CSF v1.1
Azure Dome9 SOC2 based on AICPA TSC 2017
Azure ISO 27001:2013
Azure NIST 800-53 Rev 4

 

For past Compliance Updates, please click here.