CloudGuard Dome9 Compliance Content Updates- September 2021 - December 2022

 

December 28 2022

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.MON.74

Ensure Any of the ASC Default Policy Setting is Not Set to 'Disabled'

High

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AWS.IAM.108

Ensure that custom IAM Role doesn't have an overly permissive scope (Contains a wildcard)

High

Modification

  • Name

  • Logic

  • Ensure that IAM Role doesn't have an overly permissive scope (Contains a wildcard)

  • IamRole where not path regexMatch /service-role/ should not have combinedPolicies contain [ relationType != 'AssumeRole' and policyDocument.Statement contain [ Effect='Allow' and Resource contain ['*'] ] ]

  • Ensure that custom IAM Role doesn't have an overly permissive scope (Contains a wildcard)

  • IamRole where not path regexMatch /service-role/ should not have combinedPolicies contain [ (id regexMatch /^((?!arn:aws:iam::aws:policy).)*$/ and relationType != 'AssumeRole') and policyDocument.Statement contain [ Effect='Allow' and (Resource contain ['*']) and Action contain [$ regexMatch /^(?!sts|ssm|cloudwatch|ec2messages|ssmmessages|logs|route53).*$/] ] ]

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

December 21 2022

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.GCP.IAM.07

Ensure User-Managed/External Keys for Service Accounts Are Rotated Every 90 Days or Fewer

High

Modification

  • Logic

  • ServiceAccount should not have keys with [ (managedBy = 'User') and (validAfterTime = isEmpty() or validAfterTime after(-90, 'days')) ]

  • ServiceAccount should not have keys with [ (managedBy = 'User') and (validAfterTime before(-90, 'days')) ]

  • GCP CIS Foundations v. 1.3.0

  • GCP LGPD regulation

  • GCP NIST 800-53 Rev 5

  • GCP CIS Foundations v. 1.0.0

  • GCP GDPR Readiness

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.AZU.MON.46

Ensure Diagnostic Setting captures appropriate categories

Low

Modification

  • Logic

  • ActivityLogMonitor should have diagnosticSettings contain [ logs contain [ category regexMatch /Write|Delete|Action/ ] ]

  • ActivityLogMonitor should not have (diagnosticSettings contain [ logs contain-any [ category regexMatch /Alert|Security|Policy|Administrative/ and enabled = false ] ])

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure NIST 800-53 Rev 5

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AWS.IAM.62

Ensure that IAM Role doesn't have excessive permissions (Allowing all actions)

High

Modification

  • Name

  • Logic

  • Ensure that Role do not have Administrator Access

  • IamRole should not have combinedPolicies contain-any [ policyDocument.Statement contain-any [ Resource = '*' and Action='*' and Effect='Allow'] ]

  • Ensure that IAM Role doesn't have excessive permissions (Allowing all actions)

  • IamRole should not have combinedPolicies contain [ relationType != 'AssumeRole' and policyDocument.Statement contain [ Effect='Allow' and Action contain ['*'] ] ]

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.108

Ensure that IAM Role doesn't have an overly permissive scope (Contains a wildcard)

High

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.AWS.IAM.109

Ensure that ECS Service role doesn't have excessive permissions (Contains a wildcard)

High

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.AWS.IAM.110

Ensure that ECS Service managed role doesn't have an overly permissive scope (Contains a wildcard)

High

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.AWS.LOG.15

Enable ALB Elastic Load Balancer v2 (ELBv2) access log

Low

Modification

  • Name

  • Enable ALB Elastic Load Balancer v2 (ELBv2) access log

  • Enable ALB Elastic Load Balancer v2 (ELBv2) access log

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.LOG.16

Ensure that your AWS CloudTrail logging bucket has MFA delete enabled

Low

Modification

  • Name

  • Ensure that your AWS CloudTrail logging bucket has MFA enabled

  • Ensure that your AWS CloudTrail logging bucket has MFA delete enabled

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AZU.NET.67

Ensure that Containers and its blobs are not exposed publicly

Critical

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AWS.NET.06

Ensure S3 buckets are not publicly accessible without a condition

High

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.76

Ensure S3 buckets are not publicly accessible

High

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS MITRE ATT&CK Framework v10

December 15 2022

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.105

Ensure that Lambda Function is not publicly exposed via resource policy without a condition

Critical

Modification

  • Logic

  • Lambda should not have resourcePolicy.Statement contain [ Effect='Allow' and (Principal = '*' or Principal.AWS = '*' or Principal.Service) and not Condition ]

  • Lambda should not have resourcePolicy.Statement contain [ Effect='Allow' and (Principal = '*' or Principal.AWS = '*') and not Condition ]

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

December 14 2022

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Severity

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.03

Ensure credentials unused for 45 days or greater are disabled (First access key)

Low

Modification

  • Logic

  • IamUser where firstAccessKey.isActive='true' should have firstAccessKey.lastUsedDate after(-45, 'days')

  • IamUser where firstAccessKey.isActive=true and firstAccessKey.lastRotated before(-45, 'days') should not have firstAccessKey.lastUsedDate before(-45, 'days')

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.05

Ensure credentials unused for 45 days or greater are disabled (Second access key)

Low

Modification

  • Logic

  • IamUser where secondAccessKey.isActive='true' should have secondAccessKey.lastUsedDate after(-45, 'days')

  • IamUser where secondAccessKey.isActive=true and secondAccessKey.lastRotated before(-45, 'days') should not have secondAccessKey.lastUsedDate before(-45, 'days')

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.DR.04

Ensure Amazon DynamoDB tables have continuous backups enabled

High

Modification

  • Logic

  • DynamoDbTable should not have restoreSummary isEmpty()

  • DynamoDbTable should have continuousBackups.pointInTimeRecoveryDescription.pointInTimeRecoveryStatus='ENABLED'

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11.3

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

December 07 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.68

Ensure that Lambda Function's environment variables 'Encryption at Rest' feature uses Customer Master Keys (CMK)

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.AWS.IAM.105

Ensure that Lambda Function is not publicly exposed via resource policy without a condition

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

December 04 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.20

Ensure AWS Kinesis Streams Keys are rotated

Modification

  • Logic

  • Kinesis where encrypted should have encryptionKey.rotationStatus=true

  • Kinesis where encrypted should have getResources('KMS') contain [ rotationStatus=true and region = ~getValue('region') and ( arn=~getValue('kmsKeyId') or aliases contain [ name = ~getValue('kmsKeyId') or arn = ~getValue('kmsKeyId') ] or ~getValue('kmsKeyId') in (arn split('/')) )]

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.21

AWS Kinesis streams are encrypted with customer managed CMK

Modification

  • Logic

  • Kinesis should have encryptionKey.isCustomerManaged=true

  • Kinesis should have getResources('KMS') contain [ isCustomerManaged=true and region = ~getValue('region') and ( arn=~getValue('kmsKeyId') or aliases contain [ name = ~getValue('kmsKeyId') or arn = ~getValue('kmsKeyId') ] or ~getValue('kmsKeyId') in (arn split('/')) )]

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.23

Ensure that your Amazon EFS file systems are encrypted using KMS CMK customer-managed keys

Modification

  • Logic

  • EFS should have encryptionKey.isCustomerManaged=true

  • EFS should have getResources('KMS') contain [ isCustomerManaged=true and region = ~getValue('region') and ( arn=~getValue('encryptionKeyArn') or aliases contain [ name = ~getValue('encryptionKeyArn') or arn = ~getValue('encryptionKeyArn') ] or ~getValue('encryptionKeyArn') in (arn split('/')) )]

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.33

Ensures that AWS RDS databases are encrypted using Customer Managed Keys

Modification

  • Logic

  • RDS where isStorageEncrypted=true should have encryptionKey.isCustomerManaged=true

  • RDS where isStorageEncrypted=true should have getResources('KMS') contain [ isCustomerManaged=true and region = ~getValue('region') and ( arn=~getValue('kmsKeyId') or aliases contain [ name = ~getValue('kmsKeyId') or arn = ~getValue('kmsKeyId') ] or ~getValue('kmsKeyId') in (arn split('/')) )]

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.35

Ensure SageMaker Notebook Instance Data Encryption is enabled

Modification

  • Logic

  • SageMakerNotebook should have kmsKey

  • SageMakerNotebook should have kmsKeyId

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard CheckUp

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.36

Ensure that SageMaker Notebook Instance Data Encryption with KMS CMKs is enabled

Modification

  • Logic

  • SageMakerNotebook where kmsKey should have kmsKey.isCustomerManaged=true

  • SageMakerNotebook should have getResources('KMS') contain [ isCustomerManaged=true and region = ~getValue('region') and ( arn=~getValue('kmsKeyId') or aliases contain [ name = ~getValue('kmsKeyId') or arn = ~getValue('kmsKeyId') ] or ~getValue('kmsKeyId') in (arn split('/')) )]

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

November 30 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.04

Ensure S3 Bucket Policy is set to deny HTTP requests

Modification

  • Logic

  • S3Bucket where policy.Statement contain-any [Effect='Allow' and (Action contain ['s3:GetObject'] or Action contain ['s3:PutObject'] or Action contain ['s3:*'] or Action contain ['*'] ) ] should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false' and (Action contain ['s3:GetObject'] or Action contain ['s3:PutObject'] or Action contain ['s3:*'] or Action contain ['*'] ) ]

  • S3Bucket where policy should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false' and (Action contain ['s3:GetObject'] or Action contain ['s3:PutObject'] or Action contain ['s3:*'] or Action contain ['*'] ) ]

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.06

Ensure access keys are rotated every 90 days or less (First access key)

Modification

  • Name

  • Ensure first access key is rotated every 90 days or less

  • Ensure access keys are rotated every 90 days or less (First access key)

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.07

Ensure access keys are rotated every 90 days or less (Second access key)

Modification

  • Name

  • Ensure second access key is rotated every 90 days or less

  • Ensure access keys are rotated every 90 days or less (Second access key)

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.46

Ensure that Lambda Function execution role policy doesn't have an overly permissive scope (Contains a wildcard)

Modification

  • Name

  • Logic

  • Lambda Functions with Admin Privileges are not created

  • Lambda should not have executionRole.combinedPolicies contain [policyDocument.Statement contain-any [Effect = 'Allow' and (Resource ='*' ) and Action ='*']]

  • Ensure that Lambda Function execution role policy doesn't have an overly permissive scope (Contains a wildcard)

  • Lambda should not have executionRole.combinedPolicies contain [ relationType!='AssumeRole' and policyDocument.Statement contain [Effect='Allow' and (Resource contain [$ regexMatch /^(?!arn).*\*$/] or Resource regexMatch /^(?!arn).*\*$/) ]]

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.K8S.IAM.03

Ensure that the --authorization-mode argument is not set to AlwaysAllow (Kubelet)

Modification

  • Logic

  • KubernetesNode should have kubeletData.kubeletconfig.--authorization-mode unlike '%AlwaysAllow%'

  • KubernetesNode should have kubeletData.kubeletconfig.authorization.mode unlike '%AlwaysAllow%'

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • OpenShift Container Platform v3

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.34

Minimize wildcard use in Roles and ClusterRoles (RBAC)

Modification

  • Logic

  • KubernetesRole should not have rules contain [ (resources with [$ regexMatch /.*\*.*/]) or (apiGroups with [$ regexMatch /.*\*.*/]) or (verbs with [$ regexMatch /.*\*.*/])]

  • KubernetesRole should not have rules contain [ (resources with ['%*%']) or (apiGroups with ['%*%']) or (verbs with ['%*%'])]

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • OpenShift Container Platform v3

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.35

Minimize access to create pods (RBAC)

Modification

  • Logic

  • KubernetesRoleBinding should not have role.rules contain [ (verbs with ['create'] and (resources with ['pod'] or resources with [$ regexMatch /.*\*.*/])) or (verbs with [$ regexMatch /.*\*.*/] and (resources with ['pod'] or resources with [$ regexMatch /.*\*.*/]))]

  • KubernetesRoleBinding should not have role.rules contain [ (verbs with ['create'] and (resources with ['pod'] or resources with ['%*%'])) or (verbs with ['%*%'] and (resources with ['pod'] or resources with ['%*%']))]

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • OpenShift Container Platform v3

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.AZU.LOG.12

Ensure that logging for Azure KeyVault is 'Enabled'

Modification

  • Logic

  • KeyVault should have diagnosticSettings contain [ logs contain [ category='AuditEvent' and enabled=true ] ]

  • KeyVault should have diagnosticSettings contain [ logs contain [ categoryGroup='audit' and enabled=true ] ]

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AWS.CRY.66

Ensure that EC2 instance's volumes are encrypted

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.AWS.CRY.67

Ensure that EC2 instance's custom AMI is encrypted at rest

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.AWS.IAM.55

Ensure that Lambda Function execution role policy doesn't have excessive permissions (Contains a wildcard)

Modification

  • Name

  • Logic

  • Ensure that Lambda Functions with overly permissive policies are not created

  • Lambda should not have executionRole.combinedPolicies contain [policyDocument.Statement contain-any [Effect = 'Allow' and (Resource ='*' or Resource contain[$='*'] ) and Action contain ['%*%'] or Action ='*' or Action contain [$='*']]]

  • Ensure that Lambda Function execution role policy doesn't have excessive permissions (Contains a wildcard)

  • Lambda should not have executionRole.combinedPolicies contain [ relationType!='AssumeRole' and policyDocument.Statement contain [Effect='Allow' and (Action contain [$ regexMatch /\*/] or Action regexMatch /\*/) ]]

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.104

Ensure that Lambda Function resource-based policy doesn't have excessive permissions (Contains a wildcard)

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.AWS.IAM.106

Ensure that EC2 instance's custom AMI is not publicly shared

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.AWS.IAM.107

Ensure that Lambda Function URL is secured with IAM authentication

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.AWS.NET.90

Ensure that EC2 instances requires the use of Instance Metadata Service Version 2 (IMDSv2)

New

 

 

 

  • AWS Security Risk Management

  • AWS CloudGuard Best Practices

D9.K8S.IAM.20

Minimize the admission of containers wishing to share the host IPC namespace (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.hostIPC] or items contain [spec.hostIPC ='false']

  • List<KubernetesPodSecurityPolicy> where items length() > 0 should have items contain [spec.hostIPC != 'true']

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.22

Minimize the admission of containers wishing to share the host network namespace (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.hostNetwork] or items contain [spec.hostNetwork ='false']

  • List<KubernetesPodSecurityPolicy> where items length() > 0 should have items contain [spec.hostNetwork != 'true']

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.24

Minimize the admission of containers wishing to share the host process ID namespace (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.hostPID] or items contain [spec.hostPID ='false']

  • List<KubernetesPodSecurityPolicy> where items length() > 0 should have items contain [spec.hostPID != 'true']

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.25

Minimize the admission of containers with allowPrivilegeEscalation (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.allowPrivilegeEscalation] or items contain [spec.allowPrivilegeEscalation ='false']

  • List<KubernetesPodSecurityPolicy> where items length() > 0 should have items contain [spec.allowPrivilegeEscalation!= 'true']

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.26

Minimize the admission of privileged containers (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.privileged] or items contain [spec.privileged ='false']

  • List<KubernetesPodSecurityPolicy> where items length() > 0 should have items contain [spec.privileged != 'true']

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Microsoft Kubernetes Engine (AKS) Benchmark v1.1.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.AWS.CRY.51

Ensure that AWS SNS topic is encrypted using Customer Managed Keys instead of AWS-owned CMKs

Modification

  • Name

  • Ensure that AWS SNS topic is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

  • Ensure that AWS SNS topic is encrypted using Customer Managed Keys instead of AWS-owned CMKs

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.52

Ensure that AWS SQS is encrypted using Customer Managed keys instead of AWS-owned CMKs

Modification

  • Name

  • Ensure that AWS SQS is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

  • Ensure that AWS SQS is encrypted using Customer Managed keys instead of AWS-owned CMKs

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.K8S.IAM.29

Ensure that the --anonymous-auth argument is set to false (API Server)

Modification

  • Logic

  • KubernetesPod where labels contain [value='kube-apiserver'] and namespace = 'kube-system' should have spec.containers with [parsedArgs contain [key like 'anonymous-auth' and value like '%false%']]

  • KubernetesPod where labels contain [value='kube-apiserver'] and namespace = 'kube-system' should not have spec.containers with [parsedArgs contain [key like 'anonymous-auth' and value like '%true%']]

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.OPE.02

Ensure that the --hostname-override argument is not set (Kubelet)

Removal

 

 

 

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.OPE.04

Ensure that the --cadvisor-port argument is set to 0 (Kubelet)

Removal

 

 

 

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • Kubernetes v.1.14 CloudGuard Best Practices

D9.AZU.NET.61

Ensure that Virtual Networks Subnets have Security Groups

Removal

 

 

 

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

November 28 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.102

Ensure that AWS Elastic Container Registry (ECR) repositories are not exposed to everyone.

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.103

Ensure that AWS Elastic Container Registry (ECR) repositories are not exposed to everyone, even with a condition.

New

 

 

 

  • AWS CloudGuard Best Practices

November 23 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.40

Ensure that all the expired SSL/TLS certificates are removed from ACM

Modification

  • Name

  • Ensure that all the expired Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates managed by AWS Certificate Manager are removed in order to adhere to Amazon Security Best Practices.

  • Ensure that all the expired SSL/TLS certificates are removed from ACM

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.38

Ensure to update the Security Policy of the Network Load Balancer

Modification

  • Logic

  • NetworkLoadBalancer should have listeners contain [securityPolicy in('ELBSecurityPolicy-2016-08', 'ELBSecurityPolicy-TLS-1-1-2017-01', 'ELBSecurityPolicy-FS-2018-06', 'ELBSecurityPolicy-TLS-1-2-Ext-2018-06') ]

  • NetworkLoadBalancer should have listeners contain [securityPolicy in('ELBSecurityPolicy-2016-08', 'ELBSecurityPolicy-FS-2018-06', 'ELBSecurityPolicy-TLS13-1-2-Ext1-2021-06', 'ELBSecurityPolicy-TLS13-1-2-2021-06') ]

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

November 16 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.20

Ensure AWS Kinesis Streams Keys are rotated

Modification

  • Name

  • AWS Kinesis Streams Keys are rotated

  • Ensure AWS Kinesis Streams Keys are rotated

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.K8S.CRY.44

Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (Kubelet) (Openshift)

Modification

  • Logic

  • KubernetesNode should have kubeletData.kubeletconfig.tlsCipherSuites isEmpty() or kubeletData.kubeletconfig.tlsCipherSuites contain-all [ in ('TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384','TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305','TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_256_GCM_SHA384','TLS_RSA_WITH_AES_128_GCM_SHA256','TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256','TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256')]

  • KubernetesNode should have kubeletData.kubeletconfig.tlsCipherSuites isEmpty() or kubeletData.kubeletconfig.tlsCipherSuites contain-all ['TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256' and 'TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256' and 'TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305' and 'TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384' and 'TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305' and 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384' and 'TLS_RSA_WITH_AES_256_GCM_SHA384' and 'TLS_RSA_WITH_AES_128_GCM_SHA256']

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • OpenShift Container Platform v3

D9.AWS.CRY.55

ACM has a PENDING_VALIDATION Certificate

Modification

  • Name

  • ACM Has a PENDING_VALIDATION Certificates

  • ACM has a PENDING_VALIDATION Certificate

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.25.PCI

Ensure ElastiCache for Memcached is not used in AWS PCI DSS environments

Modification

  • Name

  • Ensure ElastiCache for Memcached is not in use in AWS PCI DSS environments

  • Ensure ElastiCache for Memcached is not used in AWS PCI DSS environments

  • AWS PCI-DSS 3.2

  • AWS CloudGuard Well Architected Framework

D9.AZU.MON.50

Ensure that SQL Server Auditing Retention is greater than 90 days

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.51

Ensure SQL Server Threat Detection is Enabled and Retention Logs are greater than 90 days

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AWS.IAM.61

Ensure that Trusted Policy Roles which can be assumed by external entities include a Condition String

Removal

 

 

 

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.OPE.02

Container metadata

Removal

 

 

 

  • AWS NIST 800-53 Rev 5

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

November 09 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.21

AWS Kinesis streams are encrypted with customer managed CMK

Modification

  • Name

  • AWS Kinesis streams are encrypted with KMS customer master keys

  • AWS Kinesis streams are encrypted with customer managed CMK

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.24

AWS Kinesis data streams have server side encryption (SSE) enabled

Modification

  • Name

  • AWS Kinesis Server data at rest has server side encryption (SSE)

  • AWS Kinesis data streams have server side encryption (SSE) enabled

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.65

Ensure that S3 Bucket is encrypted at rest

New

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.03

Ensure credentials unused for 45 days or greater are disabled (First access key)

Modification

  • Name

  • Ensure credentials (with first activated accessKey) unused for 45 days or greater are disabled

  • Ensure credentials unused for 45 days or greater are disabled (First access key)

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.04

Ensure credentials unused for 45 days or greater are disabled (Console password)

Modification

  • Name

  • Credentials (with password enabled) unused for 45 days or more should be disabled

  • Ensure credentials unused for 45 days or greater are disabled (Console password)

  • AWS HIPAA

  • None

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.05

Ensure credentials unused for 45 days or greater are disabled (Second access key)

Modification

  • Name

  • Ensure credentials (with second activated accessKey) unused for 45 days or greater are disabled

  • Ensure credentials unused for 45 days or greater are disabled (Second access key)

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AZU.MON.21

Ensure that SQL server 'Auditing' is set to 'On'

Modification

  • Name

  • Ensure that 'Auditing' is set to 'On'

  • Ensure that SQL server 'Auditing' is set to 'On'

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure ISO 27001:2013

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.25

Ensure that VA setting 'Also send email notifications to admins and subscription owners' is set for a SQL server

Modification

  • Logic

  • SQLServer should have threatDetection.emailToAccountAdmins=true

  • SQLServer should have vulnerabilityAssessments contain [ recurringScansProperties.emailSubscriptionAdmins=true ]

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure ISO 27001:2013

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.48

Ensure that SQL Database Auditing Retention is greater than 90 days

Modification

  • Logic

  • SQLDB should have auditing.state='Enabled' and (auditing.retentionDays=0 or auditing.retentionDays>=90)

  • SQLDB should have auditing.retentionDays>90

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AWS.NET.72

Ensure that S3 Buckets are configured with Block public access (bucket/account settings)

Modification

  • Name

  • Logic

  • Ensure that S3 Buckets are configured with Block public access (bucket settings)

  • S3Bucket should have accessPublicBlock.blockPublicAcls=true and accessPublicBlock.ignorePublicAcls=true and accessPublicBlock.blockPublicPolicy=true and accessPublicBlock.restrictPublicBuckets=true

  • Ensure that S3 Buckets are configured with Block public access (bucket/account settings)

  • S3Bucket should have (accessPublicBlock.blockPublicAcls=true or accountAccessPublicBlock.blockPublicAcls=true) and (accessPublicBlock.ignorePublicAcls=true or accountAccessPublicBlock.ignorePublicAcls=true) and (accessPublicBlock.blockPublicPolicy=true or accountAccessPublicBlock.blockPublicPolicy=true) and (accessPublicBlock.restrictPublicBuckets=true or accountAccessPublicBlock.restrictPublicBuckets=true)

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.30

Ensure that AWS DynamoDB is encrypted using customer-managed CMK

Modification

  • Name

  • Ensure that AWS DynamoDB is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

  • Ensure that AWS DynamoDB is encrypted using customer-managed CMK

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard CheckUp

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.66

Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environments

Modification

  • Logic

  • List<IamSAMLProvider> should have items length() > 0

  • List<IamSAMLProvider> should have items with [id] length() > 0]

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.NET.73

Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports

Modification

  • Logic

  • NACL should not have inbound with [ source='0.0.0.0/0' and action='ALLOW' and ( ( destinationPort<=23 and destinationPortTo>=20 ) or ( destinationPort<=115 and destinationPortTo>=115 ) or ( destinationPort<=139 and destinationPortTo>=137 ) or ( destinationPort<=2049 and destinationPortTo>=2049 ) or ( destinationPort<=3389 and destinationPortTo>=3389 ) ) ]

  • NACL should not have inbound with [ source='0.0.0.0/0' and action='ALLOW' and ( ( destinationPort<=22 and destinationPortTo>=22 ) or ( destinationPort<=3389 and destinationPortTo>=3389 ) ) ]

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

D9.AWS.OPE.10

Identify unused AWS VPCs

Modification

  • Name

  • Identifies unused AWS VPCs

  • Identify unused AWS VPCs

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AZU.NET.59

Ensure Flow-Logs are Enabled on NSG

Modification

  • Logic

  • NsgFlowLog should have properties.enabled=true

  • NetworkSecurityGroup should have nsgFlowLog.properties.enabled=true

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

D9.AWS.NET.58

Ensure that AWS S3 Bucket block public ACLs is enabled at the account level or at the Bucket level

Removal

 

 

 

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

November 02 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.08

SSL/TLS certificates expire in one week

Modification

  • Severity

  • High

  • Low

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.10

ELB secured listener certificate expires in one week

Modification

  • Severity

  • High

  • Low

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.CRY.12

ALB secured listener certificate expires in one week

Modification

  • Severity

  • High

  • Low

  • AWS HIPAA

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.29

Ensure that S3 bucket ACLs don't allow 'READ' access for anonymous / AWS authenticated users

Modification

  • Name

  • Logic

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.31

Ensure that S3 bucket ACLs don't allow 'WRITE' access for anonymous / AWS authenticated users

Modification

  • Name

  • Logic

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.33

Ensure that S3 bucket ACLs don't allow 'WRITE_ACP' access for anonymous / AWS authenticated users

Modification

  • Name

  • Logic

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.35

Ensure that S3 bucket ACLs don't allow 'READ_ACP' access for anonymous / AWS authenticated users

Modification

  • Name

  • Logic

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.40

Ensure that S3 Bucket policy doesn't allow actions from all principals without a condition

Modification

  • Name

  • Logic

  • S3 bucket should not allow all actions from all principals without a condition

  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition isEmpty() and (Action contain [$ = '*'] or Action = '*' ) ]

  • Ensure that S3 Bucket policy doesn't allow actions from all principals without a condition

  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition isEmpty()]

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.96

Ensure that S3 Bucket policy doesn't allow actions from all principals (Condition exists)

Modification

  • Name

  • Logic

  • S3 bucket should not allow all actions from all principals

  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition and (Action contain [$ = '*'] or Action = '*' ) ]

  • Ensure that S3 Bucket policy doesn't allow actions from all principals (Condition exists)

  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition]

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.100

Ensure that S3 bucket ACLs don't allow 'FULL_CONTROL' access for anonymous / AWS authenticated users

New

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.101

Ensure that S3 Bucket policy doesn't have excessive permissions (Allowing all actions)

New

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AZU.CRY.15

Ensure the Key Vault is Recoverable

Modification

  • Name

  • Logic

  • Ensure the key vault is recoverable - enable 'Soft Delete' setting for a Key Vault

  • KeyVault should have enableSoftDelete=true

  • Ensure the Key Vault is Recoverable

  • KeyVault should have enableSoftDelete=true and enablePurgeProtection=true

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.39

Ensure That Storage Account Access Keys are Periodically Regenerated

Modification

  • Logic

  • StorageAccount should have keysRegeneratedInThePast90Days=true

  • StorageAccount where allowSharedKeyAccess=true should have keysRegeneratedInThePast90Days=true

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.22

Ensure that SQL Server 'Auditing' Retention is 'greater than 90 days'

Modification

  • Name

  • Ensure that 'Auditing' Retention is 'greater than 90 days'

  • Ensure that SQL Server 'Auditing' Retention is 'greater than 90 days'

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure ISO 27001:2013

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AWS.CRY.54

ACM has soon to be expired certificates

Modification

  • Name

  • ACM has a soon to be expired certificates

  • ACM has soon to be expired certificates

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.53

Ensure AWS IAM policies do not grant 'assume role' permission across all services

Modification

  • Severity

  • High

  • Low

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

D9.AWS.IAM.28

S3 bucket should not be world-listable from anonymous users

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.30

S3 bucket should not be world-writable from anonymous users

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.32

S3 bucket should not have writable permissions from anonymous users

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.34

S3 bucket should not have world-readable permissions from anonymous users

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.36

S3 bucket should not allow delete actions from all principals without a condition

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.37

S3 bucket should not allow get actions from all principals without a condition

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.38

S3 bucket should not allow list actions from all principals without a condition

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.41

S3 bucket should not allow put or restore actions from all principals without a condition

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.92

S3 bucket should not allow delete actions from all principals

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.93

S3 bucket should not allow get actions from all principals with a condition

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.94

S3 bucket should not allow list actions from all principals

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.AWS.IAM.95

S3 bucket should not allow put or restore actions from all principals

Removal

 

 

 

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

October 26 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.K8S.IAM.33

Minimize access to secrets (RBAC)

Modification

  • Logic

  • KubernetesRole should not have rules with [ (resources with ['secret']) or (resources with [$ regexMatch /.*\*.*/])]

  • KubernetesRole should not have rules with [ (resources with ['secret']) or (resources contain ['%*%'])]

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • OpenShift Container Platform v3

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.36

Ensure that default service accounts are not actively used. (RBAC)

Modification

  • Logic

  • KubernetesRoleBinding should not have role.name='default' and role.kind='role'

  • KubernetesRoleBinding should not have subjects contain-any [ name='default' and kind='ServiceAccount' ]

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • OpenShift Container Platform v3

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.OPE.06

Apply Security Context to Your Pods and Containers

Modification

  • Name

  • Logic

  • Apply Security Context to Your Pods and Containers - SELinux

  • KubernetesPod should have spec.containers contain-all [ securityContext.seLinuxOptions ] and (spec.initContainers isEmpty() or spec.initContainers contain-all [ securityContext.seLinuxOptions ])

  • Apply Security Context to Your Pods and Containers

  • KubernetesPod should have spec.containers contain-all [ securityContext ] and (spec.initContainers isEmpty() or spec.initContainers contain-all [ securityContext ])

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • OpenShift Container Platform v3

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.1.0

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.AZU.MON.72

Microsoft Defender for Endpoint (WDATP) integration with Microsoft Defender for Cloud is selected

Modification

  • Severity

  • Medium

  • High

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.73

Ensure that Microsoft Defender for Cloud Apps (MCAS) Integration with Microsoft Defender for Cloud is selected

Modification

  • Severity

  • Medium

  • High

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

October 19 2022

  • Deprecated 221 CSPM Network rules for GCP and replaced them with 4 new rules.

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.43

Ensure MFA Delete is enable on S3 buckets

Modification

  • Severity

  • High

  • Low

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS MITRE ATT&CK Framework v11

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.GCP.NET.34

Ensure that no VMInstace allows incoming traffic from 0.0.0.0/0 to a known TCP port.

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP Security Risk Management

  • GCP LGPD regulation

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Security

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

  • GCP Risk Management

D9.GCP.NET.35

Ensure that no VMInstace allows incoming traffic from 0.0.0.0/0 to a known UDP port.

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP Security Risk Management

  • GCP LGPD regulation

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Security

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

  • GCP Risk Management

D9.GCP.NET.36

Ensure that no VMInstace allows incoming traffic from 0.0.0.0/0 to a known TCP DB port.

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP Security Risk Management

  • GCP LGPD regulation

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Security

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

  • GCP Risk Management

D9.GCP.NET.37

Ensure that no VMInstace allows incoming traffic from 0.0.0.0/0 to a known UDP DB port.

New

 

 

 

  • GCP CloudGuard CheckUp

  • GCP Security Risk Management

  • GCP LGPD regulation

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP CloudGuard Network Security

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

  • GCP Risk Management

D9.AZU.CRY.48

Ensure 'Allow access to Azure services' for PostgreSQL Flexible Server is disabled

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.70

Ensure that Microsoft Defender for Container Registries is set to 'On'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.71

Ensure that Microsoft Defender for Key Vault is set to 'On'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.72

Microsoft Defender for Endpoint (WDATP) integration with Microsoft Defender for Cloud is selected

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.73

Ensure that Microsoft Defender for Cloud Apps (MCAS) Integration with Microsoft Defender for Cloud is selected

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AWS.LOG.16

Ensure that your AWS CloudTrail logging bucket has MFA enabled

Modification

  • Severity

  • High

  • Low

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK Framework v10

  • AWS Risk Management

D9.GCP.NET.32

Ensure that no VMInstance allows incoming traffic from '0.0.0.0/0' to all protocols and ports.

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.NET.33

Ensure that no VMInstance allows incoming traffic from 0.0.0.0/0 to the ICMP port.

New

 

 

 

  • GCP CloudGuard Best Practices

October 12 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.CRY.47

Ensure Virtual Machines are utilizing Managed Disks

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.62

Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Account

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.63

Ensure that VA setting 'Periodic recurring scans' to 'on' for each SQL server

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.64

Ensure that VA setting 'Send scan reports to' is configured for a SQL server

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.65

Ensure that Microsoft Defender for Servers is set to 'On'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.66

Ensure that Microsoft Defender for App Service is set to 'On'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.67

Ensure that Microsoft Defender for Azure SQL Databases is set to 'On'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.68

Ensure that Microsoft Defender for SQL servers on machines is set to 'On'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.69

Ensure that Microsoft Defender for Storage is set to 'On'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AWS.AS.08

Ensure that ECR image tags are immutable.

Modification

  • Severity

  • Low

  • High

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

D9.AWS.CRY.64

Ensure that ECR repositories are encrypted.

New

 

 

 

  • AWS MITRE ATT&CK Framework v11

  • AWS CloudGuard Best Practices

D9.CFT.IAM.19

Ensure that IAM user does not have directly embedded policy

Modification

  • Name

  • Ensure that IAM user does not have directly embeded policy

  • Ensure that IAM user does not have directly embedded policy

  • AWS CloudFormation ruleset

September 28 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.27

Ensure IAM policies that allow full '*:*' administrative privileges are not created

Modification

  • Logic

  • IamPolicy where (arn!='arn:aws:iam::aws:policy/AdministratorAccess' and arn!='arn:aws-us-gov:iam::aws:policy/AdministratorAccess') and document.Statement contain-any [Effect = 'Allow' and (Resource ='*' or Resource contain[$='*'] ) and (Action ='*' or Action contain[$='*']) ] should have users isEmpty() and roles isEmpty() and groups isEmpty()

  • IamPolicy where (arn!='arn:aws:iam::aws:policy/AdministratorAccess' and arn!='arn:aws-us-gov:iam::aws:policy/AdministratorAccess' and arn!='arn:aws-cn:iam::aws:policy/AdministratorAccess') and document.Statement contain-any [Effect = 'Allow' and (Resource ='*' or Resource contain[$='*'] ) and (Action ='*' or Action contain[$='*']) ] should have users isEmpty() and roles isEmpty() and groups isEmpty()

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.5.0

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK â„¢ Framework v10

D9.AZU.CRY.43

Ensure that 'Java version' is the latest, if used to run the Linux Web App

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.44

Ensure That 'PHP version' is the Latest, If Used to Run the Linux Web App

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.45

Ensure FTP deployments are Disabled for webapp

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.46

Ensure FTP deployments are Disabled for FunctionApp

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.LOG.17

Ensure that the endpoint protection for all Virtual Machines is installed

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.5.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AWS.VLN.02

Instances without Inspector runs in the last 30 days

Modification

  • Logic

  • Instance where autoScalingGroup.id isEmpty() and region in('eu_central_1','eu_west_1','eu_west_2','ap_south_1','us_west_1','us_east_1','us_east_2','us_west_2','ap_northeast_2','eu_north_1','ap_southeast_2','ap_northeast_1','us_gov_east_1','us_gov_west_1') should have scanners.scans contain [source = 'Inspector' and startTime after(-30, 'days') and state in ('COMPLETED') ]

  • Instance where autoScalingGroup.id isEmpty() and launchTime before(-1, 'days') and region in('eu_central_1','eu_west_1','eu_west_2','ap_south_1','us_west_1','us_east_1','us_east_2','us_west_2','ap_northeast_2','eu_north_1','ap_southeast_2','ap_northeast_1','us_gov_east_1','us_gov_west_1') should have scanners.scans contain [source = 'Inspector' and startTime after(-30, 'days') and state in ('COMPLETED') ]

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK â„¢ Framework v10

D9.AZU.AS.01

Storage Accounts outside Europe

Modification

  • Logic

  • StorageAccount should have region='northeurope' or region='westeurope' and ( secondaryRegion='northeurope' or secondaryRegion='westeurope' or secondaryRegion isEmpty() )

  • StorageAccount should have region in('northeurope', 'westeurope', 'norwayeast', 'francecentral', 'swedencentral', 'germanywestcentral') and (secondaryRegion in('northeurope', 'westeurope', 'norwaywest', 'francesouth', 'swedensouth', 'germanynorth') or secondaryRegion isEmpty())

  • Azure GDPR Readiness

D9.AWS.AS.08

Ensure that ECR image tags are immutable.

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.CRY.63

Ensure that ECR image scan on push is enabled.

New

 

 

 

  • AWS CloudGuard Best Practices

September 21 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.01

Use encrypted storage for instances that might host a database.

Modification

  • Logic

  • Instance where (name like '%db%') or (name like '%database%' ) or (name like '%sql%' ) or (name like '%couchbase%' ) or (name like '%riak%' ) or (name like '%redis%' ) or (name like '%hbase%' ) or (name like '%oracle%' ) or (name like '%hana%' ) or (name like '%postgres%' ) or (name like '%cassandra%' ) or (name like '%hadoop%' ) or (name like '%mongo%' ) or (name like '%graph%' ) or (name like '%Neo4j%' ) should have volumes with [kmsKeyId and encrypted='true']

  • Instance where(name like '%-db%' ) or (name like '%_db%' ) or (name like '%db-%' ) or (name like '%db_%' ) or (name like '%database%' ) or (name like '%sql%' ) or (name like '%couchbase%' ) or (name like '%riak%' ) or (name like '%redis%' ) or (name like '%hbase%' ) or (name like '%oracle%' ) or (name like '%hana%' ) or (name like '%postgres%' ) or (name like '%cassandra%' ) or (name like '%hadoop%' ) or (name like '%mongo%' ) or (name like '%graph%' ) or (name like '%Neo4j%' ) should have volumes with [kmsKeyId and encrypted='true']

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK â„¢ Framework v10

  • AWS Risk Management

D9.AWS.NET.70

EksCluster should not have more than one security groups

Modification

  • Name

  • EksCluster should not have more then one security groups

  • EksCluster should not have more than one security groups

  • AWS NIST 800-53 Rev 5

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK â„¢ Framework v10

D9.GCP.NET.09

Ensure Network policy is enabled on Kubernetes Engine Clusters

Modification

  • Logic

  • GkeCluster should have networkPolicy.enabled=true

  • GkeCluster should have (networkPolicy.enabled='true') or (currentMasterVersion with [$ regexMatch /[1-9].[20-30].-gke./])

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Containers Security

  • GCP CloudGuard Best Practices

D9.AWS.NET.67

Ensure that all authorization Type in API Gateway are not set to None

Modification

  • Name

  • Ensure that all authorization Type in API Gateway are not set to None

  • Ensure that all authorization Type in API Gateway are not set to None

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK â„¢ Framework v10

September 14 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.CRY.39

Ensure That Storage Account Access Keys are Periodically Regenerated

Modification

  • Severity

  • Medium

  • High

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.40

Ensure That 'PHP version' is the Latest, If Used to Run the Windows Web App

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.41

Ensure that 'Python version' is the Latest Stable Version, if Used to Run the Linux Web App

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.42

Ensure that 'Java version' is the latest, if used to run the Windows Web App

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.LOG.14

Ensure Storage Logging is Enabled for Queue Service for 'Read', 'Write', and 'Delete' requests

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.LOG.15

Ensure Storage logging is Enabled for Blob Service for 'Read', 'Write', and 'Delete' requests

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.LOG.16

Ensure Storage logging is Enabled for Table Service for 'Read', 'Write', and 'Delete' requests

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

September 07 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.MON.01

Ensure a log metric filter and alarm exist for unauthorized API calls

Modification

  • Logic

  • List<CloudTrail> should have items with [hasSNSSubscriber='true' and metricFilters with [filterPattern isFilterPatternEqual('{ ($.errorCode = *UnauthorizedOperation) || ($.errorCode =AccessDenied*) || ($.eventName!=HeadBucket) }')] length() > 0]

  • List<CloudTrail> should have items with [hasSNSSubscriber='true' and metricFilters with [filterPattern isFilterPatternEqual('{(($.errorCode="*UnauthorizedOperation") || ($.errorCode="AccessDenied*")) && (($.sourceIPAddress!="delivery.logs.amazonaws.com") && ($.eventName!="HeadBucket"))}')] length() > 0]

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK â„¢ Framework v10

D9.AZU.CRY.39

Ensure That Storage Account Access Keys are Periodically Regenerated

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.LOG.13

Ensure the storage container storing the activity logs is not publicly accessible

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.MON.58

Ensure That Auto provisioning of 'Log Analytics agent for Azure VMs' is Set to 'On'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

D9.AZU.MON.59

Ensure 'Additional email addresses' is Configured with a Security Contact Email

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.MON.60

Ensure That 'Notify about alerts with the following severity' is Set to 'High'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.MON.61

Ensure That 'All users with the following roles' is set to 'Owner'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AWS.NET.29

Ensure that EC2 AMIs are not publicly accessible

Modification

  • Name

  • Public AMI

  • Ensure that EC2 AMIs are not publicly accessible

  • AWS LGPD regulation

  • AWS NIST 800-53 Rev 5

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK â„¢ Framework v10

D9.AWS.IAM.73

Ensure inactive user for 90 days or greater are disabled

Modification

  • Name

  • Ensure inative user for 90 days or greater are disabled

  • Ensure inactive user for 90 days or greater are disabled

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CloudGuard Best Practices

  • AWS Risk Management

D9.AWS.CRY.54

ACM has a soon to be expired certificates

Modification

  • Name

  • ACM Has a soon to be Expired Certificates

  • ACM has a soon to be expired certificates

  • AWS NIST 800-53 Rev 5

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK â„¢ Framework v10

August 24 2022

  • Deprecated 1048 CSPM Network rules for AWS and replaced them with 12 new rules

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.K8S.CRY.24

Ensure that the --encryption-provider-config argument is set as appropriate (API Server) (Openshift)

Modification

  • Logic

  • KubernetesCluster should have kubernetesPlatform.openshift.openshiftKubeApiserver.cluster.spec.encryption.type='aescbc'

  • KubernetesCluster should not have kubernetesPlatform.openshift.openshiftKubeApiserver.cluster.spec.encryption.type!=aescbc

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.33

Ensure that the healthz endpoints for the scheduler are protected by RBAC (RBAC) (Openshift)

Modification

  • Logic

  • KubernetesRole where name='cluster-debugger' and namespace='*' should have rules contain-any [nonResourceURLs contain-any ['/debug/pprof']]

  • KubernetesRole where name='cluster-debugger' and namespace='*' should have rules contain-any [nonResourceURLs contain ['/debug/pprof']]

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • OpenShift Container Platform v3

D9.K8S.IAM.57

Verify that RBAC is enabled (API Server) (Openshift)

Modification

  • Logic

  • KubernetesCluster should have kubernetesPlatform.openshift.openshiftKubeApiserver.configConfigmap.apiServerArguments.authorization-mode contain-any ['RBAC']

  • KubernetesCluster should have kubernetesPlatform.openshift.openshiftKubeApiserver.configConfigmap.apiServerArguments.authorization-mode contain ['RBAC']

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.AWS.NET.78

Ensure no EC2 instance allows incoming traffic from 0.0.0.0/0 to known TCP port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.79

Ensure no EC2 instance allows incoming traffic from 0.0.0.0/0 to known UDP port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.80

Ensure no EC2 instance allows incoming traffic from 0.0.0.0/0 to known TCP DB port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.81

Ensure no EC2 instance allows incoming traffic from 0.0.0.0/0 to known UDP DB port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.82

Ensure no Application Load Balancer allows incoming traffic from 0.0.0.0/0 to known TCP port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.83

Ensure no Application Load Balancer allows incoming traffic from 0.0.0.0/0 to known UDP port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.84

Ensure no Application Load Balancer allows incoming traffic from 0.0.0.0/0 to known TCP DB port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.85

Ensure no Application Load Balancer allows incoming traffic from 0.0.0.0/0 to known UDP DB port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.86

Ensure no ELB allows incoming traffic from 0.0.0.0/0 to known TCP port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.87

Ensure no ELB allows incoming traffic from 0.0.0.0/0 to known UDP port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.88

Ensure no ELB allows incoming traffic from 0.0.0.0/0 to known TCP DB port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.AWS.NET.89

Ensure no ELB allows incoming traffic from 0.0.0.0/0 to known UDP DB port

New

 

 

 

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS Risk Management

D9.K8S.NET.13

Ensure that the --authorization-mode argument is set to Node (API Server)

Removal

 

 

 

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • Kubernetes v.1.14 CloudGuard Best Practices

August 10 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.16

Ensure no root account access key exists

Modification

  • Logic

  • IamUser where name like '%root_account%' should have firstAccessKey.isActive=false and secondAccessKey.isActive=false

  • IamUser where name regexMatch /^<root_account>$/ should have firstAccessKey.isActive=false and secondAccessKey.isActive=false

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS NIST 800-53 Rev 5

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK â„¢ Framework v10

  • AWS Risk Management

D9.AWS.IAM.93

S3 bucket should not allow get actions from all principals with a condition

Modification

  • Name

  • S3 bucket should not allow get actions from all principals

  • S3 bucket should not allow get actions from all principals with a condition

  • AWS HIPAA

  • AWS LGPD regulation

  • AWS Security Risk Management

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 5

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK â„¢ Framework v10

  • AWS Risk Management

D9.AWS.CRY.60

Ensure ACM certificate is using a minimum of 2048-bit key for RSA certificate

Modification

  • Logic

  • AcmCertificate where keyAlgorithm regexMatch /RSA/ should have keyAlgorithm regexMatch /[1-9]\d{4}|[3-9]\d{3}|2([1-9]\d{2}|0([5-9]\d|4[89]))/

  • AcmCertificate where (keyAlgorithm regexMatch /RSA/ and status like 'ISSUED' ) should have keyAlgorithm regexMatch /[1-9]\d{4}|[3-9]\d{3}|2([1-9]\d{2}|0([5-9]\d|4[89]))/

  • AWS NIST 800-53 Rev 5

  • AWS CloudGuard Best Practices

August 03 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.GCP.VLN.01

Ensure Container-Optimized OS (cos) is used for Kubernetes Engine Clusters Node image

Modification

  • Logic

  • GkeCluster should have nodePools contain-all [ config.imageType='COS' ]

  • GkeCluster should have nodePools contain-all [ config.imageType='COS' or config.imageType='COS_CONTAINERD' ]

  • GCP CloudGuard CheckUp

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Containers Security

  • GCP CloudGuard Best Practices

D9.GCP.LOG.30

Ensure 'Access Approval' is 'Enabled'

New

 

 

 

  • GCP CIS Foundations v. 1.3.0

  • GCP CloudGuard Best Practices

D9.AZU.CRY.37

Ensure Soft Delete is Enabled for Azure Storage

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

D9.AZU.CRY.38

Ensure 'Allow access to Azure services' for PostgreSQL Database Server is disabled

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

D9.AZU.NET.66

Ensure that 'Public access level' is set to Private for blob containers

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

July 27 2022

  • Deprecated 221 CSPM Network rules for Azure and replaced them with 4 new rules

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.NET.VirtualMachine.TCPdb

Ensure no Virtual Machine allow incoming traffic from 0.0.0.0/0 to Known DB-TCP ports

New

 

 

 

  • Azure LGPD regulation

  • Azure Security Risk Management

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure Risk Management

D9.AZU.NET.VirtualMachine.UDPdb

Ensure no Virtual Machine allow incoming traffic from 0.0.0.0/0 to Known DB-UDP ports

New

 

 

 

  • Azure LGPD regulation

  • Azure Security Risk Management

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure Risk Management

D9.AZU.NET.VirtualMachine.TCP

Ensure no Virtual Machine allow incoming traffic from 0.0.0.0/0 to Known TCP ports

New

 

 

 

  • Azure LGPD regulation

  • Azure Security Risk Management

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure Risk Management

D9.AZU.NET.VirtualMachine.UDP

Ensure no Virtual Machine allow incoming traffic from 0.0.0.0/0 to Known UDP ports

New

 

 

 

  • Azure LGPD regulation

  • Azure Security Risk Management

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure Risk Management

July 20 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.AS.06

Instances outside of Brazilian region

New

 

 

 

  • AWS LGPD regulation

D9.AWS.AS.07

S3 Buckets outside of Brazil

New

 

 

 

  • AWS LGPD regulation

July 13 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.CRY.32

Ensure 'Enforce SSL connection' is set to 'Enabled' for Standard MySQL Database Flexible Server

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.34

Ensure 'Enforce SSL connection' is set to 'Enabled' for Standard MySQL Database Single Server

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

D9.AZU.CRY.35

Ensure the 'Minimum TLS version' is set to 'Version 1.2'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

D9.AZU.CRY.36

Ensure 'Infrastructure double encryption' for PostgreSQL Database Server is 'Enabled'

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

July 06 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.K8S.NET.34

Ensure that all Namespaces have Network Policies defined.

New

 

 

 

  • Google Kubernetes Engine (GKE) Benchmark v1.2.0

D9.AWS.CRY.42

Ensure that the Viewer Protocol policy is compliant to only use the HTTPS protocol

Modification

  • Logic

  • CloudFront should have distributionConfig.cacheBehaviors.items contain [ viewerProtocolPolicy='https-only' ]

  • CloudFront should have distributionConfig.cacheBehaviors.items contain [ viewerProtocolPolicy='https-only' or viewerProtocolPolicy='redirect-to-https']

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.81

Ensure whether IAM users are members of at least one IAM group

Modification

  • Logic

  • IamUser should have attachedGroups length()>0

  • IamUser should have attachedGroups length()>0 or name regexMatch /^<root_account>$/

  • AWS CloudGuard Best Practices

D9.AWS.NET.77

Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports

Modification

  • Severity

  • Critical

  • High

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

June 29 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.GCP.OPE.05

Ensure Essential Contacts is Configured for Organization

New

 

 

 

  • GCP CIS Foundations v. 1.3.0

  • GCP CloudGuard Best Practices

D9.AZU.CRY.33

Ensure 'TLS Version' is set to 'TLSV1.2' for MySQL flexible Database Server

New

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

D9.AZU.NET.65

Storage Accounts outside Brazil

New

 

 

 

  • Azure GDPR Readiness

D9.AWS.NET.77

Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports

New

 

 

 

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.69

Ensure IAM Role does not have inline policies

Removal

 

 

 

  • AWS CloudGuard Best Practices

June 22 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.K8S.IAM.21

Ensure that the seccomp profile is set to docker/default in your pod definitions

Modification

  • Logic

  • KubernetesPod should have annotations contain [ key regexMatch /seccomp.security.alpha.kubernetes.io\\/pod.*/ ]

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.06

Apply Security Context to Your Pods and Containers - SELinux

Modification

  • Name

  • Apply Security Context to Your Pods and Containers

  • Apply Security Context to Your Pods and Containers - SELinux

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • Google Kubernetes Engine (GKE) Benchmark v1.2.0

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.GCP.LOG.29

Ensure That 'cloudsql.enable_pgaudit' Database Flag for each Cloud Sql Postgresql Instance Is Set to 'on' For Centralized Logging

New

 

 

 

  • GCP CIS Foundations v. 1.3.0

  • GCP CloudGuard Best Practices

D9.AWS.LOG.24

Ensure that Object-level logging for read events is enabled for S3 bucket

New

 

 

 

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

June 15 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.GCP.CRY.15

Ensure that Dataproc Cluster is encrypted using Customer-Managed Encryption Key

New

 

 

 

  • GCP CIS Foundations v. 1.3.0

  • GCP CloudGuard Best Practices

D9.GCP.OPE.04

Ensure Cloud Asset Inventory Is Enabled

New

 

 

 

  • GCP CIS Foundations v. 1.3.0

  • GCP CloudGuard Best Practices

D9.AZU.LOG.05

Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server

Modification

  • Logic

  • PostgreSQL should have logsConfiguration contain [ name='connection_throttling' and value='on' ]

  • PostgreSQL should have logsConfiguration contain [ name='connection_throttling' and value regexMatch /[Oo][Nn]/ ]

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.LOG.09

Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server

Modification

  • Logic

  • PostgreSQL should have logsConfiguration contain [ name='log_connections' and value='on' ]

  • PostgreSQL should have logsConfiguration contain [ name='log_connections' and value regexMatch /[Oo][Nn]/ ]

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.LOG.10

Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server

Modification

  • Logic

  • PostgreSQL should have logsConfiguration contain [ name='log_checkpoints' and value='on' ]

  • PostgreSQL should have logsConfiguration contain [ name='log_checkpoints' and value regexMatch /[Oo][Nn]/ ]

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.IAM.01

Avoid using names like 'Admin' for an Azure SQL Server Active Directory Administrator account

Modification

  • Logic

  • SQLServer should not have adAdministrators contain-any [ login in ('admin', 'Admin', 'administrator', 'Administrator') ]

  • SQLServer should not have adAdministrators contain-any [ login regexMatch /admin|Admin|administrator|Administrator/ ]

  • Azure LGPD regulation

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure ITSG-33

D9.AWS.IAM.98

Ensure IAM user password is rotated every 90 days or less

New

 

 

 

  • AWS CloudGuard Best Practices

  • AWS Risk Management

D9.AWS.IAM.99

Ensure cross-account IAM Role uses MFA or external ID as a condition

New

 

 

 

  • AWS CloudGuard Best Practices

  • AWS Risk Management

D9.K8S.IAM.20

Minimize the admission of containers wishing to share the host IPC namespace (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.hostIPC]

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.hostIPC] or items contain [spec.hostIPC ='false']

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.22

Minimize the admission of containers wishing to share the host network namespace (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.hostNetwork]

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.hostNetwork] or items contain [spec.hostNetwork ='false']

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.24

Minimize the admission of containers wishing to share the host process ID namespace (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.hostPID]

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.hostPID] or items contain [spec.hostPID ='false']

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.25

Minimize the admission of containers with allowPrivilegeEscalation (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.allowPrivilegeEscalation]

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.allowPrivilegeEscalation] or items contain [spec.allowPrivilegeEscalation ='false']

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.26

Minimize the admission of privileged containers (PSP)

Modification

  • Logic

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.privileged]

  • List<KubernetesPodSecurityPolicy> should have items contain [not spec.privileged] or items contain [spec.privileged ='false']

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.AWS.NET.23

Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports

Removal

 

 

 

  • None

  • LGPD regulation

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AZU.CRY.07

Ensure that Storage account supports customer-managed keys encryption for Blobs

Removal

 

 

 

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure ITSG-33

D9.AZU.CRY.08

Ensure that Storage account supports customer-managed keys encryption for Files

Removal

 

 

 

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure Dashboard System Ruleset

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure ITSG-33

June 08 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.MON.08

Ensure ASC Default policy setting 'Monitor System Updates' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

  • Azure Risk Management

D9.AZU.MON.09

Ensure ASC Default policy setting 'Monitor OS Vulnerabilities' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

  • Azure Risk Management

D9.AZU.MON.10

Ensure ASC Default policy setting 'Monitor Endpoint Protection' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

  • Azure Risk Management

D9.AZU.MON.11

Ensure ASC Default policy setting 'Monitor Disk Encryption' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

  • Azure Risk Management

D9.AZU.MON.14

Ensure ASC Default policy setting 'Enable Next Generation Firewall(NGFW) Monitoring' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.15

Ensure ASC Default policy setting 'Monitor Vulnerability Assessment' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

  • Azure Risk Management

D9.AZU.MON.17

Ensure ASC Default policy setting 'Monitor JIT Network Access' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

  • Azure Risk Management

D9.AZU.MON.18

Ensure ASC Default policy setting 'Monitor Adaptive Application Whitelisting' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.53

Ensure ASC Default policy setting 'SQL Auditing Monitoring Effect' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.54

Ensure ASC Default policy setting 'SQL Encryption Monitoring Effect' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.55

Ensure ASC Default policy setting 'System Configurations Monitoring Effect' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.56

Ensure ASC Default policy setting 'Storage Encryption Monitoring Effect' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.57

Ensure ASC Default policy setting 'Web Application Firewall Monitoring Effect' is not 'Disabled'

Removal

 

 

 

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

June 01 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.MON.03

Ensure SQL Database Threat Detection is Enabled and that Email to Account Admins is also Enabled

Modification

  • Name

  • Logic

  • Ensure that 'Threat Detection' is enabled for Azure SQL Database

  • SQLDB should have threatDetection.state='Enabled'

  • Ensure SQL Database Threat Detection is Enabled and that Email to Account Admins is also Enabled

  • SQLDB should have threatDetection.state='Enabled' and threatDetection.emailToAccountAdmins='Enabled'

  • Azure CIS Foundations v. 1.0.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

D9.AZU.AKS.09

Ensure to not use the deprecated Classic registry

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.34

Ensure custom role definition doesn't have excessive permissions (Wildcard)

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.35

Ensure to audit role assignments that have implicit role management permissions

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.36

Ensure to audit role assignments that have implicit managed identity permissions

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.37

Ensure to audit role assignments that have implicit 'Owner' permissions

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.30

Ensure to not use the deprecated Classic registry

Removal

 

 

 

  • Azure CloudGuard Best Practices

  • Azure ITSG-33

D9.AZU.IAM.31

Ensure SQL Database Threat Detection is Enabled and that Email to Account Admins is also Enabled

Removal

 

 

 

  • Azure CloudGuard Best Practices

  • Azure ITSG-33

May 25 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Comments

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Comments

D9.AWS.CRY.62

Ensure all data in Amazon S3 has been discovered, classified and secured when required.

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

 

D9.GCP.IAM.16

Storage bucket access control should be with uniform bucket-level access

Removal

 

 

 

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

Duplicted rule - GCP.IAM.27

https://gsl.dome9.com/D9.GCP.IAM.27.html

D9.GCP.IAM.17

Storage Bucket default ACL / ACL should not allow public access

Removal

 

 

 

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

Duplicted rule - GCP.IAM.09

https://gsl.dome9.com/D9.GCP.IAM.09.html

May 18 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.K8S.IAM.49

Ensure that anonymous requests are authorized (RBAC)(Openshift)

Modification

  • Name

  • Ensure that anonymous requests are authorized (RBAC)

  • Ensure that anonymous requests are authorized (RBAC)(Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.50

Ensure that the --basic-auth-file argument is not set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --basic-auth-file argument is not set (API Server)

  • Ensure that the --basic-auth-file argument is not set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.51

Ensure that the --token-auth-file parameter is not set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --token-auth-file parameter is not set (API Server)

  • Ensure that the --token-auth-file parameter is not set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.52

Use https for kubelet connections (API Server) (Openshift)

Modification

  • Name

  • Use https for kubelet connections (API Server)

  • Use https for kubelet connections (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.53

Ensure that the kubelet uses certificates to authenticate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the kubelet uses certificates to authenticate (API Server)

  • Ensure that the kubelet uses certificates to authenticate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.54

Verify that the kubelet certificate authority is set as appropriate (API Server) (Openshift)

Modification

  • Name

  • Verify that the kubelet certificate authority is set as appropriate (API Server)

  • Verify that the kubelet certificate authority is set as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.55

Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server)

  • Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.56

Verify that the Node authorizer is enabled (API Server) (Openshift)

Modification

  • Name

  • Verify that the Node authorizer is enabled (API Server)

  • Verify that the Node authorizer is enabled (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.57

Verify that RBAC is enabled (API Server) (Openshift)

Modification

  • Name

  • Verify that RBAC is enabled (API Server)

  • Verify that RBAC is enabled (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.58

Ensure that the APIPriorityAndFairness feature gate is enabled (API Server) (Openshift)

Modification

  • Name

  • Ensure that the APIPriorityAndFairness feature gate is enabled (API Server)

  • Ensure that the APIPriorityAndFairness feature gate is enabled (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.59

Ensure that the admission control plugin AlwaysAdmit is not set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the admission control plugin AlwaysAdmit is not set (API Server)

  • Ensure that the admission control plugin AlwaysAdmit is not set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.60

Ensure that the admission control plugin AlwaysPullImages is not set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the admission control plugin AlwaysPullImages is not set (API Server)

  • Ensure that the admission control plugin AlwaysPullImages is not set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.61

Ensure that the admission control plugin SecurityContextDeny is not set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the admission control plugin SecurityContextDeny is not set (API Server)

  • Ensure that the admission control plugin SecurityContextDeny is not set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.62

Ensure that the admission control plugin ServiceAccount is set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the admission control plugin ServiceAccount is set (API Server)

  • Ensure that the admission control plugin ServiceAccount is set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.75

Ensure that the admission control plugin NamespaceLifecycle is set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the admission control plugin NamespaceLifecycle is set (API Server)

  • Ensure that the admission control plugin NamespaceLifecycle is set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.63

Ensure that the admission control plugin SecurityContextConstraint is set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the admission control plugin SecurityContextConstraint is set (API Server)

  • Ensure that the admission control plugin SecurityContextConstraint is set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.64

Ensure that the admission control plugin SecurityContextConstraint is set (SCC) (Openshift)

Modification

  • Name

  • Ensure that the admission control plugin SecurityContextConstraint is set (SCC)

  • Ensure that the admission control plugin SecurityContextConstraint is set (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.65

Ensure that the admission control plugin SecurityContextConstraint is set (SCC restricted) (Openshift)

Modification

  • Name

  • Ensure that the admission control plugin SecurityContextConstraint is set (SCC restricted)

  • Ensure that the admission control plugin SecurityContextConstraint is set (SCC restricted) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.76

Ensure that the admission control plugin NodeRestriction is set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the admission control plugin NodeRestriction is set (API Server)

  • Ensure that the admission control plugin NodeRestriction is set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.24

Ensure that the --insecure-bind-address argument is not set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --insecure-bind-address argument is not set (API Server)

  • Ensure that the --insecure-bind-address argument is not set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.25

Ensure that the --insecure-port argument is set to 0 (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --insecure-port argument is set to 0 (API Server)

  • Ensure that the --insecure-port argument is set to 0 (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.26

Ensure that the --secure-port argument is not set to 0 (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --secure-port argument is not set to 0 (API Server)

  • Ensure that the --secure-port argument is not set to 0 (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.17

Profiling (metric) is protected by RBAC (RBAC) (Openshift)

Modification

  • Name

  • Profiling (metric) is protected by RBAC (RBAC)

  • Profiling (metric) is protected by RBAC (RBAC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.LOG.06

Ensure that the --audit-log-path argument is set (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --audit-log-path argument is set (API Server)

  • Ensure that the --audit-log-path argument is set (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.LOG.07

Ensure that the maximumRetainedFiles argument is set to 10 or as appropriate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the maximumRetainedFiles argument is set to 10 or as appropriate (API Server)

  • Ensure that the maximumRetainedFiles argument is set to 10 or as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.LOG.08

Ensure that the maximumFileSizeMegabytes argument is set to 100 or as appropriate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the maximumFileSizeMegabytes argument is set to 100 or as appropriate (API Server)

  • Ensure that the maximumFileSizeMegabytes argument is set to 100 or as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.27

Ensure that the --request-timeout argument is set as appropriate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --request-timeout argument is set as appropriate (API Server)

  • Ensure that the --request-timeout argument is set as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.18

Ensure that the --service-account-lookup argument is set to true (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --service-account-lookup argument is set to true (API Server)

  • Ensure that the --service-account-lookup argument is set to true (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.19

Ensure that the --service-account-key-file argument is set as appropriate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --service-account-key-file argument is set as appropriate (API Server)

  • Ensure that the --service-account-key-file argument is set as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.20

Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server)

  • Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.21

Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server)

  • Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.22

Ensure that the --client-ca-file argument is set as appropriate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --client-ca-file argument is set as appropriate (API Server)

  • Ensure that the --client-ca-file argument is set as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.23

Ensure that the --etcd-cafile argument is set as appropriate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --etcd-cafile argument is set as appropriate (API Server)

  • Ensure that the --etcd-cafile argument is set as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.24

Ensure that the --encryption-provider-config argument is set as appropriate (API Server) (Openshift)

Modification

  • Name

  • Ensure that the --encryption-provider-config argument is set as appropriate (API Server)

  • Ensure that the --encryption-provider-config argument is set as appropriate (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.25

Ensure that encryption providers are appropriately configured (API Server) (Openshift)

Modification

  • Name

  • Ensure that encryption providers are appropriately configured (API Server)

  • Ensure that encryption providers are appropriately configured (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.26

Ensure that the API Server only makes use of Strong Cryptographic Ciphers (API Server) (Openshift)

Modification

  • Name

  • Ensure that the API Server only makes use of Strong Cryptographic Ciphers (API Server)

  • Ensure that the API Server only makes use of Strong Cryptographic Ciphers (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.OPE.09

Ensure that garbage collection is configured as appropriate (Kubelet) (Openshift)

Modification

  • Name

  • Ensure that garbage collection is configured as appropriate (Kubelet)

  • Ensure that garbage collection is configured as appropriate (Kubelet) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.27

Profiling (pprof) is protected by RBAC (RBAC) (Openshift)

Modification

  • Name

  • Profiling (pprof) is protected by RBAC (RBAC)

  • Profiling (pprof) is protected by RBAC (RBAC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.28

Ensure that the --use-service-account-credentials argument is set to true (Controller Manager) (Openshift)

Modification

  • Name

  • Ensure that the --use-service-account-credentials argument is set to true (Controller Manager)

  • Ensure that the --use-service-account-credentials argument is set to true (Controller Manager) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.29

Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager) (Openshift)

Modification

  • Name

  • Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager)

  • Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.30

Ensure that the --root-ca-file argument is set as appropriate (Controller Manager) (Openshift)

Modification

  • Name

  • Ensure that the --root-ca-file argument is set as appropriate (Controller Manager)

  • Ensure that the --root-ca-file argument is set as appropriate (Controller Manager) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.31

Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager) (Openshift)

Modification

  • Name

  • Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager)

  • Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.32

Ensure that the --bind-address argument is set to 127.0.0.1 (Controller Manager) (Openshift)

Modification

  • Name

  • Ensure that the --bind-address argument is set to 127.0.0.1 (Controller Manager)

  • Ensure that the --bind-address argument is set to 127.0.0.1 (Controller Manager) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.33

Ensure that the healthz endpoints for the scheduler are protected by RBAC (RBAC) (Openshift)

Modification

  • Name

  • Ensure that the healthz endpoints for the scheduler are protected by RBAC (RBAC)

  • Ensure that the healthz endpoints for the scheduler are protected by RBAC (RBAC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.28

Verify that the scheduler API service is protected by authentication and authorization (Scheduler) (Openshift)

Modification

  • Name

  • Verify that the scheduler API service is protected by authentication and authorization (Scheduler)

  • Verify that the scheduler API service is protected by authentication and authorization (Scheduler) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.34

Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd) (Openshift)

Modification

  • Name

  • Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd)

  • Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.35

Ensure that the --client-cert-auth argument is set to true (etcd) (Openshift)

Modification

  • Name

  • Ensure that the --client-cert-auth argument is set to true (etcd)

  • Ensure that the --client-cert-auth argument is set to true (etcd) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.36

Ensure that the --auto-tls argument is not set to true (etcd) (Openshift)

Modification

  • Name

  • Ensure that the --auto-tls argument is not set to true (etcd)

  • Ensure that the --auto-tls argument is not set to true (etcd) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.37

Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd) (Openshift)

Modification

  • Name

  • Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd)

  • Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.38

Ensure that the --peer-client-cert-auth argument is set to true (etcd) (Openshift)

Modification

  • Name

  • Ensure that the --peer-client-cert-auth argument is set to true (etcd)

  • Ensure that the --peer-client-cert-auth argument is set to true (etcd) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.39

Ensure that the --peer-auto-tls argument is not set to true (etcd) (Openshift)

Modification

  • Name

  • Ensure that the --peer-auto-tls argument is not set to true (etcd)

  • Ensure that the --peer-auto-tls argument is not set to true (etcd) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.40

Ensure that a unique Certificate Authority is used for etcd (etcd) (Openshift)

Modification

  • Name

  • Ensure that a unique Certificate Authority is used for etcd (etcd)

  • Ensure that a unique Certificate Authority is used for etcd (etcd) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.LOG.09

Ensure that a minimal audit policy is created (API Server) (Openshift)

Modification

  • Name

  • Ensure that a minimal audit policy is created (API Server)

  • Ensure that a minimal audit policy is created (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.29

Verify that the read only port is not used or is set to 0 (API Server) (Openshift)

Modification

  • Name

  • Verify that the read only port is not used or is set to 0 (API Server)

  • Verify that the read only port is not used or is set to 0 (API Server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.32

Ensure that the --hostname-override argument is not set (Kubelet) (Openshift)

Modification

  • Name

  • Ensure that the --hostname-override argument is not set (Kubelet)

  • Ensure that the --hostname-override argument is not set (Kubelet) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.41

Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet) (Openshift)

Modification

  • Name

  • Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet)

  • Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.42

Ensure that the --rotate-certificates argument is not set to false (Kubelet) (Openshift)

Modification

  • Name

  • Ensure that the --rotate-certificates argument is not set to false (Kubelet)

  • Ensure that the --rotate-certificates argument is not set to false (Kubelet) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.43

Verify that the RotateKubeletServerCertificate argument is set to true (Kubelet) (Openshift)

Modification

  • Name

  • Verify that the RotateKubeletServerCertificate argument is set to true (Kubelet)

  • Verify that the RotateKubeletServerCertificate argument is set to true (Kubelet) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.44

Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (Kubelet) (Openshift)

Modification

  • Name

  • Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (Kubelet)

  • Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (Kubelet) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.45

Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (API server) (Openshift)

Modification

  • Name

  • Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (API server)

  • Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (API server) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.66

Minimize the admission of privileged containers (SCC) (Openshift)

Modification

  • Name

  • Minimize the admission of privileged containers (SCC)

  • Minimize the admission of privileged containers (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.67

Minimize the admission of containers wishing to share the host process ID namespace (SCC) (Openshift)

Modification

  • Name

  • Minimize the admission of containers wishing to share the host process ID namespace (SCC)

  • Minimize the admission of containers wishing to share the host process ID namespace (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.68

Minimize the admission of containers wishing to share the host IPC namespace (SCC) (Openshift)

Modification

  • Name

  • Minimize the admission of containers wishing to share the host IPC namespace (SCC)

  • Minimize the admission of containers wishing to share the host IPC namespace (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.69

Minimize the admission of containers wishing to share the host network namespace (SCC) (Openshift)

Modification

  • Name

  • Minimize the admission of containers wishing to share the host network namespace (SCC)

  • Minimize the admission of containers wishing to share the host network namespace (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.70

Minimize the admission of containers with allowPrivilegeEscalation (SCC) (Openshift)

Modification

  • Name

  • Minimize the admission of containers with allowPrivilegeEscalation (SCC)

  • Minimize the admission of containers with allowPrivilegeEscalation (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.71

Minimize the admission of root containers (SCC) (Openshift)

Modification

  • Name

  • Minimize the admission of root containers (SCC)

  • Minimize the admission of root containers (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.72

Minimize the admission of containers with the NET_RAW capability (SCC) (Openshift)

Modification

  • Name

  • Minimize the admission of containers with the NET_RAW capability (SCC)

  • Minimize the admission of containers with the NET_RAW capability (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.73

Minimize the admission of containers with added capabilities (SCC) (Openshift)

Modification

  • Name

  • Minimize the admission of containers with added capabilities (SCC)

  • Minimize the admission of containers with added capabilities (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.74

Minimize the admission of containers with capabilities assigned (SCC) (Openshift)

Modification

  • Name

  • Minimize the admission of containers with capabilities assigned (SCC)

  • Minimize the admission of containers with capabilities assigned (SCC) (Openshift)

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.AZU.IAM.15

Ensure the Function app has 'Client Certificates (Incoming client certificates)' set to 'On'

Modification

  • Logic

  • FunctionApp should have clientCertEnabled=true

  • FunctionApp should have inner.clientCertEnabled=true

  • Azure CIS Foundations v. 1.4.0

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.K8S.IAM.79

Minimize the admission of HostPath volumes

New

 

 

 

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.80

Minimize the admission of containers which use HostPorts

New

 

 

 

  • CIS Kubernetes Benchmark v1.23

May 11 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.K8S.IAM.32

Ensure that the cluster-admin role is only used where required (RBAC)

Modification

  • Severity

  • Low

  • Informational

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

  • CIS Kubernetes Benchmark v1.23

D9.AWS.IAM.58

Ensure SNS Topics administrative actions aren't publicly executable without a condition

Modification

  • Name

  • Ensure SNS Topics administrative actions aren’t publicly executable

  • Ensure SNS Topics administrative actions aren't publicly executable without a condition

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.OPE.22

Ensure security contact information is registered

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.GCP.CRY.05

Use customer-managed encryption keys (CMEK) for BigQuery to control encryption Use Cloud KMS keys to protect your data in BigQuery also known as AES-256 keys

Removal

 

 

 

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP HIPAA

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

 

To your attention: An additional I/S change was done to 251 Azure networking rules.

April 27 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.83

Ensure that SQS policy won't allow all actions from all principals

Modification

  • Logic

  • Sqs should not have policy.Statement contain [Effect='Allow' and ((Principal='*' or Principal.AWS='*') and Action contain ['%SQS:*%'])]

  • Sqs should not have policy.Statement contain [Effect='Allow' and ((Principal='*' or Principal.AWS='*') and Action contain ['%SQS:*%']) and Condition ]

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.K8S.NET.16

Ensure that the --request-timeout argument is set as appropriate (API Server)

Removal

 

 

 

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

April 20 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.GCP.NET.29

Ensure no HTTPS proxy load balancers permit SSL policies with weak cipher suites

New

 

 

 

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.NET.30

Ensure no SSL proxy load balancers permit SSL policies with weak cipher suites

New

 

 

 

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.NET.31

Ensure legacy networks do not exist for a project

New

 

 

 

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.AZU.NET.40

Ensure no security groups allow ingress from 0.0.0.0/0 to ICMP (Ping)

Modification

  • Name

  • Logic

  • Ensure that ICMP (Ping) is restricted from the Internet

  • NetworkSecurityGroup should not have inboundRules contain [ protocol in('ICMP', 'All') and action='ALLOW' and source='0.0.0.0/0' ]

  • Ensure no security groups allow ingress from 0.0.0.0/0 to ICMP (Ping)

  • NetworkSecurityGroup should not have inboundRules contain [ protocol in('ICMP') and action='ALLOW' and source='0.0.0.0/0' ]

  • Azure CloudGuard Best Practices

April 13 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.GCP.CRY.14

Ensure that all BigQuery Tables are encrypted with Customer-managed encryption key (CMEK)

New

 

 

 

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.15

Ensure 'Log_hostname' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'on'

Modification

  • Logic

  • CloudSql where databaseVersion like 'POSTGRES%' should have settings.databaseFlags contain [ name like 'log_hostname' and value in('off','on')]

  • CloudSql where databaseVersion like 'POSTGRES%' should have settings.databaseFlags contain [ name like 'log_hostname' and value ='on']

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.16

Ensure That the 'Log_min_messages' Database Flag for Cloud SQL PostgreSQL Instance Is Set to at least 'Warning'

Modification

  • Logic

  • CloudSql where databaseVersion like 'POSTGRES%' should have settings.databaseFlags contain [ name like 'log_min_messages' and value in('debug5','debug4','debug3','debug2','debug1','info','notice','warning','error','log','fatal','panic')]

  • CloudSql where databaseVersion like 'POSTGRES%' should have settings.databaseFlags contain [ name like 'log_min_messages' and value in('warning','error','log','fatal','panic')]

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.22

Ensure that the log metric filter and alerts exist for VPC Network Firewall rule changes

Modification

  • Logic

  • AlertPolicy where conditions contain [ conditionThreshold.logName] and enabled='true' should have conditions contain [ getResource('LogBasedMetric',conditionThreshold.logName) getValue('filter') ='resource.type="gce_firewall_rule" AND protoPayload.methodName="v1.compute.firewalls.patch" OR protoPayload.methodName="v1.compute.firewalls.insert"']

  • AlertPolicy where conditions contain [ conditionThreshold.logName] and enabled='true' should have conditions contain [ getResource('LogBasedMetric',conditionThreshold.logName) getValue('filter') ='resource.type="gce_firewall_rule" AND protoPayload.methodName:"compute.firewalls.patch" OR protoPayload.methodName:"compute.firewalls.insert"OR protoPayload.methodName:"compute.firewalls.delete"']

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.23

Ensure that the log metric filter and alerts exist for VPC network route changes

Modification

  • Logic

  • AlertPolicy where conditions contain [ conditionThreshold.logName] and enabled='true' should have conditions contain [ getResource('LogBasedMetric',conditionThreshold.logName) getValue('filter') ='resource.type="gce_route" AND protoPayload.methodName="beta.compute.routes.patch" OR protoPayload.methodName="beta.compute.routes.insert"']

  • AlertPolicy where conditions contain [ conditionThreshold.logName] and enabled='true' should have conditions contain [ getResource('LogBasedMetric',conditionThreshold.logName) getValue('filter') ='resource.type="gce_route" AND protoPayload.methodName:"compute.routes.delete" OR protoPayload.methodName:"compute.routes.insert"']

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.24

Ensure that the log metric filter and alerts exist for VPC network changes

Modification

  • Logic

  • AlertPolicy where conditions contain [ conditionThreshold.logName] and enabled='true' should have conditions contain [ getResource('LogBasedMetric',conditionThreshold.logName) getValue('filter') ='resource.type=gce_network AND protoPayload.methodName="beta.compute.networks.insert" OR protoPayload.methodName="beta.compute.networks.patch" OR protoPayload.methodName="v1.compute.networks.delete" OR protoPayload.methodName="v1.compute.networks.removePeering" OR protoPayload.methodName="v1.compute.networks.addPeering"']

  • AlertPolicy where conditions contain [ conditionThreshold.logName] and enabled='true' should have conditions contain [ getResource('LogBasedMetric',conditionThreshold.logName) getValue('filter') ='resource.type=gce_network AND (protoPayload.methodName:"compute.networks.insert" OR protoPayload.methodName:"compute.networks.patch" OR protoPayload.methodName:"compute.networks.delete" OR protoPayload.methodName:"compute.networks.removePeering" OR protoPayload.methodName:"compute.networks.addPeering")']

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.NET.23

Ensure That Cloud SQL Database Instances Do Not Implicitly Whitelist All Public IP Addresses

Modification

  • Name

  • Ensure that Cloud SQL database instances are not open to the world

  • Ensure That Cloud SQL Database Instances Do Not Implicitly Whitelist All Public IP Addresses

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.0.0

  • GCP GDPR Readiness

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.NET.25

Use Identity Aware Proxy (IAP) to Ensure Only Traffic From Google IP Addresses are 'Allowed'

Modification

  • Logic

  • Network should have firewallRules contain-all [ sourceRanges length()=2 and sourceRanges with ['35.191.0.0/16'] and sourceRanges with ['130.211.0.0/22'] and TargetServiceAccounts isEmpty() and targetTags isEmpty() and SourceServiceAccounts isEmpty() and allowed contain-all [ipProtocol='tcp' and ports='80' ]]

  • Network should have firewallRules contain-all [ sourceRanges length()=2 and sourceRanges with ['35.235.240.0/20'] and sourceRanges with ['130.211.0.0/22'] and TargetServiceAccounts isEmpty() and targetTags isEmpty() and SourceServiceAccounts isEmpty() and allowed contain [ ipProtocol='tcp' and ports contain-all ['80' and '443']]]

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

April 06 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.CRY.30

Ensure that Spring Cloud App has end-to-end TLS enabled

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.CRY.31

Ensure that Spring Cloud App enforces HTTPS connections

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.33

Ensure that Spring Cloud App has system-assigned managed identity enabled

New

 

 

 

  • Azure CloudGuard Best Practices

April 06 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.GCP.IAM.07

Ensure User-Managed/External Keys for Service Accounts Are Rotated Every 90 Days or Fewer

Modification

  • Name

  • Ensure user-managed/external keys for service accounts are rotated every 90 days or less

  • Ensure User-Managed/External Keys for Service Accounts Are Rotated Every 90 Days or Fewer

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.0.0

  • GCP GDPR Readiness

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.15

Ensure 'Log_hostname' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'on'

Modification

  • Name

  • Ensure 'log_hostname' database flag for Cloud SQL PostgreSQL instance is set appropriately

  • Ensure 'Log_hostname' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'on'

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.16

Ensure That the 'Log_min_messages' Database Flag for Cloud SQL PostgreSQL Instance Is Set to at least 'Warning'

Modification

  • Name

  • Ensure that the 'log_min_messages' database flag for Cloud SQL PostgreSQL instance is set appropriately

  • Ensure That the 'Log_min_messages' Database Flag for Cloud SQL PostgreSQL Instance Is Set to at least 'Warning'

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.NET.25

Use Identity Aware Proxy (IAP) to Ensure Only Traffic From Google IP Addresses are 'Allowed'

Modification

  • Name

  • Ensure Firewall Rules for instances behind Identity Aware Proxy (IAP) only allow the traffic from Google Cloud Loadbalancer (GCLB) Health Check and Proxy Addresses

  • Use Identity Aware Proxy (IAP) to Ensure Only Traffic From Google IP Addresses are 'Allowed'

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.OPE.03

Ensure That Retention Policies on Cloud Storage Buckets Used for Exporting Logs Are Configured Using Bucket Lock

Modification

  • Name

  • Ensure that retention policies on log buckets are configured using Bucket Lock

  • Ensure That Retention Policies on Cloud Storage Buckets Used for Exporting Logs Are Configured Using Bucket Lock

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.VLN.09

Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting Value

Modification

  • Name

  • Ensure 'user connections' database flag for Cloud SQL SQL Server instance is set as appropriate

  • Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting Value

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.3.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

March 30 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.36

S3 bucket should not allow delete actions from all principals without a condition

Modification

  • Name

  • S3 bucket should not allow delete actions from all principals

  • S3 bucket should not allow delete actions from all principals without a condition

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.37

S3 bucket should not allow get actions from all principals without a condition

Modification

  • Name

  • S3 bucket should not allow get actions from all principals

  • S3 bucket should not allow get actions from all principals without a condition

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.38

S3 bucket should not allow list actions from all principals without a condition

Modification

  • Name

  • S3 bucket should not allow list actions from all principals

  • S3 bucket should not allow list actions from all principals without a condition

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.40

S3 bucket should not allow all actions from all principals without a condition

Modification

  • Name

  • S3 bucket should not allow all actions from all principals

  • S3 bucket should not allow all actions from all principals without a condition

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.41

S3 bucket should not allow put or restore actions from all principals without a condition

Modification

  • Name

  • S3 bucket should not allow put or restore actions from all principals

  • S3 bucket should not allow put or restore actions from all principals without a condition

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.NET.06

Ensure S3 buckets are not publicly accessible without a condition

Modification

  • Name

  • Ensure S3 buckets are not publicly accessible

  • Ensure S3 buckets are not publicly accessible without a condition

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.GCP.NET.07

Ensure Global Firewall rule should not allows all traffic

Modification

  • Name

  • Global Firewall rule that allows all traffic

  • Ensure Global Firewall rule should not allows all traffic

  • GCP CloudGuard CheckUp

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard Network Security

  • GCP HIPAA

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.AWS.AS.1001

Ensure that S3 buckets are not publicly accessible without a condition

Modification

  • Name

  • Ensure that S3 buckets are not publicly accessible

  • Ensure that S3 buckets are not publicly accessible without a condition

  • None

  • AWS CloudGuard Best Practices

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.LOG.08

Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible without a condition

Modification

  • Name

  • Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible

  • Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible without a condition

  • AWS CloudGuard S3 Bucket Security

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.GCP.NET.04

Ensure VM Instance should not have public IP

Modification

  • Name

  • VM Instance with public IP

  • Ensure VM Instance should not have public IP

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard Network Security

  • GCP HIPAA

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

  • GCP Risk Management

D9.AWS.CRY.50

Ensure that AWS Secrets Manager service enforces data-at-rest encryption using KMS CMKs

Modification

  • Logic

  • SecretManager should have kmsKeyId

  • SecretManager should not have kmsKeyId isEmpty()

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.97

Ensure EKS Node Group IAM role do not have administrator privileges

New

 

 

 

  • AWS CloudGuard Best Practices

D9.TF.AWS.LOG.06

Ensure CloudTrail logs have KmsKeyId defined

Modification

  • Name

  • Ensure CloudTrail logs are encrypted at rest using KMS CMKs

  • Ensure CloudTrail logs have KmsKeyId defined

  • Terraform AWS CIS Foundations

D9.AZU.IAM.15

Ensure the Function app has 'Client Certificates (Incoming client certificates)' set to 'On'

Modification

  • Name

  • Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'

  • Ensure the Function app has 'Client Certificates (Incoming client certificates)' set to 'On'

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.CFT.CRY.20

Ensure DocDB is encrypted at rest

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.21

Ensure all data stored in the Launch configuration EBS is securely encrypted

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.22

Ensure DAX is encrypted at rest (default is unencrypted)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.16

Ensure no security group ingress allows traffic from 0.0.0.0/0 to ElasticSearch (TCP:9300)

Modification

  • Name

  • Ensure no security groups allow ingress from 0.0.0.0/0 to ElasticSearch (TCP:9300)

  • Ensure no security group ingress allows traffic from 0.0.0.0/0 to ElasticSearch (TCP:9300)

  • AWS CloudFormation ruleset

D9.CFT.NET.17

Ensure no security group ingress allows traffic from 0.0.0.0/0 to Kibana (TCP:5601)

Modification

  • Name

  • Ensure no security groups allow ingress from 0.0.0.0/0 to Kibana (TCP:5601)

  • Ensure no security group ingress allows traffic from 0.0.0.0/0 to Kibana (TCP:5601)

  • AWS CloudFormation ruleset

D9.CFT.NET.18

Ensure no security group ingress allows traffic from 0.0.0.0/0 to Redis (TCP:6379)

Modification

  • Name

  • Ensure no security groups allow ingress from 0.0.0.0/0 to Redis (TCP:6379)

  • Ensure no security group ingress allows traffic from 0.0.0.0/0 to Redis (TCP:6379)

  • AWS CloudFormation ruleset

D9.CFT.NET.19

Ensure no security group ingress allows traffic from 0.0.0.0/0 to etcd (TCP:2379)

Modification

  • Name

  • Ensure no security groups allow ingress from 0.0.0.0/0 to etcd (TCP:2379)

  • Ensure no security group ingress allows traffic from 0.0.0.0/0 to etcd (TCP:2379)

  • AWS CloudFormation ruleset

D9.CFT.NET.20

Ensure no security group ingress allows traffic from 0.0.0.0/0 to MongoDB (TCP:27017)

Modification

  • Name

  • Ensure no security groups allow ingress from 0.0.0.0/0 to MongoDB (TCP:27017)

  • Ensure no security group ingress allows traffic from 0.0.0.0/0 to MongoDB (TCP:27017)

  • AWS CloudFormation ruleset

D9.CFT.NET.21

Ensure no security group ingress allows traffic from 0.0.0.0/0 to MongoDB (TCP:27018)

Modification

  • Name

  • Ensure no security groups allow ingress from 0.0.0.0/0 to MongoDB (TCP:27018)

  • Ensure no security group ingress allows traffic from 0.0.0.0/0 to MongoDB (TCP:27018)

  • AWS CloudFormation ruleset

D9.CFT.NET.28

Ensure DocDB TLS is not disabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.K8S.IAM.77

Ensure that the --DenyServiceExternalIPs is not set

New

 

 

 

  • CIS Kubernetes Benchmark v1.23

D9.K8S.IAM.78

Ensure that the --kubelet-https argument is set to true

New

 

 

 

  • CIS Kubernetes Benchmark v1.23

D9.AWS.OPE.01

Invalid CPU or Memory Value Specified

Removal

 

 

 

  • AWS CloudGuard CheckUp

  • AWS CloudGuard Containers Security

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

D9.AWS.NET.07

Ensure there is an up to date Network Diagram for your cloud network

Removal

 

 

 

  • AWS CloudGuard Best Practices

  • AWS MITRE ATT&CK ™ Framework v10

D9.AZU.NET.05

Change Control for Network Security Group Configuration

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.GCP.NET.05

Ensure there is an up to date Network Diagram for your cloud network

Removal

 

 

 

  • GCP CloudGuard Best Practices

March 23 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.36

S3 bucket should not allow delete actions from all principals

Modification

  • Logic

  • S3Bucket should not have policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*') and (Action contain [$ regexMatch /^s3:Delete/] or Action regexMatch /^s3:Delete/)]

  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition isEmpty() and (Action contain [$ regexMatch /^s3:Delete/] or Action regexMatch /^s3:Delete/)]

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.37

S3 bucket should not allow get actions from all principals

Modification

  • Logic

  • S3Bucket should not have policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*') and (Action contain [$ regexMatch /^s3:Get/] or Action regexMatch /^s3:Get/) ]

  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition isEmpty() and (Action contain [$ regexMatch /^s3:Get/] or Action regexMatch /^s3:Get/) ]

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.38

S3 bucket should not allow list actions from all principals

Modification

  • Logic

  • S3Bucket should not have policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*') and (Action contain [$ regexMatch /^s3:List/] or Action regexMatch /^s3:List/) ]

  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition isEmpty() and (Action contain [$ regexMatch /^s3:List/] or Action regexMatch /^s3:List/) ]

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.40

S3 bucket should not allow all actions from all principals

Modification

  • Logic

  • S3Bucket should not have policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*') and (Action contain [$ = '*'] or Action = '*' ) ]

  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition isEmpty() and (Action contain [$ = '*'] or Action = '*' ) ]

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.41

S3 bucket should not allow put or restore actions from all principals

Modification

  • Logic

  • S3Bucket should not have policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*') and ( (Action contain [$ regexMatch /^s3:Put/] or Action regexMatch /^s3:Put/) or (Action contain [$ = 's3:RestoreObject'] or Action = 's3:RestoreObject') )]

  • S3Bucket should not have policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition isEmpty() and ( (Action contain [$ regexMatch /^s3:Put/] or Action regexMatch /^s3:Put/) or (Action contain [$ = 's3:RestoreObject'] or Action = 's3:RestoreObject') )]

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.92

S3 bucket should not allow delete actions from all principals

New

 

 

 

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.93

S3 bucket should not allow get actions from all principals

New

 

 

 

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.94

S3 bucket should not allow list actions from all principals

New

 

 

 

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.95

S3 bucket should not allow put or restore actions from all principals

New

 

 

 

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.IAM.96

S3 bucket should not allow all actions from all principals

New

 

 

 

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.NET.06

Ensure S3 buckets are not publicly accessible

Modification

  • Logic

  • S3Bucket should not have ( accessPublicBlock isEmpty() = true or accessPublicBlock.ignorePublicAcls = false or accessPublicBlock.restrictPublicBuckets =false ) and ( acl.grants contain [uri like 'http://acs.amazonaws.com/groups/global/%'] or policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*')])

  • S3Bucket should not have ( accessPublicBlock isEmpty() = true or accessPublicBlock.ignorePublicAcls = false or accessPublicBlock.restrictPublicBuckets =false ) and ( acl.grants contain [uri like 'http://acs.amazonaws.com/groups/global/%'] or policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition isEmpty()])

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.NET.76

Ensure S3 buckets are not publicly accessible

New

 

 

 

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.AS.1001

Ensure that S3 buckets are not publicly accessible

Modification

  • Name

  • Logic

  • S3 Buckets - are publicly accessible

  • S3Bucket should not have ( acl.grants contain [uri like 'http://acs.amazonaws.com/groups/global/%'] or policy.Statement contain [Effect='Allow' and (Principal='*' or Principal.AWS='*')])

  • Ensure that S3 buckets are not publicly accessible

  • S3Bucket should not have ( acl.grants contain [uri like 'http://acs.amazonaws.com/groups/global/%'] or policy.Statement with [Effect='Allow' and (Principal='*' or Principal.AWS='*') and Condition isEmpty()])

  • None

  • AWS CloudGuard Best Practices

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.AS.05

Ensure that S3 buckets are not publicly accessible

New

 

 

 

  • None

  • AWS CloudGuard Best Practices

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.LOG.08

Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible

Modification

  • Logic

  • AWS CloudGuard S3 Bucket Security

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.LOG.23

Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible

New

 

 

 

  • AWS CloudGuard S3 Bucket Security

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.GCP.LOG.28

Ensure that sinks are configured for all log entries

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.NET.26

Ensure that DNSSEC is enabled for Cloud DNS

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.NET.27

Ensure that RSASHA1 is not used for the key-signing key in Cloud DNS DNSSEC

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.NET.28

Ensure that RSASHA1 is not used for the zone-signing key in Cloud DNS DNSSEC

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.AWS.IAM.84

Ensure IAM user, group, or role do not have access to create or update login profiles (passwords) for IAM users

Modification

  • Logic

  • IamPolicy where users length()>0 or roles length()>0 or groups length()>0 should not have document.Statement contain [ Effect='Allow' and (Action='iam:UpdateLoginProfile' or Action='iam:CreateLoginProfile') ]

  • IamPolicy where attachmentCount >0 should not have document.Statement contain [ Effect='Allow' and (Action='iam:UpdateLoginProfile' or Action='iam:CreateLoginProfile') ]

  • AWS CloudGuard Best Practices

D9.AWS.IAM.85

Ensure IAM user, group, or role should have IAM access key permissions restricted

Modification

  • Logic

  • IamPolicy where users length()>0 or roles length()>0 or groups length()>0 should not have document.Statement contain [ Effect='Allow' and (Action='iam:DeleteAccessKey' or Action='iam:GetAccessKeyLastUsed' or Action='iam:UpdateAccessKey' or Action='iam:CreateAccessKey' or Action='iam:ListAccessKeys') ]

  • IamPolicy where attachmentCount >0 should not have document.Statement contain [ Effect='Allow' and (Action='iam:DeleteAccessKey' or Action='iam:GetAccessKeyLastUsed' or Action='iam:UpdateAccessKey' or Action='iam:CreateAccessKey' or Action='iam:ListAccessKeys') ]

  • AWS CloudGuard Best Practices

D9.AWS.IAM.86

Ensure IAM user, group, or role should have MFA permissions restricted

Modification

  • Logic

  • IamPolicy where users length()>0 or roles length()>0 or groups length()>0 should not have document.Statement contain [ Effect='Allow' and (Action='iam:DeactivateMFADevice' or Action='iam:EnableMFADevice' or Action='iam:ResyncMFADevicem' or Action='iam:DeleteVirtualMFADevice' or Action='iam:CreateVirtualMFADevice' or Action='iam:ListMFADevices' or Action='iam:ListVirtualMFADevices') ]

  • IamPolicy where attachmentCount >0 should not have document.Statement contain [ Effect='Allow' and (Action='iam:DeactivateMFADevice' or Action='iam:EnableMFADevice' or Action='iam:ResyncMFADevicem' or Action='iam:DeleteVirtualMFADevice' or Action='iam:CreateVirtualMFADevice' or Action='iam:ListMFADevices' or Action='iam:ListVirtualMFADevices') ]

  • AWS CloudGuard Best Practices

D9.AWS.IAM.87

Ensure IAM group do not have administrator privileges

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.88

Ensure IAM groups have at least one IAM User attached

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.89

Ensure IAM User do not have administrator privileges

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.90

Ensure IAM Policy do not have Effect: 'Allow' with 'NotAction' Element

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.91

Ensure OpenSearch should have IAM permissions restricted

New

 

 

 

  • AWS CloudGuard Best Practices

D9.TF.AZU.CRY.16

Ensure storage for critical data are encrypted with Customer Managed Key

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.IAM.04

Avoid using names like 'Admin' for an Azure SQL Server Active Directory Administrator account

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.LOG.04

Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.LOG.05

Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.LOG.08

Ensure that Activity Log Retention is set 365 days or greater

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.NET.11

Ensure Cosmos DB account public network access is disabled

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.NET.12

Ensure Cosmos DB account access is not allowed from all networks

New

 

 

 

  • Azure Terraform Ruleset

D9.GCP.CRY.13

Ensure KMS encryption keys are rotated within a period of 90 days

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.TF.AZU.MON.01

Ensure that 'Auditing' is set to 'On'

Removal

 

 

 

  • Azure Terraform Ruleset

March 16 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.TF.AZU.LOG.06

Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server

New

 

 

 

  • Azure Terraform Ruleset

D9.GCP.IAM.16

Storage bucket access control should be with uniform bucket-level access

Modification

  • Logic

  • StorageBucket should not have acl or defaultObjectAcl

  • StorageBucket should have iamConfiguration.uniformBucketLevelAccess.enabled

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.GCP.IAM.28

Ensure that BigQuery datasets are not anonymously or publicly accessible

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.OPE.03

Ensure that retention policies on log buckets are configured using Bucket Lock

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.AWS.NET.54

Ensure that AWS EKS Cluster endpoint access is not public

Removal

 

 

 

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

March 09 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.CRY.13

Ensure that the expiration date is set on all Secrets

Modification

  • Logic

  • KeyVault where secrets should have secrets contain-none [ enabled=true and expires isEmpty() ] and secrets contain-none [ enabled=true and expires before(1,'days') ]

  • KeyVault where secrets should not have secrets contain [ enabled=true and expires isEmpty() ]

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AWS.IAM.60

Ensure that Role names cannot be enumerable

Modification

  • Logic

  • IamRole should not have name in($Enumeratable_Role_Names)

  • IamRole should not have name in($Enumerable_Role_Names)

  • AWS CloudGuard Best Practices

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.84

Ensure IAM user, group, or role do not have access to create or update login profiles (passwords) for IAM users

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.85

Ensure IAM user, group, or role should have IAM access key permissions restricted

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.86

Ensure IAM user, group, or role should have MFA permissions restricted

New

 

 

 

  • AWS CloudGuard Best Practices

D9.TF.AZU.CRY.14

Ensure Cosmos DB account is encrypted with customer-managed keys

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.CRY.15

Ensure function app is using the latest version of TLS encryption

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.MON.02

Ensure that 'Auditing' Retention is 'greater than 90 days'

Modification

  • Logic

  • azurerm_sql_server should have extended_auditing_policy.retention_in_days>=90

  • azurerm_mssql_server_extended_auditing_policy should have retention_in_days>=90

  • Azure Terraform Ruleset

D9.TF.AZU.VLN.01

Ensure that Advanced Threat Protection (ATP) on a SQL server is set to 'Enabled'

New

 

 

 

  • Azure Terraform Ruleset

D9.AZU.MON.53

Ensure ASC Default policy setting 'SQL Auditing Monitoring Effect' is not 'Disabled'

Modification

  • Logic

  • PolicyAssignment where properties.displayName like '%ASC Default%' should not have properties.parameters.sqlAuditingMonitoringEffect isEmpty() or properties.parameters.sqlAuditingMonitoringEffect='Disabled'

  • PolicyAssignment where properties.displayName like '%ASC Default%' should not have properties.parameters.sqlServerAuditingMonitoringEffect isEmpty() or properties.parameters.sqlServerAuditingMonitoringEffect='Disabled'

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.54

Ensure ASC Default policy setting 'SQL Encryption Monitoring Effect' is not 'Disabled'

Modification

  • Logic

  • PolicyAssignment where properties.displayName like '%ASC Default%' should not have properties.parameters.sqlEncryptionMonitoringEffect isEmpty() or properties.parameters.sqlEncryptionMonitoringEffect='Disabled'

  • PolicyAssignment where properties.displayName like '%ASC Default%' should not have properties.parameters.sqlDbEncryptionMonitoringEffect isEmpty() or properties.parameters.sqlDbEncryptionMonitoringEffect='Disabled'

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.GCP.IAM.17

Storage Bucket default ACL / ACL should not allow public access

Modification

  • Logic

  • StorageBucket should not have defaultObjectAcl contain [ entity regexMatch /allUsers|allAuthenticatedUsers/i ] or acl contain [ entity regexMatch /allUsers|allAuthenticatedUsers/i ]

  • StorageBucket should not have iamPolicy.bindings contain [ members with ['allAuthenticatedUsers']] or iamPolicy.bindings contain [ members with ['allUsers']]

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.CFT.CRY.17

Ensure cloudfront distribution ViewerProtocolPolicy is set to HTTPS

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.18

CloudFront Distribution should have WAF enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.19

Ensure Elasticsearch Domain enforces HTTPS

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.41

Ensure that there is no Wildcard principal in ElasticSearch access policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.42

Ensure that there is no wildcard action in ElasticSearch access policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.43

Ensure API gateway methods are not publicly accessible

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.12

Ensure Cloudfront distribution has Access Logging enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.13

Ensure Elasticsearch Domain Logging is enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.14

Ensure API Gateway has Access Logging enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.15

Ensure API Gateway V2 has Access Logging enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.21

Ensure API Gateway caching is enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.22

Ensure API Gateway has X-Ray Tracing enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.AWS.NET.74

Ensure AWS Lambda function is configured inside a VPC

New

 

 

 

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

D9.AWS.NET.75

Ensure no lambda allow ingress from 0.0.0.0/0 to remote server administration ports

New

 

 

 

  • AWS MITRE ATT&CK ™ Framework v10

  • AWS Risk Management

March 01 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.80

Ensure inactive user for 30 days or greater are disabled

Modification

  • Name

  • Ensure inative user for 30 days or greater are disabled

  • Ensure inactive user for 30 days or greater are disabled

  • AWS CloudGuard Best Practices

D9.TF.AZU.CRY.10

Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.CRY.11

Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.CRY.12

Ensure that 'HTTP Version' is the latest, if used to run the web app

New

 

 

 

  • Azure Terraform Ruleset

D9.TF.AZU.CRY.13

Function App should only be accessible over HTTPS

New

 

 

 

  • Azure Terraform Ruleset

D9.CFT.CRY.16

Ensure Backup Vault is encrypted at rest using KMS CMK

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.10

Ensure DocDB has audit logs enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.11

Ensure DocDB Logging is enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.20

Ensure every security groups rule has a description

New

 

 

 

  • AWS CloudFormation ruleset

D9.GCP.CRY.11

Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.CRY.12

Ensure that a Default Customer-managed encryption key (CMEK) is specified for all BigQuery Data Sets

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

February 23 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.79

Do not setup access keys during initial user setup for all IAM users that have a console password

New

 

 

 

  • AWS CIS Foundations v. 1.1.0

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.CRY.44

Ensure Amazon SQS queues enforce Server-Side Encryption (SSE)

Modification

  • Logic

  • Sqs should have cryptoKey.keyId

  • Sqs should have sqsManagedSseEnabled=true or cryptoKey.enabled=true

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.56

Ensure that SQS policy won't allow all actions from all principals without a condition

Modification

  • Name

  • Logic

  • Ensure that SQS policy won't allow all actions from all principals

  • Sqs should not have policy.Statement contain [Effect='Allow' and ((Principal='*' or Principal.AWS='*') and Action contain ['%SQS:*%'])]

  • Ensure that SQS policy won't allow all actions from all principals without a condition

  • Sqs should not have policy.Statement contain [Effect='Allow' and ((Principal='*' or Principal.AWS='*') and Action contain ['%SQS:*%']) and not Condition]

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.60

Ensure that Role names cannot be enumerable

Modification

  • Name

  • Ensure that Role names cannot be enumeratable

  • Ensure that Role names cannot be enumerable

  • AWS CloudGuard Best Practices

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.80

Ensure inative user for 30 days or greater are disabled

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.81

Ensure whether IAM users are members of at least one IAM group

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.82

Ensure all IAM policies are in use

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.83

Ensure that SQS policy won't allow all actions from all principals

New

 

 

 

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.MON.25

Ensure a log metric filter and alarm exists for AWS MFA Deletion for IAM users

New

 

 

 

  • AWS CloudGuard Best Practices

D9.TF.AZU.NET.10

Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service

Modification

  • Severity

  • Critical

  • High

  • Azure Terraform Ruleset

 

February 16 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.CFT.IAM.39

Ensure AWS RDS database instance is not publicly accessible

New

 

 

 

AWS CloudFormation ruleset

D9.CFT.IAM.40

Ensure RDS cluster has IAM authentication enabled

New

 

 

 

AWS CloudFormation ruleset

D9.CFT.LOG.07

Ensure enhanced monitoring for Amazon RDS instances is enabled

New

 

 

 

AWS CloudFormation ruleset

D9.CFT.LOG.08

Ensure CloudTrail log file validation is enabled

New

 

 

 

AWS CloudFormation ruleset

D9.CFT.LOG.09

Ensure that CloudTrail is integrated with CloudWatch

New

 

 

 

AWS CloudFormation ruleset

D9.CFT.OPE.18

Ensure RDS instances have backup policy

New

 

 

 

AWS CloudFormation ruleset

D9.CFT.OPE.19

Ensure RDS instances have Multi-AZ enabled

New

 

 

 

AWS CloudFormation ruleset

D9.AWS.CRY.49

Ensure that AWS Secret Manager Secret rotation interval is smaller than 30 days

Modification

  • Name

  • Severity

  • Ensure that AWS Secret Manager Secret rotation interval is at least 30 days

  • Medium

  • Ensure that AWS Secret Manager Secret rotation interval is smaller than 30 days

  • Low

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.GCP.NET.25

Ensure Firewall Rules for instances behind Identity Aware Proxy (IAP) only allow the traffic from Google Cloud Loadbalancer (GCLB) Health Check and Proxy Addresses

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.AZU.NET.25

Ensure 'Trusted Microsoft Services' is enabled for Storage Account access

Modification

  • Logic

  • Severity

  • StorageAccount should have networkRuleSet.bypass='AzureServices'

  • High

  • StorageAccount should have networkRuleSet.bypass regexMatch /.*AzureServices.*/

  • Low

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure CIS Foundations v. 1.3.1

D9.TF.AZU.NET.02

Ensure that 'Public access level' is set to Private for blob containers

Modification

Severity

High

Critical

Azure Terraform Ruleset

D9.TF.AZU.NET.03

Ensure that Azure Resource Group has resource lock enabled

Modification

Severity

Low

High

Azure Terraform Ruleset

D9.TF.AZU.NET.06

Ensure that Network Watcher is 'Enabled'

Modification

  • Logic

  • Severity

  • azurerm_network_watcher should have resource_group_name

  • High

  • azurerm_network_watcher_flow_log should have retention_policy.enabled=true

  • Low

Azure Terraform Ruleset

D9.TF.AZU.NET.07

Ensure that Network Security Group Flow Log retention period is 'greater than 90 days'

Modification

Severity

High

Low

Azure Terraform Ruleset

February 09 2022

Full review of the CSPM rules severity. The documentation (link ) details severity criteria and implications.

Full list of rules with updated severities available upon request.

February 02 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.49

Ensure that AWS Secret Manager Secret rotation interval is at least 30 days

Modification

  • Name

  • Logic

  • Ensure that AWS Secret Manager Secret rotation interval is smaller than 30 days

  • SecretManager should have rotationRules.automaticallyAfterDays<30

  • Ensure that AWS Secret Manager Secret rotation interval is at least 30 days

  • SecretManager should have rotationRules.automaticallyAfterDays<=30

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.GCP.IAM.27

Ensure that Cloud Storage buckets have uniform bucket-level access enabled

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.27

Ensure that Cloud DNS logging is enabled for all VPC networks

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

January 26 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.04

Ensure S3 Bucket Policy is set to deny HTTP requests

Modification

  • Name

  • Logic

  • S3 Buckets Secure Transport (SSL)

  • S3Bucket should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false'] and policy.Statement contain [Action contain ['s3:GetObject'] or Action contain ['s3:*'] or Action contain ['*']]

  • Ensure S3 Bucket Policy is set to deny HTTP requests

  • S3Bucket where policy.Statement contain-any [Effect='Allow' and (Action contain ['s3:GetObject'] or Action contain ['s3:PutObject'] or Action contain ['s3:*'] or Action contain ['*'] ) ] should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false' and (Action contain ['s3:GetObject'] or Action contain ['s3:PutObject'] or Action contain ['s3:*'] or Action contain ['*'] ) ]

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.06

Ensure first access key is rotated every 90 days or less

Modification

  • Severity

  • Medium

  • High

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.07

Ensure second access key is rotated every 90 days or less

Modification

  • Severity

  • Medium

  • High

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.75

Ensure second access key is rotated every 45 days or less

New

 

 

 

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.76

Ensure first access key is rotated every 30 days or less

New

 

 

 

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.77

Ensure second access key is rotated every 30 days or less

New

 

 

 

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.78

Ensure first access key is rotated every 45 days or less

New

 

 

 

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.GCP.AS.03

Ensure the GKE Cluster alpha cluster feature is disabled

Modification

  • Severity

  • Medium

  • High

  • GCP CloudGuard CheckUp

  • GCP CloudGuard Containers Security

  • GCP CloudGuard Best Practices

D9.AWS.NET.23

Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports

Modification

  • Name

  • Logic

  • Security Groups - with admin ports too exposed to the public internet

  • SecurityGroup should not have inboundRules with [scope = '0.0.0.0/0' and port in (20, 21, 22, 23, 115, 137, 138, 139, 2049, 3389)]

  • Ensure no security groups allow ingress from 0.0.0.0/0 to remote server administration ports

  • SecurityGroup should not have inboundRules with [ scope='0.0.0.0/0' and ( ( port<=23 and portTo>=20 ) or ( port<=115 and portTo>=115 ) or ( port<=139 and portTo>=137 ) or ( port<=2049 and portTo>=2049 ) or ( port<=3389 and portTo>=3389 ) ) ]

  • None

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.CFT.NET.25

Ensure no security groups allow ingress from 0.0.0.0/0 to etcd (TCP:2379)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.26

Ensure no security groups allow ingress from 0.0.0.0/0 to MongoDB (TCP:27017)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.27

Ensure no security groups allow ingress from 0.0.0.0/0 to MongoDB (TCP:27018)

New

 

 

 

  • AWS CloudFormation ruleset

D9.AWS.IAM.74

Ensure that IAM Access analyzer is enabled for all regions

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.24

Ensure a log metric filter and alarm exists for AWS Organizations changes

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.NET.73

Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.CRY.14

Use encryption for S3 Bucket write actions

Removal

 

 

 

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.NET.1007

Security Groups - with admin ports too exposed to the public internet

Removal

 

 

 

  • None

  • AWS MITRE ATT&CK ™ Framework v10

January 19 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.05

Ensure that encryption is enabled for RDS Instances

Modification

  • Name

  • Logic

  • Use Encrypted RDS storage

  • RDS should have isStorageEncrypted = 'true'

  • Ensure that encryption is enabled for RDS Instances

  • RDS should have isStorageEncrypted=true

  • AWS HIPAA

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.04

Credentials (with password enabled) unused for 45 days or more should be disabled

Modification

  • Name

  • Logic

  • Credentials (with password enabled) unused for 90 days or more should be disabled

  • IamUser where passwordEnabled='true' should have passwordLastUsed after(-90, 'days')

  • Credentials (with password enabled) unused for 45 days or more should be disabled

  • IamUser where passwordEnabled='true' should have passwordLastUsed after(-45, 'days')

  • AWS HIPAA

  • None

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.14

Ensure IAM password policy prevents password reuse

Modification

  • Severity

  • Low

  • High

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.LOG.03

Ensure that CloudTrail trails are integrated with CloudWatch Logs

Modification

  • Name

  • Ensure CloudTrail trails are integrated with CloudWatch

  • Ensure that CloudTrail trails are integrated with CloudWatch Logs

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.LOG.19

Ensure that object-level logging is enabled for S3 buckets

Modification

  • Severity

  • High

  • Medium

  • AWS CloudGuard S3 Bucket Security

  • AWS CloudGuard Best Practices

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.20

Ensure IAM Users Receive Permissions Only Through Groups

Modification

  • Name

  • Ensure IAM policies are attached only to groups or roles

  • Ensure IAM Users Receive Permissions Only Through Groups

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.GCP.AS.01

Ensure `Automatic node repair` is enabled for Kubernetes Clusters

Modification

  • Severity

  • High

  • Medium

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Containers Security

  • GCP CloudGuard Best Practices

D9.GCP.AS.04

Ensure Automatic node upgrades is enabled on Kubernetes Engine Clusters nodes

Modification

  • Name

  • Severity

  • Ensure auto upgrades for an existing node pool

  • High

  • Ensure Automatic node upgrades is enabled on Kubernetes Engine Clusters nodes

  • Medium

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Containers Security

  • GCP CloudGuard Best Practices

D9.GCP.LOG.18

Ensure that Cloud Audit Logging is configured properly across all services and all users from a project

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.19

Ensure log metric filter and alerts exist for project ownership assignments/changes

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.20

Ensure that the log metric filter and alerts exist for Audit Configuration changes

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.21

Ensure that the log metric filter and alerts exist for Custom Role changes

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.22

Ensure that the log metric filter and alerts exist for VPC Network Firewall rule changes

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.23

Ensure that the log metric filter and alerts exist for VPC network route changes

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.24

Ensure that the log metric filter and alerts exist for VPC network changes

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.25

Ensure that the log metric filter and alerts exist for Cloud Storage IAM permission changes

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.26

Ensure that the log metric filter and alerts exist for SQL instance configuration changes

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.CRY.04

Ensure oslogin is enabled for a Virtual Machine

Modification

  • Logic

  • VMInstance should have metadata.items contain [ key='enable-oslogin' and value regexMatch /TRUE/i ]

  • VMInstance should not have metadata.items contain [ key='enable-oslogin' and value regexMatch /FALSE/i ]

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.AWS.IAM.73

Ensure inative user for 90 days or greater are disabled

New

 

 

 

  • AWS CloudGuard Best Practices

D9.TF.AZU.CRY.02

Ensure the blob is recoverable - enable 'Soft Delete' setting for blobs

Modification

  • Logic

  • Severity

  • azurerm_storage_account should have blob_properties.delete_retention_policy

  • High

  • azurerm_storage_account should not have blob_properties.delete_retention_policy.days isEmpty()

  • Medium

  • Azure Terraform Ruleset

D9.TF.AZU.CRY.03

Ensure the storage account containing the container with activity logs is encrypted with BYOK (Use Your Own Key)

Modification

  • Severity

  • Medium

  • High

  • Azure Terraform Ruleset

D9.TF.AZU.IAM.03

Ensure that Register with Azure Active Directory is enabled on App Service

Modification

  • Logic

  • Severity

  • azurerm_app_service should have identity

  • High

  • azurerm_app_service should have identity.type='SystemAssigned'

  • Medium

  • Azure Terraform Ruleset

D9.TF.AZU.LOG.02

Ensure that logging for Azure KeyVault is 'Enabled'

Modification

  • Logic

  • Severity

  • azurerm_monitor_diagnostic_setting should have target_resource_id

  • High

  • azurerm_monitor_diagnostic_setting should have log.enabled=true

  • Medium

  • Azure Terraform Ruleset

D9.AWS.CRY.61

Ensure EBS volume encryption is enabled

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.NET.72

Ensure that S3 Buckets are configured with Block public access (bucket settings)

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.GCP.AS.05

Ensure Automatic node upgrades is enabled on Kubernetes Engine Clusters nodes

Removal

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Containers Security

  • GCP CloudGuard Best Practices

D9.AWS.IAM.12.PCI

Password Policy must require minimal length of 7

Removal

 

 

 

  • AWS PCI-DSS 3.2

  • AWS CloudGuard Well Architected Framework

D9.AWS.IAM.14.PCI

Password policy must prevent reuse of previously used passwords

Removal

 

 

 

  • AWS PCI-DSS 3.2

  • AWS CloudGuard Well Architected Framework

D9.AWS.IAM.1008

Ensure hardware MFA is enabled for the 'root' account

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS MITRE ATT&CK ™ Framework v10

January 12 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.03

Ensure credentials (with first activated accessKey) unused for 45 days or greater are disabled

Modification

  • Name

  • Logic

  • Credentials (with first activated accessKey) unused for 90 days or more should be disabled

  • IamUser where firstAccessKey.isActive='true' and not firstAccessKey.lastRotated after(-90, 'days') should have firstAccessKey.lastUsedDate after(-90, 'days')

  • Ensure credentials (with first activated accessKey) unused for 45 days or greater are disabled

  • IamUser where firstAccessKey.isActive='true' should have firstAccessKey.lastUsedDate after(-45, 'days')

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.05

Ensure credentials (with second activated accessKey) unused for 45 days or greater are disabled

Modification

  • Name

  • Logic

  • Credentials (with second activated accessKey) unused for 90 days or more should be disabled

  • IamUser where secondAccessKey.isActive='true' and not secondAccessKey.lastRotated after(-90, 'days') should have secondAccessKey.lastUsedDate after(-90, 'days')

  • Ensure credentials (with second activated accessKey) unused for 45 days or greater are disabled

  • IamUser where secondAccessKey.isActive='true' should have secondAccessKey.lastUsedDate after(-45, 'days')

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.GCP.IAM.26

Ensure that Separation of duties is enforced while assigning KMS related roles to users

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.TF.AZU.CRY.04

Ensure that Windows machines 'OS disk' are encrypted

Modification

  • Logic

  • Severity

  • azurerm_windows_virtual_machine should not have os_disk with [ disk_encryption_set_id isEmpty() ]

  • Medium

  • azurerm_windows_virtual_machine should not have os_disk.disk_encryption_set_id isEmpty()

  • High

  • Azure Terraform Ruleset

D9.TF.AZU.CRY.05

Ensure that Linux machines 'OS disk' are encrypted

Modification

  • Logic

  • Severity

  • azurerm_linux_virtual_machine should not have os_disk with [ disk_encryption_set_id isEmpty() ]

  • Medium

  • azurerm_linux_virtual_machine should not have os_disk.disk_encryption_set_id isEmpty()

  • High

  • Azure Terraform Ruleset

D9.TF.AZU.CRY.06

Ensure the key vault is recoverable

Modification

  • Logic

  • Severity

  • azurerm_key_vault should have purge_protection_enabled=true and purge_protection_enabled=true

  • Medium

  • azurerm_key_vault should have ( purge_protection_enabled=true and soft_delete_enabled=true and soft_delete_retention_days>=7 )

  • High

  • Azure Terraform Ruleset

D9.TF.AZU.IAM.02

Ensure App Service Authentication is set on Azure App Service

Modification

  • Severity

  • High

  • Medium

  • Azure Terraform Ruleset

D9.CFT.NET.22

Ensure no security groups allow ingress from 0.0.0.0/0 to ElasticSearch (TCP:9300)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.23

Ensure no security groups allow ingress from 0.0.0.0/0 to Kibana (TCP:5601)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.24

Ensure no security groups allow ingress from 0.0.0.0/0 to Redis (TCP:6379)

New

 

 

 

  • AWS CloudFormation ruleset

D9.GCP.IAM.25

Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.AWS.IAM.1005

Ensure credentials (with first activated acccessKey) unused for 90 days or greater are disabled

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.1007

Ensure credentials (with second activated acccessKey) unused for 90 days or greater are disabled

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.IAM.1009

Ensure IAM policies are attached only to groups or roles

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS HITRUST

  • AWS MITRE ATT&CK ™ Framework v10

January 05 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AZU.CRY.26

Ensure that 'Unattached disks' are encrypted with CMK

Modification

  • Logic

  • Disk where properties.diskState='Unattached' should have properties.encryptionSettingsCollection.enabled=true

  • Disk where properties.diskState='Unattached' should have properties.encryption='EncryptionAtRestWithPlatformAndCustomerKeys' or properties.encryption='EncryptionAtRestWithCustomerKey'

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.TF.AZU.CRY.01

Ensure that 'Secure transfer required' is set to 'Enabled' for Storage Accounts

Modification

  • Name

  • Logic

  • Ensure that 'Secure transfer required' is enabled for Storage Accounts

  • azurerm_storage_account should not have enable_https_traffic_only=false

  • Ensure that 'Secure transfer required' is set to 'Enabled' for Storage Accounts

  • azurerm_storage_account should have enable_https_traffic_only=true

  • Terraform Azure CIS Foundations

D9.TF.AZU.CRY.07

Ensure that the expiration date is set on all keys

Modification

  • Logic

  • azurerm_key_vault_key should have expiration_date

  • azurerm_key_vault_key should not have expiration_date isEmpty()

  • Terraform Azure CIS Foundations

D9.TF.AZU.CRY.08

Ensure that the expiration date is set on all Secrets

Modification

  • Logic

  • azurerm_key_vault_secret should have expiration_date

  • azurerm_key_vault_secret should not have expiration_date isEmpty()

  • Terraform Azure CIS Foundations

D9.CFT.LOG.05

Ensure that access logging is enabled for the classic ELB

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.06

Ensure that access logging is enabled for the ELB v2

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.09

Ensure that a classic Load balancer is not internet facing

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.10

Ensure that a Load balancer is not internet facing

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.11

Ensure that ELB has a health check setup

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.12

Ensure that ELB target group has a health check enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.13

Ensure that ELB Listener protocol is HTTPS or SSL

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.14

Ensure that ELB V2 Listener protocol is not HTTP or TCP

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.15

Ensure that ELB v2 drops invalid headers

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.16

Ensure no security groups allow ingress from 0.0.0.0/0 to ElasticSearch (TCP:9300)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.17

Ensure no security groups allow ingress from 0.0.0.0/0 to Kibana (TCP:5601)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.18

Ensure no security groups allow ingress from 0.0.0.0/0 to Redis (TCP:6379)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.19

Ensure no security groups allow ingress from 0.0.0.0/0 to etcd (TCP:2379)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.20

Ensure no security groups allow ingress from 0.0.0.0/0 to MongoDB (TCP:27017)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.21

Ensure no security groups allow ingress from 0.0.0.0/0 to MongoDB (TCP:27018)

New

 

 

 

  • AWS CloudFormation ruleset

January 04 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.K8S.IAM.49

Ensure that anonymous requests are authorized (RBAC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.50

Ensure that the --basic-auth-file argument is not set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.51

Ensure that the --token-auth-file parameter is not set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.52

Use https for kubelet connections (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.53

Ensure that the kubelet uses certificates to authenticate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.54

Verify that the kubelet certificate authority is set as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.55

Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.56

Verify that the Node authorizer is enabled (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.57

Verify that RBAC is enabled (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.58

Ensure that the APIPriorityAndFairness feature gate is enabled (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.59

Ensure that the admission control plugin AlwaysAdmit is not set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.60

Ensure that the admission control plugin AlwaysPullImages is not set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.61

Ensure that the admission control plugin SecurityContextDeny is not set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.62

Ensure that the admission control plugin ServiceAccount is set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.75

Ensure that the admission control plugin NamespaceLifecycle is set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.63

Ensure that the admission control plugin SecurityContextConstraint is set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.64

Ensure that the admission control plugin SecurityContextConstraint is set (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.65

Ensure that the admission control plugin SecurityContextConstraint is set (SCC restricted)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.76

Ensure that the admission control plugin NodeRestriction is set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.24

Ensure that the --insecure-bind-address argument is not set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.25

Ensure that the --insecure-port argument is set to 0 (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.26

Ensure that the --secure-port argument is not set to 0 (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.17

Profiling (metric) is protected by RBAC (RBAC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.LOG.06

Ensure that the --audit-log-path argument is set (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.LOG.07

Ensure that the maximumRetainedFiles argument is set to 10 or as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.LOG.08

Ensure that the maximumFileSizeMegabytes argument is set to 100 or as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.27

Ensure that the --request-timeout argument is set as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.18

Ensure that the --service-account-lookup argument is set to true (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.19

Ensure that the --service-account-key-file argument is set as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.20

Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.21

Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.22

Ensure that the --client-ca-file argument is set as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.23

Ensure that the --etcd-cafile argument is set as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.24

Ensure that the --encryption-provider-config argument is set as appropriate (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.25

Ensure that encryption providers are appropriately configured (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.26

Ensure that the API Server only makes use of Strong Cryptographic Ciphers (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.OPE.09

Ensure that garbage collection is configured as appropriate (Kubelet)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.27

Profiling (pprof) is protected by RBAC (RBAC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.28

Ensure that the --use-service-account-credentials argument is set to true (Controller Manager)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.29

Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.30

Ensure that the --root-ca-file argument is set as appropriate (Controller Manager)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.31

Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.32

Ensure that the --bind-address argument is set to 127.0.0.1 (Controller Manager)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.33

Ensure that the healthz endpoints for the scheduler are protected by RBAC (RBAC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.28

Verify that the scheduler API service is protected by authentication and authorization (Scheduler)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.34

Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.35

Ensure that the --client-cert-auth argument is set to true (etcd)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.36

Ensure that the --auto-tls argument is not set to true (etcd)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.37

Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.38

Ensure that the --peer-client-cert-auth argument is set to true (etcd)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.39

Ensure that the --peer-auto-tls argument is not set to true (etcd)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.40

Ensure that a unique Certificate Authority is used for etcd (etcd)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.LOG.09

Ensure that a minimal audit policy is created (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.29

Verify that the read only port is not used or is set to 0 (API Server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.32

Ensure that the --hostname-override argument is not set (Kubelet)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.41

Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.42

Ensure that the --rotate-certificates argument is not set to false (Kubelet)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.43

Verify that the RotateKubeletServerCertificate argument is set to true (Kubelet)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.44

Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (Kubelet)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.45

Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers (API server)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.66

Minimize the admission of privileged containers (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.67

Minimize the admission of containers wishing to share the host process ID namespace (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.68

Minimize the admission of containers wishing to share the host IPC namespace (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.69

Minimize the admission of containers wishing to share the host network namespace (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.70

Minimize the admission of containers with allowPrivilegeEscalation (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.71

Minimize the admission of root containers (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.72

Minimize the admission of containers with the NET_RAW capability (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.73

Minimize the admission of containers with added capabilities (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.IAM.74

Minimize the admission of containers with capabilities assigned (SCC)

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.NET.33

Ensure that the CNI in use supports Network Policies

New

 

 

 

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

D9.K8S.CRY.16

Ensure that an application uses secrets are as files over secrets as environment variables

Modification

  • Logic

  • KubernetesPod should not have spec.containers contain-any [ env contain-any [ valueFrom.secretKeyRef ] ]

  • KubernetesPod should not have spec.containers contain-any [ env contain-any [ valueFrom.secretKeyRef ] ] or spec.initContainers contain-any [ env contain-any [ valueFrom.secretKeyRef ] ]

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.06

Apply Security Context to Your Pods and Containers

Modification

  • Logic

  • KubernetesPod should have spec.containers contain-all [ securityContext.seLinuxOptions ]

  • KubernetesPod should have spec.containers contain-all [ securityContext.seLinuxOptions ] and (spec.initContainers isEmpty() or spec.initContainers contain-all [ securityContext.seLinuxOptions ])

  • CIS OpenShift Container Platform v4 Benchmark v1.1.0

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.K8S.AC.01

CPU & Memory Limits Should be Set

Modification

  • Logic

  • KubernetesPod should not have spec.containers contain-any [ resources.limits.memory isEmpty() or resources.limits.cpu isEmpty() ]

  • KubernetesPod should not have spec.containers contain-any [ resources.limits.memory isEmpty() or resources.limits.cpu isEmpty() ] or spec.initContainers contain-any [ resources.limits.memory isEmpty() or resources.limits.cpu isEmpty() ]

  • Container Admission Control

D9.K8S.AC.02

CPU & Memory Requests Should be Set

Modification

  • Logic

  • KubernetesPod should not have spec.containers contain-any [ resources.requests.memory isEmpty() ] or spec.containers contain-any [ resources.requests.cpu isEmpty() ]

  • KubernetesPod should not have spec.containers contain-any [ resources.requests.memory isEmpty() ] or spec.containers contain-any [ resources.requests.cpu isEmpty() ] or spec.initContainers contain-any [ resources.requests.memory isEmpty() ] or spec.initContainers contain-any [ resources.requests.cpu isEmpty() ]

  • Container Admission Control

D9.K8S.IAM.19

Do not admit root containers

Modification

  • Logic

  • KubernetesPod should have spec.containers contain-all [ securityContext.runAsNonRoot=true ]

  • KubernetesPod should have spec.containers contain-all [ securityContext.runAsNonRoot=true ] and (spec.initContainers isEmpty() or spec.initContainers contain-all [ securityContext.runAsNonRoot=true ])

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

D9.K8S.IAM.18

Ensure that Containers are not running in privileged mode

Modification

  • Logic

  • KubernetesPod where ((not name regexMatch /cp-resource-management/) or (spec.containers contain [ securityContext ]) and (namespace != 'kube-system')) should not have spec.containers contain [ securityContext.privileged=true ]

  • KubernetesPod where ((not name regexMatch /cp-resource-management/) or (spec.containers contain [ securityContext ]) or (spec.initContainers contain [ securityContext]) and (namespace != 'kube-system')) should not have spec.containers contain [ securityContext.privileged=true ] or spec.initContainers contain [ securityContext.privileged=true ]

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

D9.K8S.IAM.44

Ensure that Containers are not running with dangerous capabilities

Modification

  • Logic

  • KubernetesPod where ((not name regexMatch /cp-resource-management/) and (not name regexMatch /flow-logs/) and (namespace != 'kube-system')) should not have spec.containers.securityContext.capabilities.add contain [ 'ALL' ] or spec.containers.securityContext.capabilities.add contain [ 'SYS_ADMIN' ] or spec.containers.securityContext.capabilities.add contain [ 'NET_ADMIN' ]

  • KubernetesPod where ((not name regexMatch /cp-resource-management/) and (not name regexMatch /flow-logs/) and (namespace != 'kube-system')) should not have spec.containers.securityContext.capabilities.add contain [ 'ALL' ] or spec.containers.securityContext.capabilities.add contain [ 'SYS_ADMIN' ] or spec.containers.securityContext.capabilities.add contain [ 'NET_ADMIN' ] or spec.initContainers.securityContext.capabilities.add contain [ 'ALL' ] or spec.initContainers.securityContext.capabilities.add contain [ 'SYS_ADMIN' ] or spec.initContainers.securityContext.capabilities.add contain [ 'NET_ADMIN' ]

  • Kubernetes v.1.14 CloudGuard Best Practices

D9.K8S.IAM.45

Ensure that Containers are not running with insecure capabilities

Modification

  • Logic

  • KubernetesPod where ((not name regexMatch /cp-resource-management/) and (not name regexMatch /flow-logs/) and (namespace != 'kube-system')) should not have spec.containers.securityContext.capabilities.add contain [ 'CHOWN' ] or spec.containers.securityContext.capabilities.add contain [ 'DAC_OVERRIDE' ] or spec.containers.securityContext.capabilities.add contain [ 'FSETID' ] or spec.containers.securityContext.capabilities.add contain [ 'FOWNER' ] or spec.containers.securityContext.capabilities.add contain [ 'SETGID' ] or spec.containers.securityContext.capabilities.add contain [ 'MKNOD' ] or spec.containers.securityContext.capabilities.add contain [ 'NET_RAW' ] or spec.containers.securityContext.capabilities.add contain [ 'SETUID' ] or spec.containers.securityContext.capabilities.add contain [ 'NET_BIND_SERVICE' ] or spec.containers.securityContext.capabilities.add contain [ 'SETFCAP' ] or spec.containers.securityContext.capabilities.add contain [ 'SETPCAP' ] or spec.containers.securityContext.capabilities.add contain [ 'SYS_CHROOT' ] or spec.containers.securityContext.capabilities.add contain [ 'KILL' ] or spec.containers.securityContext.capabilities.add contain [ 'AUDIT_WRITE' ] or spec.containers.securityContext.capabilities.add contain [ 'FSETID' ]

  • KubernetesPod where ((not name regexMatch /cp-resource-management/) and (not name regexMatch /flow-logs/) and (namespace != 'kube-system')) should not have spec.containers.securityContext.capabilities.add contain [ 'CHOWN' ] or spec.containers.securityContext.capabilities.add contain [ 'DAC_OVERRIDE' ] or spec.containers.securityContext.capabilities.add contain [ 'FSETID' ] or spec.containers.securityContext.capabilities.add contain [ 'FOWNER' ] or spec.containers.securityContext.capabilities.add contain [ 'SETGID' ] or spec.containers.securityContext.capabilities.add contain [ 'MKNOD' ] or spec.containers.securityContext.capabilities.add contain [ 'NET_RAW' ] or spec.containers.securityContext.capabilities.add contain [ 'SETUID' ] or spec.containers.securityContext.capabilities.add contain [ 'NET_BIND_SERVICE' ] or spec.containers.securityContext.capabilities.add contain [ 'SETFCAP' ] or spec.containers.securityContext.capabilities.add contain [ 'SETPCAP' ] or spec.containers.securityContext.capabilities.add contain [ 'SYS_CHROOT' ] or spec.containers.securityContext.capabilities.add contain [ 'KILL' ] or spec.containers.securityContext.capabilities.add contain [ 'AUDIT_WRITE' ] or spec.containers.securityContext.capabilities.add contain [ 'FSETID' ] or spec.initContainers.securityContext.capabilities.add contain [ 'CHOWN' ] or spec.initContainers.securityContext.capabilities.add contain [ 'DAC_OVERRIDE' ] or spec.initContainers.securityContext.capabilities.add contain [ 'FSETID' ] or spec.initContainers.securityContext.capabilities.add contain [ 'FOWNER' ] or spec.initContainers.securityContext.capabilities.add contain [ 'SETGID' ] or spec.initContainers.securityContext.capabilities.add contain [ 'MKNOD' ] or spec.initContainers.securityContext.capabilities.add contain [ 'NET_RAW' ] or spec.initContainers.securityContext.capabilities.add contain [ 'SETUID' ] or spec.initContainers.securityContext.capabilities.add contain [ 'NET_BIND_SERVICE' ] or spec.initContainers.securityContext.capabilities.add contain [ 'SETFCAP' ] or spec.initContainers.securityContext.capabilities.add contain [ 'SETPCAP' ] or spec.initContainers.securityContext.capabilities.add contain [ 'SYS_CHROOT' ] or spec.initContainers.securityContext.capabilities.add contain [ 'KILL' ] or spec.initContainers.securityContext.capabilities.add contain [ 'AUDIT_WRITE' ] or spec.initContainers.securityContext.capabilities.add contain [ 'FSETID' ]

  • Kubernetes v.1.14 CloudGuard Best Practices

January 02 2022

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.IAM.70

Ensure 'AWSSupportServiceRolePolicy' policy does not use 'v20' policy version

New

 

 

 

  • AWS CloudGuard S3 Bucket Security

  • AWS CloudGuard Best Practices

D9.AWS.IAM.71

Ensure AWS IAM managed policies do not have 'getObject' or full S3 action permissions

New

 

 

 

  • AWS CloudGuard S3 Bucket Security

  • AWS CloudGuard Best Practices

D9.AWS.IAM.72

Ensure undedicated AWS IAM managed policies do not have full action permissions

New

 

 

 

  • AWS CloudGuard Best Practices

December 29 2021

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.03

Ensure that S3 Buckets are encrypted with CMK

Modification

  • Name

  • Logic

  • S3 Buckets Server Side Encryption At Rest

  • S3Bucket should have encryption.serverSideEncryptionRules

  • Ensure that S3 Buckets are encrypted with CMK

  • S3Bucket should have encryption.serverSideEncryptionRules contain [ not serverSideEncryptionByDefault.serverSideEncryptionKeyManagementServiceKeyId isEmpty() ]

  • AWS HIPAA

  • None

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS Dashboard System Ruleset

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.LOG.09

Ensure rotation for customer created CMKs is enabled

Modification

  • Logic

  • KMS where isCustomerManaged=true and deletionDate <=0 should have rotationStatus=true

  • KMS where isCustomerManaged=true and deletionDate<=0 and isSymmetricKey=true should have rotationStatus=true

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.CRY.57

SSL/TLS certificates expire in 45 days

New

 

 

 

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

D9.AWS.IAM.67

Ensure policy attached to IAM identities requires SSL/TLS to manage IAM access keys

New

 

 

 

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS ISO 27001:2013

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Best Practices

D9.GCP.IAM.24

Ensure API keys are not created for a project

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.AWS.CRY.58

Ensure IAM server certificate was not uploaded before the Heartbleed security bug fix

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.CRY.59

Ensure ACM certificate was not issued before the Heartbleed security bug fix

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.CRY.60

Ensure ACM certificate is using a minimum of 2048-bit key for RSA certificate

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.68

Ensure 'root' account does not have an active X.509 signing certificate

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.69

Ensure IAM Role does not have inline policies

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.1001

Accounts - with 'root' in use

Removal

 

 

 

  • None

  • AWS MITRE ATT&CK ™ Framework v10

December 22 2021

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.04

S3 Buckets Secure Transport (SSL)

Modification

  • Logic

  • S3Bucket should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false'] and policy.Statement contain [Action contain ['s3:GetObject'] or Action contain ['s3:*']]

  • S3Bucket should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false'] and policy.Statement contain [Action contain ['s3:GetObject'] or Action contain ['s3:*'] or Action contain ['*']]

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AWS.CRY.14

Use encryption for S3 Bucket write actions

Modification

  • Logic

  • S3Bucket should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false'] and policy.Statement contain [Action contain ['s3:PutObject'] or Action contain ['s3:*']]

  • S3Bucket should have policy.Statement contain [Effect='Deny' and Condition.Bool.aws:SecureTransport='false'] and policy.Statement contain [Action contain ['s3:PutObject'] or Action contain ['s3:*'] or Action contain ['*']]

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

  • AWS MITRE ATT&CK ™ Framework v10

D9.AZU.LOG.12

Ensure that logging for Azure KeyVault is 'Enabled'

Modification

  • Name

  • Ensure AuditEvent logging for Azure Key Vault is enabled

  • Ensure that logging for Azure KeyVault is 'Enabled'

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.11

Ensure that 'Data encryption' is set to 'On' on a SQL Database

Modification

  • Name

  • Ensure Transparent Data Encryption (TDE) is enabled for SQL Databases

  • Ensure that 'Data encryption' is set to 'On' on a SQL Database

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure Dashboard System Ruleset

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.NET.01

Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP)

Modification

  • Name

  • Ensure that no SQL Server allows ingress from 0.0.0.0/0 (ANY IP)

  • Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP)

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Network Security Alerts

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure CIS Foundations v. 1.3.1

D9.GCP.IAM.22

Ensure API keys are rotated every 90 days

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.IAM.23

Ensure API keys are restricted to only APIs that application needs access

New

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.AZU.CRY.06

Ensure that 'Secure transfer required' is set to 'Enabled'

Modification

  • Name

  • Ensure that 'Secure transfer required' (HTTPS) is enabled for Storage Accounts

  • Ensure that 'Secure transfer required' is set to 'Enabled'

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure Dashboard System Ruleset

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.12

Ensure that the expiration date is set on all keys

Modification

  • Name

  • Ensure expiration date is set for all keys

  • Ensure that the expiration date is set on all keys

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.13

Ensure that the expiration date is set on all Secrets

Modification

  • Name

  • Ensure that the expiry date is set on all secrets

  • Ensure that the expiration date is set on all Secrets

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.01

Ensure Azure Keyvaults are used to store secrets

Modification

  • Name

  • Ensure that Key Vault is in use

  • Ensure Azure Keyvaults are used to store secrets

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure NIST CSF v1.1

  • Azure HIPAA

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.21

Ensure that 'Auditing' is set to 'On'

Modification

  • Name

  • Ensure that 'Auditing' in SQL Servers is set to 'On'

  • Ensure that 'Auditing' is set to 'On'

  • Azure ISO 27001:2013

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.22

Ensure that 'Auditing' Retention is 'greater than 90 days'

Modification

  • Name

  • Ensure that 'Auditing' Retention on SQL Server is 'greater than 90 days'

  • Ensure that 'Auditing' Retention is 'greater than 90 days'

  • Azure ISO 27001:2013

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.AKS.08

Enable role-based access control (RBAC) within Azure Kubernetes Services

Modification

  • Name

  • Ensure that Role Based Access Control (RBAC) is enabled in your AKS Cluster

  • Enable role-based access control (RBAC) within Azure Kubernetes Services

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

  • Azure CIS Foundations v. 1.3.1

D9.AZU.IAM.04

Ensure that Azure Active Directory Admin is configured

Modification

  • Name

  • Ensure that Azure Active Directory Admin is configured for SQL Server

  • Ensure that Azure Active Directory Admin is configured

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.CRY.24

Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service

Modification

  • Name

  • Web Application should only be accessible over HTTPS

  • Ensure web app redirects all HTTP traffic to HTTPS in Azure App Service

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.IAM.15

Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'

Modification

  • Name

  • Enable Incoming Client Certificates

  • Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.MON.46

Ensure Diagnostic Setting captures appropriate categories

Modification

  • Name

  • Ensure that Azure Monitor Logs collects all types of activities

  • Ensure Diagnostic Setting captures appropriate categories

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

  • Azure CIS Foundations v. 1.3.1

D9.AZU.NET.38

Ensure FTP deployments are disabled

Modification

  • Name

  • Ensure that FTP (TCP:21) is restricted from the Internet

  • Ensure FTP deployments are disabled

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.3.1

D9.CFT.OPE.12

Ensure that detailed monitoring for EC2 instances is enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.13

Ensure that AWS Lambda function is configured for function-level concurrent execution limit

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.14

Ensure that every security group ingress rule has a description

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.15

Ensure that every security group egress rule has a description

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.16

Ensure that every security group ingress object has a description

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.17

Ensure that every security group egress object has a description

New

 

 

 

  • AWS CloudFormation ruleset

D9.GCP.CRY.10

Ensure that Compute instances do not have public IP addresses

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.IAM.21

Ensure that instances are not configured to use the default service account

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.VLN.09

Ensure 'user connections' database flag for Cloud SQL SQL Server instance is set as appropriate

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.VLN.10

Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configured

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

December 15 2021

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.GCP.NET.08

Ensure that IP forwarding is not enabled on Instances

Modification

  • Logic

  • VMInstance should have canIpForward=false

  • VMInstance should not have canIpForward=true

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Network Security

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.CFT.IAM.30

Ensure that there is no wildcard action in an inline KMS key policy

Modification

  • Logic

  • AWS_KMS_Key should not have KeyPolicy.Statement contain-any [ Action='*' ]

  • AWS_KMS_Key should not have KeyPolicy.Statement contain-any [ Effect='Allow' and Action='*' ]

  • AWS CloudFormation ruleset

D9.CFT.IAM.31

Ensure that there is no wildcard principal in an inline KMS key policy

Modification

  • Logic

  • AWS_KMS_Key should not have KeyPolicy.Statement contain-any [ Principal='*' or Principal.AWS = '*' ]

  • AWS_KMS_Key should not have KeyPolicy.Statement contain-any [ Effect='Allow' and ( Principal='*' or Principal.AWS='*' ) ]

  • AWS CloudFormation ruleset

D9.CFT.IAM.32

Ensure that there is no wildcard action in an inline KMS replica key policy

Modification

  • Logic

  • AWS_KMS_ReplicaKey should not have KeyPolicy.Statement contain-any [ Action='*' ]

  • AWS_KMS_ReplicaKey should not have KeyPolicy.Statement contain-any [ Effect='Allow' and Action='*' ]

  • AWS CloudFormation ruleset

D9.CFT.IAM.33

Ensure that there is no wildcard principal in an inline KMS replica key policy

Modification

  • Logic

  • AWS_KMS_ReplicaKey should not have KeyPolicy.Statement contain-any [ Principal='*' or Principal.AWS='*' ]

  • AWS_KMS_ReplicaKey should not have KeyPolicy.Statement contain-any [ Effect='Allow' and ( Principal='*' or Principal.AWS='*' ) ]

  • AWS CloudFormation ruleset

D9.CFT.IAM.35

Ensure that an inline IAM user policy does not allow full administrative rights

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.36

Ensure that an inline IAM role policy does not allow full administrative rights

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.37

Ensure that an inline KMS key policy does not allow full administrative rights

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.38

Ensure that an inline KMS replica key policy does not allow full administrative rights

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.10

Ensure that EC2 instance does not have public IP enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.11

Ensure that EC2 is EBS optimized

New

 

 

 

  • AWS CloudFormation ruleset

D9.GCP.LOG.03

Ensure that the 'log_connections' database flag for Cloud SQL PostgreSQL instance is set to 'on'

Modification

  • Name

  • Logic

  • Ensure Cloud SQL - PostgreSQL server has log_connections and log_disconnections database flags set to on

  • CloudSql where databaseVersion like 'POSTGRES%' should have settings.databaseFlags contain [ name like 'log_connections' and value like 'on' ] and settings.databaseFlags contain [ name like 'log_disconnections' and value like 'on' ]

  • Ensure that the 'log_connections' database flag for Cloud SQL PostgreSQL instance is set to 'on'

  • CloudSql where databaseVersion like 'POSTGRES%' should have settings.databaseFlags contain [ name like 'log_connections' and value like 'on' ]

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.12

Ensure that the 'log_disconnections' database flag for Cloud SQL PostgreSQL instance is set to 'on'

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.CRY.08

Ensure Compute instances are launched with Shielded VM enabled

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.16

Ensure that the 'log_min_messages' database flag for Cloud SQL PostgreSQL instance is set appropriately

New

 

 

 

  • GCP CIS Foundations v. 1.1.0

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.13

Ensure 'log_statement' database flag for Cloud SQL PostgreSQL instance is set appropriately

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.14

Ensure 'log_error_verbosity' database flag for Cloud SQL PostgreSQL instance is set to 'default' or stricter

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.CRY.09

Ensure that Compute instances have Confidential Computing enabled

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.15

Ensure 'log_hostname' database flag for Cloud SQL PostgreSQL instance is set appropriately

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

D9.GCP.LOG.17

Ensure 'log_min_error_statement' database flag for Cloud SQL PostgreSQL instance is set to 'Error' or stricter

New

 

 

 

  • GCP CIS Foundations v. 1.2.0

  • GCP CloudGuard Best Practices

December 08 2021

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.DNS.06

Ensure S3 Bucket exists for CNAME records routing traffic to an S3 Bucket website endpoint

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.DNS.07

Ensure S3 Bucket exists for A records routing traffic to an S3 Bucket website endpoint

New

 

 

 

  • AWS CloudGuard Best Practices

D9.K8S.IAM.31

Ensure that the default namespace is not used

Modification

  • Name

  • The default namespace should not be used

  • Ensure that the default namespace is not used

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.CFT.IAM.25

Ensure that there is no wildcard resources in an inline IAM group policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.26

Ensure that there is no wildcard action in an inline IAM user policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.27

Ensure that there is no wildcard resource in an inline IAM user policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.28

Ensure that there is no wildcard action in an inline IAM role policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.29

Ensure that there is no wildcard resource in an inline IAM role policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.30

Ensure that there is no wildcard action in an inline KMS key policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.31

Ensure that there is no wildcard principal in an inline KMS key policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.32

Ensure that there is no wildcard action in an inline KMS replica key policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.33

Ensure that there is no wildcard principal in an inline KMS replica key policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.34

Ensure that an inline IAM group policy does not allow full administrative rights

New

 

 

 

  • AWS CloudFormation ruleset

D9.K8S.CRY.16

Ensure that an application uses secrets are as files over secrets as environment variables

Modification

  • Name

  • Severity

  • Prefer using secrets as files over secrets as environment variables

  • Medium

  • Ensure that an application uses secrets are as files over secrets as environment variables

  • High

  • CIS Kubernetes Benchmark v1.20

D9.GCP.LOG.07

Ensure 'log_duration' database flag for Cloud SQL PostgreSQL instance is set to 'on'

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.LOG.08

Ensure 'log_parser_stats' database flag for Cloud SQL PostgreSQL instance is set to 'off'

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.LOG.09

Ensure 'log_planner_stats' database flag for Cloud SQL PostgreSQL instance is set to 'off'

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.LOG.10

Ensure 'log_executor_stats' database flag for Cloud SQL PostgreSQL instance is set to 'off'

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.LOG.11

Ensure 'log_statement_stats' database flag for Cloud SQL PostgreSQL instance is set to 'off'

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.VLN.05

Ensure 'skip_show_database' database flag for Cloud SQL Mysql instance is set to 'on'

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.VLN.06

Ensure 'external scripts enabled' database flag for Cloud SQL SQL Server instance is set to 'off'

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.VLN.07

Ensure 'remote access' database flag for Cloud SQL SQL Server instance is set to 'off'

New

 

 

 

  • GCP CloudGuard Best Practices

D9.GCP.VLN.08

Ensure '3625 (trace flag)' database flag for Cloud SQL SQL Server instance is set to 'off'

New

 

 

 

  • GCP CloudGuard Best Practices

D9.AZU.AS.02

Ensure that Cosmos DB Account has an associated tag

Removal

 

 

 

  • Azure CloudGuard Best Practices

  • Azure HITRUST v9.5.0

  • Azure ITSG-33

December 01 2021

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.AWS.CRY.56

Ensure that all the expired SSL/TLS certificates stored in AWS IAM are removed

New

 

 

 

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.64

Ensure inactive IAM access keys are deleted

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.65

Ensure IAM users have either access key or console password enabled

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.IAM.66

Ensure IAM users are managed centrally via identity federation or AWS Organizations for multi-account environments

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.CFT.CRY.14

Ensure that RDS global cluster has encryption enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.15

Ensure that RDS DB cluster has encryption enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.22

Ensure that RDS IAM authentication is enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.23

Ensure that AWS lambda layer version permissions does not have a wildcard principal

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.24

Ensure that there is no wildcard action in an inline IAM group policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.09

Ensure that AWS Lambda function is configured for a Dead Letter Queue

New

 

 

 

  • AWS CloudFormation ruleset

D9.AWS.IAM.17.HIPAA

Ensure MFA is enabled for the 'root' account

Removal

 

 

 

  • AWS HIPAA

  • AWS CloudGuard Well Architected Framework

  • AWS HITRUST

November 24 2021

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Before

After

Affected Rulesets

D9.GCP.CRY.01

Ensure VM disks for critical VMs are encrypted with Customer-Supplied Encryption Keys (CSEK)

Modification

  • Name

  • Logic

  • Ensure VM disks are encrypted with Customer-Managed or Customer-Supplied Encryption Keys

  • VMInstance should have disks contain-all [ diskEncryptionType like 'CustomerManagedKey' or diskEncryptionType like 'CustomerSuppliedKey' ]

  • Ensure VM disks for critical VMs are encrypted with Customer-Supplied Encryption Keys (CSEK)

  • VMInstance should have disks contain-all [ diskEncryptionType like 'CustomerSuppliedKey']

  • GCP CloudGuard CheckUp

  • GCP CIS Foundations v. 1.0.0

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP HIPAA

  • GCP Dashboard System Ruleset

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.GCP.IAM.02

Ensure that corporate login credentials are used

Modification

  • Name

  • Ensure that corporate login credentials are used instead of personal Gmail accounts

  • Ensure that corporate login credentials are used

  • GCP CloudGuard CheckUp

  • GCP CIS Foundations v. 1.0.0

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP CSA CCM v.3.0.1

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard SOC2 based on AICPA TSC 2017

  • GCP HIPAA

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.GCP.IAM.09

Ensure that Cloud Storage bucket is not anonymously or publicly accessible

Modification

  • Name

  • Ensure that Cloud Storage bucket is not anonymously and/or publicly accessible

  • Ensure that Cloud Storage bucket is not anonymously or publicly accessible

  • GCP CloudGuard CheckUp

  • GCP CIS Foundations v. 1.0.0

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP HIPAA

  • GCP Dashboard System Ruleset

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.GCP.NET.11

Ensure 'Ensure 'Enable connecting to serial ports' is not enabled for VM Instance

Modification

  • Name

  • Ensure 'Enable connecting to serial ports' is disabled for VM Instance

  • Ensure 'Ensure 'Enable connecting to serial ports' is not enabled for VM Instance

  • GCP CloudGuard CheckUp

  • GCP CIS Foundations v. 1.0.0

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP CloudGuard Network Security

  • GCP CloudGuard Best Practices

D9.GCP.NET.08

Ensure that IP forwarding is not enabled on Instances

Modification

  • Name

  • Ensure VM instance IP forwarding is disabled

  • Ensure that IP forwarding is not enabled on Instances

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Network Security

  • GCP CloudGuard Best Practices

D9.GCP.NET.16

Ensure VPC Flow logs is enabled for every subnet in a VPC Network

Modification

  • Name

  • Ensure VPC Flow logs is enabled for every subnet in VPC Network

  • Ensure VPC Flow logs is enabled for every subnet in a VPC Network

  • GCP CIS Foundations v. 1.0.0

  • GCP HIPAA

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.GCP.CRY.07

Ensure that the Cloud SQL database instance requires all incoming connections to use SSL

Modification

  • Name

  • Ensure to use SSL/TLS certificates to encrypt data when using Public IP on your Cloud SQL instance

  • Ensure that the Cloud SQL database instance requires all incoming connections to use SSL

  • GCP HIPAA

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.GCP.NET.23

Ensure that Cloud SQL database instances are not open to the world

Modification

  • Name

  • Ensure that Cloud SQL instances are not publicly accessible

  • Ensure that Cloud SQL database instances are not open to the world

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.AZU.IAM.32

Ensure Virtual Network Gateway is configured with Cryptographic Algorithm

New

 

 

 

  • AZU ITSG-33

D9.GCP.DR.01

Ensure that Cloud SQL database instances are configured with automated backups

Modification

  • Name

  • Ensure that auto backup is enabled for your Cloud SQL instance

  • Ensure that Cloud SQL database instances are configured with automated backups

  • GCP CloudGuard Best Practices

D9.GCP.LOG.02

Ensure that the 'log_checkpoints' database flag for Cloud SQL PostgreSQL instance is set to 'on'

Modification

  • Name

  • Ensure Cloud SQL - PostgreSQL server has log_checkpoints database flag set to on

  • Ensure that the 'log_checkpoints' database flag for Cloud SQL PostgreSQL instance is set to 'on'

  • GCP CloudGuard Best Practices

D9.GCP.LOG.04

Ensure that the 'log_lock_waits' database flag for Cloud SQL PostgreSQL instance is set to 'on'

Modification

  • Name

  • Ensure Cloud SQL - PostgreSQL server has log_lock_waits database flag set to on

  • Ensure that the 'log_lock_waits' database flag for Cloud SQL PostgreSQL instance is set to 'on'

  • GCP CloudGuard Best Practices

D9.GCP.LOG.05

Ensure that the 'log_temp_files' database flag for Cloud SQL PostgreSQL instance is set to '0' (on)

Modification

  • Name

  • Ensure Cloud SQL - PostgreSQL server has log_temp_files database flag set to '0' - (on)

  • Ensure that the 'log_temp_files' database flag for Cloud SQL PostgreSQL instance is set to '0' (on)

  • GCP CloudGuard Best Practices

D9.GCP.LOG.06

Ensure that the 'log_min_duration_statement' database flag for Cloud SQL PostgreSQL instance is set to '-1' (disabled)

Modification

  • Name

  • Ensure Cloud SQL - PostgreSQL server has log_min_duration_statement database flag set to '-1' - (off)

  • Ensure that the 'log_min_duration_statement' database flag for Cloud SQL PostgreSQL instance is set to '-1' (disabled)

  • GCP CloudGuard Best Practices

D9.GCP.VLN.02

Ensure that the 'local_infile' database flag for a Cloud SQL Mysql instance is set to 'off'

Modification

  • Name

  • Ensure Cloud SQL - MYSQL server has local_infile database flag set to off

  • Ensure that the 'local_infile' database flag for a Cloud SQL Mysql instance is set to 'off'

  • GCP CloudGuard Best Practices

D9.GCP.VLN.03

Ensure that the 'cross db ownership chaining' database flag for Cloud SQL SQL Server instance is set to 'off'

Modification

  • Name

  • Ensure Cloud SQL - SQL Server instance has 'cross db ownership chaining' database flag set to off

  • Ensure that the 'cross db ownership chaining' database flag for Cloud SQL SQL Server instance is set to 'off'

  • GCP CloudGuard Best Practices

D9.GCP.VLN.04

Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is set to 'off'

Modification

  • Name

  • Ensure Cloud SQL - SQL Server instance has 'contained database authentication' database flag set to off

  • Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is set to 'off'

  • GCP CloudGuard Best Practices

November 17 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.43

Ensure MFA Delete is enable on S3 buckets

Modification

  • Name

  • S3 bucket should have versioning MFA delete enabled

  • Ensure MFA Delete is enable on S3 buckets

  • AWS HIPAA

  • AWS CloudGuard S3 Bucket Security

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS CCPA Framework

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.04

Ensure a log metric filter and alarm exist for IAM policy changes

Modification

  • Logic

  • List<CloudTrail> should have items with [hasSNSSubscriber='true' and metricFilters with [filterPattern isFilterPatternEqual('{($.eventName=DeleteGroupPolicy)||($.eventName=DeleteRolePolicy)||($.eventName=DeleteUserPolicy)||($.eventName=PutGroupPolicy)||($.eventName=PutRolePolicy)||($.eventName=PutUserPolicy)||($.eventName=CreatePolicy)||($.eventName=DeletePolicy)||($.eventName=CreatePolicyVersion)||($.eventName=DeletePolicyVersion)||($.eventName=AttachRolePolicy)||($.eventName=DetachRolePolicy)||($.eventName=AttachUserPolicy)||($.eventName=DetachUserPolicy)||($.eventName=AttachGroupPolicy)||($.eventName=DetachGroupPolicy)}')] length() > 0]

  • List<CloudTrail> should have items with [hasSNSSubscriber='true' and metricFilters with [filterPattern isFilterPatternEqual('{($.eventName=DeleteGroupPolicy)||($.eventName=DeleteRolePolicy)||($.eventName=DeleteUserPolicy)||($.eventName=PutGroupPolicy)||($.eventName=PutRolePolicy)||($.eventName=PutUserPolicy)||($.eventName=CreatePolicy)||($.eventName=DeletePolicy)||($.eventName=CreatePolicyVersion)||($.eventName=DeletePolicyVersion)||($.eventName=AttachRolePolicy)||($.eventName=DetachRolePolicy)||($.eventName=AttachUserPolicy)||($.eventName=DetachUserPolicy)||($.eventName=AttachGroupPolicy)||($.eventName=DetachGroupPolicy)||($.eventName=SetDefaultPolicyVersion)||($.eventName=AddUserToGroup)||($.eventName=UpdateAssumeRolePolicy)}')] length() > 0]

  • AWS HIPAA

  • AWS Dome9 FISC

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

D9.GCP.IAM.01

Ensure that instances are not configured to use the default service account with full access to all Cloud APIs

Modification

  • Logic

  • GCP CIS Foundations v. 1.0.0

  • GCP PCI-DSS 3.2

  • GCP NIST 800-53 Rev 4

  • GCP CSA CCM v.3.0.1

  • GCP ISO 27001:2013

  • GCP NIST CSF v1.1

  • GCP HIPAA

  • GCP Dashboard System Ruleset

  • GCP GDPR Readiness

  • GCP CloudGuard Best Practices

D9.AWS.LOG.1013

Ensure a log metric filter and alarm exist for unauthorized API calls

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1009

Ensure a log metric filter and alarm exist for Management Console sign-in without MFA

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1014

Ensure a log metric filter and alarm exist for usage of 'root' account

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1008

Ensure a log metric filter and alarm exist for IAM policy changes

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1006

Ensure a log metric filter and alarm exist for CloudTrail configuration

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1003

Ensure a log metric filter and alarm exist for AWS Management Console authentication failures

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1007

Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1011

Ensure a log metric filter and alarm exist for S3 bucket policy changes

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1002

Ensure a log metric filter and alarm exist for AWS Config configuration changes

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1012

Ensure a log metric filter and alarm exist for security group changes

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1004

Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1005

Ensure a log metric filter and alarm exist for changes to network gateways

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1010

Ensure a log metric filter and alarm exist for route table changes

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.LOG.1015

Ensure a log metric filter and alarm exist for VPC changes

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AWS.IAM.54

Ensure IAM instance roles are used for AWS resource access from instances

Modification

  • Name

  • Ensure AWS EC2 Instances use IAM Roles to control access

  • Ensure IAM instance roles are used for AWS resource access from instances

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.21

Ensure a log metric filter and alarm exist for IAM login profile changes

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.MON.22

Ensure a log metric filter and alarm exist for STS 'AssumeRole' action

New

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.MON.23

Ensure a log metric filter and alarm exist for SSM actions

New

 

 

 

  • AWS CloudGuard Best Practices

D9.CFT.CRY.01

Ensure all S3 buckets employ encryption-at-rest

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.02

Ensure that encryption is enabled for RDS Instances

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.03

Ensure ELB enforces recommended SSL/TLS protocol version

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.04

Ensure that AWS DynamoDB is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.05

Ensure that your Amazon EFS file systems are encrypted

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.06

Ensure that encryption of data at rest is enabled on Elasticsearch domains

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.07

Ensure that node-to-node encryption is enabled for Elasticsearch service

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.08

Ensure that the KMS key have key rotation enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.09

Ensure AWS Kinesis streams are encrypted with KMS customer master keys

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.10

Ensure that the root block device has encryption enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.11

Ensure that EBS volume has encryption enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.12

Ensure that KMS key has key rotation enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.CRY.13

Ensure that KMS key policy does not allow access to everyone

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.01

Ensure that S3 Buckets are configured with 'Block public access (bucket settings)'

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.02

S3 bucket should not allow all actions from all principals

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.03

S3 bucket should not allow delete actions from all principals

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.04

S3 bucket should not allow 'get' actions from all principals

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.05

S3 bucket should not allow list actions from all principals

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.06

S3 bucket should not allow put actions from all principals

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.07

S3 bucket should not allow restoring object actions from all principals

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.08

Ensure AWS EC2 Instances use IAM Roles to control access

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.09

Ensure that the S3 bucket is not publicly readable

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.10

Ensure that the S3 bucket is not publicly writable

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.11

Ensure that there is no wildcard action in Lambda permission

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.12

Ensure that there is no wildcard principal in Lambda permission

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.13

Ensure that there is no wildcard action in an IAM policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.14

Ensure that there is no wildcard action in a customer managed IAM policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.15

Ensure that the IAM Policy does not grant full administrative rights

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.16

Ensure that customer managed IAM policy does not grant full administrative rights

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.17

Ensure that IAM policy is not directly attached to a user

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.18

Ensure that a customer managed IAM policy is not directly attached to a user

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.19

Ensure that IAM user does not have directly embeded policy

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.20

Ensure that IAM Role cannot be assumed by anyone

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.IAM.21

Ensure that password reset is required in IAM login profile

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.01

Ensure CloudTrail logs are encrypted at rest using KMS CMKs

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.02

Ensure CloudTrail is enabled in all regions

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.03

Ensure CloudTrail logging is enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.LOG.04

Ensure that S3 server access logging is enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.01

Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.02

Ensure AWS VPC subnets have automatic public IP assignment disabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.03

Ensure no security groups allow ingress from 0.0.0.0/0 to SSH (TCP:22)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.04

Ensure no security groups allow ingress from 0.0.0.0/0 to RDP (TCP:3389)

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.05

Ensure that all authorization Type in API Gateway is not set to None

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.06

Ensure that an API Key is required on a Method Request

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.07

Ensure that address source/destination check is enabled on the instance

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.NET.08

Ensure that AWS DB Security Group does not allow public access

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.01

Amazon EC2 instance must have an associated tag

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.02

Ensure AWS Lambda functions have tracing enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.03

Lambda Functions must have an associated tag

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.04

Ensure that S3 bucket has versioning enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.05

Ensure that EC2Fleet of type maintain has ReplaceUnhealthyInstances set to true

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.06

Ensure that EC2 API termination protection is enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.07

Ensure that the S3 bucket has lifecycle configuration enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.CFT.OPE.08

Ensure that the S3 bucket has object lock enabled

New

 

 

 

  • AWS CloudFormation ruleset

D9.AWS.IAM.02

Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.06

Ensure first access key is rotated every 90 days or less

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.07

Ensure second access key is rotated every 90 days or less

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.12

Ensure IAM password policy requires minimum length of 14 or greater

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.14

Ensure IAM password policy prevents password reuse

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.16

Ensure no root account access key exists

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.18

Ensure VIRTUAL or HARDWARE MFA is enabled for the 'root' account

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.25

Ensure a support role has been created to manage incidents with AWS Support

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.27

Ensure IAM policies that allow full '*:*' administrative privileges are not created

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.43

Ensure MFA Delete is enable on S3 buckets

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.51

Ensure AWS IAM users have no more than one active Access Key

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.54

Ensure IAM instance roles are used for AWS resource access from instances

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.1005

Ensure credentials (with first activated acccessKey) unused for 90 days or greater are disabled

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.IAM.1007

Ensure credentials (with second activated acccessKey) unused for 90 days or greater are disabled

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.LOG.07

Ensure CloudTrail is enabled in all regions

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.LOG.02

Ensure CloudTrail log file validation is enabled

New

 

 

 

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.LOG.08

Ensure the S3 bucket used to store CloudTrail logs is not publicly accessible

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.LOG.04

Ensure AWS Config is enabled in all regions

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.LOG.05

Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.LOG.06

Ensure CloudTrail logs are encrypted at rest using KMS CMKs

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.LOG.09

Ensure rotation for customer created CMKs is enabled

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.01

Ensure a log metric filter and alarm exist for unauthorized API calls

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.02

Ensure a log metric filter and alarm exist for Management Console sign-in without MFA

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.03

Ensure a log metric filter and alarm exist for usage of 'root' account

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.3.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.04

Ensure a log metric filter and alarm exist for IAM policy changes

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.05

Ensure a log metric filter and alarm exist for CloudTrail configuration changes

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.06

Ensure a log metric filter and alarm exist for AWS Management Console authentication failures

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.07

Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.08

Ensure a log metric filter and alarm exist for S3 bucket policy changes

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.09

Ensure a log metric filter and alarm exist for AWS Config configuration changes

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.10

Ensure a log metric filter and alarm exist for security group changes

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.11

Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL)

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.12

Ensure a log metric filter and alarm exist for changes to network gateways

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.13

Ensure a log metric filter and alarm exist for route table changes

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.MON.14

Ensure a log metric filter and alarm exist for VPC changes

New

 

 

 

  • AWS CIS Foundations v. 1.0.0

  • AWS CIS Foundations v. 1.4.0

D9.AWS.NET.04

Ensure the default security group of every VPC restricts all traffic

New

 

 

 

  • AWS CIS Foundations v. 1.4.0

November 10 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.CFT.IAM.13

Ensure that there is no wildcard action in an IAM policy

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.14

Ensure that there is no wildcard action in a customer managed IAM policy

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.15

Ensure that the IAM Policy does not grant full administrative rights

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.16

Ensure that customer managed IAM policy does not grant full administrative rights

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.17

Ensure that IAM policy is not directly attached to a user

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.18

Ensure that a customer managed IAM policy is not directly attached to a user

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.19

Ensure that IAM user does not have directly embeded policy

New

 

 

 

  • AWS CloudFormation Template ruleset

November 03 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.CRY.20

Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'

Modification

  • Severity

  • High

  • Medium

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure HITRUST v9.5.0

D9.AZU.IAM.09

Ensure that Register with Azure Active Directory is enabled on App Service

Modification

  • Severity

  • High

  • Medium

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AWS.DR.02

Ensure AWS RDS instances have Multi-Availability Zone enabled

Modification

  • Logic

  • RDS should not have isMultiAvailabilityZone=false

  • RDSDBCluster should have multiAZ=true

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

D9.AZU.IAM.14

Enable Function App Service Authentication

Modification

  • Severity

  • High

  • Medium

  • Azure CloudGuard Best Practices

D9.CFT.CRY.10

Ensure that the root block device has encryption enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.11

Ensure that EBS volume has encryption enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.09

Ensure that the S3 bucket is not publicly readable

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.10

Ensure that the S3 bucket is not publicly writable

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.11

Ensure that there is no wildcard action in Lambda permission

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.12

Ensure that there is no wildcard principal in Lambda permission

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.LOG.04

Ensure that S3 server access logging is enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.07

Ensure that address source/destination check is enabled on the instance

Modification

  • Name

  • Logic

  • Ensure that S3 bucket versioning enabled

  • AWS_S3_Bucket should have VersioningConfiguration.Status='Enabled'

  • Ensure that address source/destination check is enabled on the instance

  • AWS_EC2_Instance should not have SourceDestCheck=false

  • AWS CloudFormation Template ruleset

D9.CFT.OPE.04

Ensure that S3 bucket has versioning enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.OPE.05

Ensure that EC2Fleet of type maintain has ReplaceUnhealthyInstances set to true

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.OPE.06

Ensure that EC2 API termination protection is enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

October 27 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.17

Ensure hardware mfa is enabled for the 'root' account

Removal

 

 

 

AWS CloudGuard Best Practices

AWS CloudGuard SOC2 based on AICPA TSC 2017

AWS ISO 27001:2013

AWS GDPR Readiness

D9.AWS.IAM.18

Ensure virtual or hardware mfa is enabled for the 'root' account

Modification

  • Name

  • Logic

  • Ensure virtual mfa is enabled for the 'root' account

  • IamUser where name like '%root_account%' should have mfaType in('Virtual')

  • Ensure virtual or Hardware mfa is enabled for the 'root' account

  • IamUser where name like '%root_account%' should have mfaType in('Virtual','Hardware')

  • AWS CloudGuard Best Practices

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS ISO 27001:2013

  • AWS GDPR Readiness

D9.AWS.CRY.02

ELB is setup with HTTPS for secure communication

Modification

  • Name

  • Logic

  • ELB is setup with SSL for secure communication

  • ELB should have elbListeners contain [(sourceProtocol='SSL' and instanceProtocol='SSL')]

  • ELB is setup with HTTPS for secure communication

  • ELB should have elbListeners contain [(sourceProtocol='HTTPS' and instanceProtocol='HTTPS')]

  • AWS HIPAA

  • AWS Dome9 FISC

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.AS.01

Instances outside of Europe region

Modification

  • Name

  • Logic

  • Instances outside of Europe

  • Instance should have region in('eu_central_1', 'eu_west_1', 'eu_west_2','eu_west_3')

  • Instances outside of Europe region

  • Instance should have region like '%eu_%'

  • AWS GDPR Readiness

D9.AWS.CRY.37

Ensure that an API Key is required on a Method Request

Modification

  • Logic

  • ApiGateway should have resources contain-all [ (methods contain-all [ apiKeyRequired=true ]) or (methods isEmpty()) ]

  • ApiGateway should have resources contain-all [ (methods contain-all [ apiKeyRequired=true ]) or (methods isEmpty()) ] or authorizers isEmpty() = false

  • AWS CloudGuard Serverless Architectures Security

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

D9.AZU.CRY.21

Ensure that 'HTTP Version' is the latest, if used to run the web app

Modification

  • Severity

  • High

  • Low

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.IAM.06

Ensure that 'Number of methods required to reset' is set to '2'

Removal

 

 

 

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.IAM.07

Ensure that there are no guest users

Removal

 

 

 

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

D9.K8S.CRY.04

Ensure that the --kubelet-https argument is set to true (API Server)

Removal

 

 

 

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.AZU.CRY.23

Function App should only be accessible over HTTPS

Modification

  • Severity

  • High

  • Medium

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure HITRUST v9.5.0

D9.AZU.IAM.20

Overly Permissive Directory Access (Global Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.21

Overly Permissive Directory Access (Application Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.22

Overly Permissive Directory Access (Privileged Role Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.23

Overly Permissive Directory Access (Cloud Application Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.24

Overly Permissive Directory Access (User Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.25

Overly Permissive Directory Access (Helpdesk Administrator)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.GCP.DR.01

Ensure that auto backup is enabled for your Cloud SQL instance

Modification

  • Severity

  • High

  • Medium

  • GCP CloudGuard Best Practices

October 20 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.IAM.02

Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password

Modification

  • Severity

  • High

  • Medium

  • AWS HIPAA

  • AWS Dome9 FISC

  • Dome9 AWS Dashboards

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS GDPR Readiness

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS CIS Foundations v. 1.0.0

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

D9.GCP.AS.09

Ensure GCP VM Instances have Labels

Modification

  • Severity

  • Informational

  • Low

  • GCP CloudGuard CheckUp

  • GCP NIST 800-53 Rev 4

  • GCP ISO 27001:2013

  • GCP CloudGuard Best Practices

D9.AWS.NET.1001

Default Security Groups - with network policies

Modification

  • Severity

  • High

  • Low

  • Dome9 AWS Dashboards

D9.K8S.IA.22

Insecure Code of Low Severity

New

 

 

 

  • Container Image Assurance

  • Container Image Assurance 1.0

D9.K8S.IA.23

Insecure Code of Medium Severity

New

 

 

 

  • Container Image Assurance

  • Container Image Assurance 1.0

D9.K8S.IA.24

Insecure Content of Low Severity

New

 

 

 

  • Container Image Assurance

  • Container Image Assurance 1.0

D9.K8S.IA.25

Insecure Content of Medium Severity

New

 

 

 

  • Container Image Assurance

  • Container Image Assurance 1.0

D9.AZU.NET.VirtualMachine.1270

Virtual machine administrative OMI/OMS service port (1270) is publicly accessible

New

 

 

 

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

D9.AZU.NET.VirtualMachine.5985

Virtual machine administrative OMI/OMS service port (5985) is publicly accessible

New

 

 

 

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

D9.AZU.NET.VirtualMachine.5986

Virtual machine administrative OMI/OMS service port (5986) is publicly accessible

New

 

 

 

  • Azure CloudGuard Network Security Alerts

  • Azure CloudGuard Best Practices

D9.AZU.CRY.24

Web Application should only be accessible over HTTPS

Modification

  • Severity

  • High

  • Medium

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure HITRUST v9.5.0

D9.AZU.CRY.25

Ensure function app is using the latest version of TLS encryption

Modification

  • Severity

  • High

  • Medium

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure HITRUST v9.5.0

D9.SCA.SCA.01

Vulnerable Source Code

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.02

Malicious URL of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.03

Malicious URL of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.04

Malicious IP of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.05

Malicious IP of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.06

Malicious file of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.07

Malicious file of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.08

Insecure Code of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.09

Insecure Code of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.10

Insecure Content of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.11

Insecure Content of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.12

Package of Critical Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.13

Package of High Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.14

Package of Medium Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.15

Package of Low Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.16

Package of Unknown Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.17

Insecure Code of Low Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.18

Insecure Code of Medium Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.19

Insecure Content of Low Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.SCA.SCA.20

Insecure Content of Medium Severity

New

 

 

 

  • Source Code Assurance 1.0

D9.AZU.MON.15

Ensure ASC Default policy setting 'Monitor Vulnerability Assessment' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.18

Ensure ASC Default policy setting 'Monitor Adaptive Application Whitelisting' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.22

Ensure that outbound traffic is restricted to only that which is necessary, and all other traffic denied

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.58

Overly permissive NSG Inbound rule to all traffic on ANY protocol

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.34

Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.28

Ensure that Activity Log Alert exists for Create or Update Network Security Group

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.29

Ensure that Activity Log Alert exists for Delete Network Security Group

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.30

Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.31

Ensure that activity log alert exists for the Delete Network Security Group Rule

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.47

Ensure that Azure Monitor Logs is configured to export Activity Logs

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.DR.03

Ensure that Azure Virtual Machine is assigned to an availability set

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.48

Ensure that SQL Database Auditing Retention is greater than 90 days

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.21

Ensure that 'Auditing' in SQL Servers is set to 'On'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.53

Ensure ASC Default policy setting 'SQL Auditing Monitoring Effect' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.46

Ensure that Azure Monitor Logs collects all types of activities

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.LOG.08

Ensure audit profile captures all the activities

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.LOG.02

Ensure the log profile captures activity logs for all regions including global

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.62

Ensure Cosmos DB account public network access is disabled

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.63

Ensure Cosmos DB account access is not allowed from all networks

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.59

Ensure Flow-Logs are Enabled on NSG

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.17

Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.20

Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.23

Function App should only be accessible over HTTPS

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.DR.04

Ensure that Geo Redundant Backups is enabled on PostgreSQL

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.07

Ensure that at least one Network Security Group is attached to all VMs and subnets that are public

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.22

Key vault should have purge protection enabled

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.25

Ensure function app is using the latest version of TLS encryption

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.19

Ensure Web App is using the latest version of TLS encryption

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.17

Ensure ASC Default policy setting 'Monitor JIT Network Access' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.26

Ensure that RDP access is restricted from the internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.4.VirtualMachine.3389.TCP

VirtualMachine with administrative service: Remote Desktop (TCP:3389) is too exposed to the public internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.5.VirtualMachine.3389.TCP

VirtualMachine with administrative service: Remote Desktop (TCP:3389) is exposed to a wide network scope

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.27

Ensure that SSH access is restricted from the internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.5.VirtualMachine.22.TCP

VirtualMachine with administrative service: SSH (TCP:22) is exposed to a wide network scope

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.4.VirtualMachine.22.TCP

VirtualMachine with administrative service: SSH (TCP:22) is too exposed to the public internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.4.VirtualMachine.9090.TCP

VirtualMachine with administrative service: CiscoSecure,websm (TCP:9090) is too exposed to the public internet

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.AG2.5.VirtualMachine.9090.TCP

VirtualMachine with administrative service: CiscoSecure,websm (TCP:9090) is exposed to a wide network scope

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.10

Ensure ASC Default policy setting 'Monitor Endpoint Protection' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.28

Ensure that Network Watcher is 'Enabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.05

Ensure that the Redis Cache accepts only SSL connections

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.28

Ensure remote debugging has been disabled for your production Azure Functions

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.34

Ensure remote debugging has been disabled for your production Web App

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.LOG.12

Ensure AuditEvent logging for Azure Key Vault is enabled

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.AKS.08

Ensure that Role Based Access Control (RBAC) is enabled in your AKS Cluster

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.06

Ensure that 'Secure transfer required' (HTTPS) is enabled for Storage Accounts

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.14

Ensure SQL server's TDE protector is encrypted with Customer-managed key

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.24

Ensure default network access rule for Storage Accounts is set to deny

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.61

Ensure that Virtual Networks Subnets have Security Groups

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.19

Ensure that Azure Virtual Network subnet is configured with a Network Security Group

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.08

Ensure ASC Default policy setting 'Monitor System Updates' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.11

Ensure Transparent Data Encryption (TDE) is enabled for SQL Databases

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.26

Ensure that 'Unattached disks' are encrypted with CMK

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.27

Ensure storage for critical data are encrypted with Customer Managed Key

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.11

Ensure ASC Default policy setting 'Monitor Disk Encryption' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.18

Ensure that 'OS and Data' disks are encrypted with CMK

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.56

Ensure ASC Default policy setting 'Storage Encryption Monitoring Effect' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.09

Ensure ASC Default policy setting 'Monitor OS Vulnerabilities' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.24

Web Application should only be accessible over HTTPS

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.02

Ensure entire Azure infrastructure doesn't have access to Azure SQL Server

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.35

Ensure Application Gateway is using the latest version of TLS encryption

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.36

Ensure Application Gateway is using Https protocol

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.IAM.15

Enable Incoming Client Certificates

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.03

Ensure that 'Threat Detection' is enabled for Azure SQL Database

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.54

Ensure ASC Default policy setting 'SQL Encryption Monitoring Effect' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.55

Ensure ASC Default policy setting 'System Configurations Monitoring Effect' is not 'Disabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.LOG.01

Ensure that Activity Log Retention is set 365 days or greater

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.18

Ensure Azure Application Gateway Web application firewall (WAF) is enabled

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.01

Ensure that no SQL Server allows ingress from 0.0.0.0/0 (ANY IP)

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.03

Restrict Azure SQL Server accessibility to a minimal address range

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.01

Ensure that Key Vault is in use

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.12

Ensure expiration date is set for all keys

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.13

Ensure that the expiry date is set on all secrets

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.15

Ensure the key vault is recoverable - enable 'Soft Delete' setting for a Key Vault

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.IAM.03

Ensure that Azure SQL Server Admin is configured with AD Authentication

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.IAM.04

Ensure that Azure Active Directory Admin is configured for SQL Server

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.60

Ensure Flow-Logs Retention Policy is greater than 90 days

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.51

Ensure SQL Server Threat Detection is Enabled and Retention Logs are greater than 90 days

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.22

Ensure that 'Auditing' Retention on SQL Server is 'greater than 90 days'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.MON.50

Ensure that SQL Server Auditing Retention is greater than 90 days

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.NET.32

Ensure that Network Security Group Flow Log retention period is 'greater than 90 days'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.VLN.01

Ensure that Advanced Threat Protection (ATP) on a SQL server is set to 'Enabled'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.VLN.02

Ensure that ADS - 'Advanced Threat Protection types' (ATP) is set to 'All'

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.CRY.29

Ensure Cosmos DB account is encrypted with customer-managed keys

New

 

 

 

  • Azure HITRUST v9.5.0

D9.AZU.AS.02

Ensure that Cosmos DB Account has an associated tag

New

 

 

 

  • Azure HITRUST v9.5.0

October 06 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.CRY.01

Ensure that Key Vault is in use

Modification

  • Name

  • Ensure Key Vault is in use

  • Ensure that Key Vault is in use

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure NIST CSF v1.1

  • Azure HIPAA

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

D9.K8S.IAM.21

Ensure that the seccomp profile is set to docker/default in your pod definitions

Modification

  • Name

  • Logic

  • Ensure that the seccomp profile is set to runtime/default in your pod definitions

  • KubernetesPod should have annotations contain [ key regexMatch /seccomp.security.alpha.kubernetes.io\/pod.*/ ]

  • Ensure that the seccomp profile is set to docker/default in your pod definitions

  • KubernetesPod should have annotations contain [ key regexMatch /seccomp.security.alpha.kubernetes.io\\/pod.*/ ]

  • CIS Kubernetes Benchmark v1.4.0

  • Kubernetes v.1.13 CloudGuard Best Practices

  • Kubernetes NIST.SP.800-190

  • CIS Kubernetes Benchmark v1.5.1

  • CIS Kubernetes Benchmark v1.6.1

  • CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1

  • Kubernetes v.1.14 CloudGuard Best Practices

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.01

Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.02

Ensure that the --rotate-certificates argument is not set to false (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.03

Ensure that the RotateKubeletServerCertificate argument is set to true (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.04

Ensure that the --kubelet-https argument is set to true (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.05

Ensure that the --token-auth-file parameter is not set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.06

Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.07

Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.08

Ensure that the --client-ca-file argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.09

Ensure that the --etcd-cafile argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.10

Ensure that the --service-account-private-key-file argument is set as appropriate (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.11

Ensure that the RotateKubeletServerCertificate argument is set to true (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.12

Ensure that the --cert-file and --key-file arguments are set as appropriate (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.13

Ensure that the --client-cert-auth argument is set to true (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.14

Ensure that the --auto-tls argument is not set to true (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.CRY.16

Prefer using secrets as files over secrets as environment variables

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.01

Ensure that the admission control plugin AlwaysAdmit is not set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.02

Ensure that the --anonymous-auth argument is set to false (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.03

Ensure that the --authorization-mode argument is not set to AlwaysAllow (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.05

Ensure that the --profiling argument is set to false (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.06

Ensure that the --kubelet-certificate-authority argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.07

Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.08

Ensure that the admission control plugin PodSecurityPolicy is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.09

Ensure that the --authorization-mode argument includes RBAC (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.10

Ensure that the --profiling argument is set to false (Scheduler)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.11

Ensure that the --terminated-pod-gc-threshold argument is set as appropriate (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.12

Ensure that the --profiling argument is set to false (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.13

Ensure that the --use-service-account-credentials argument is set to true (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.14

Ensure that the --root-ca-file argument is set as appropriate (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.15

Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.16

Ensure that the --peer-client-cert-auth argument is set to true (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.17

Ensure that the --peer-auto-tls argument is not set to true (etcd)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.20

Minimize the admission of containers wishing to share the host IPC namespace (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.21

Ensure that the seccomp profile is set to docker/default in your pod definitions

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.22

Minimize the admission of containers wishing to share the host network namespace (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.24

Minimize the admission of containers wishing to share the host process ID namespace (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.25

Minimize the admission of containers with allowPrivilegeEscalation (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.26

Minimize the admission of privileged containers (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.29

Ensure that the --anonymous-auth argument is set to false (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.30

Minimize the admission of containers with the NET_RAW capability (PSP)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.31

The default namespace should not be used

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.32

Ensure that the cluster-admin role is only used where required (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.33

Minimize access to secrets (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.34

Minimize wildcard use in Roles and ClusterRoles (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.35

Minimize access to create pods (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.36

Ensure that default service accounts are not actively used. (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.37

Ensure that Service Account Tokens are only mounted where necessary (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.46

Ensure that the --authorization-mode argument includes Node (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.47

Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.IAM.48

Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster (RBAC)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.LOG.01

Ensure that the --audit-log-path argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.LOG.02

Ensure that the --audit-log-maxage argument is set to 30 or as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.LOG.03

Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.LOG.04

Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.MON.01

Ensure that the --event-qps argument is set to 0 (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.MON.02

Ensure that the --service-account-lookup argument is set to true (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.MON.03

Ensure that the admission control plugin ServiceAccount is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.01

Ensure that the --client-ca-file argument is set as appropriate (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.02

Ensure that the --read-only-port argument is set to 0 (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.03

Ensure that the --streaming-connection-idle-timeout argument is not set to 0 (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.04

Ensure that the --make-iptables-util-chains argument is set to true (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.06

Ensure that the --insecure-bind-address argument is not set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.07

Ensure that the --insecure-port argument is set to 0 (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.08

Ensure that the --secure-port argument is not set to 0 (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.10

Ensure that the admission control plugin AlwaysPullImages is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.11

Ensure that the admission control plugin NamespaceLifecycle is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.12

Ensure that the --authorization-mode argument is not set to AlwaysAllow (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.14

Ensure that the admission control plugin NodeRestriction is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.15

Ensure that the admission control plugin EventRateLimit is set (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.16

Ensure that the --request-timeout argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.20

Ensure that the --bind-address argument is set to 127.0.0.1 (Controller Manager)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.NET.21

Ensure that the --bind-address argument is set to 127.0.0.1 (Scheduler)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.01

Ensure that the --protect-kernel-defaults argument is set to true (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.02

Ensure that the --hostname-override argument is not set (Kubelet)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.03

Ensure that the --service-account-key-file argument is set as appropriate (API Server)

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

D9.K8S.OPE.06

Apply Security Context to Your Pods and Containers

New

 

 

 

  • CIS Kubernetes Benchmark v1.20

October 04 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

New

 

 

 

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.NET.03

Ensure VPC flow logging is enabled in all VPCs

Removal

 

 

 

  • AWS HIPAA

  • AWS CIS Foundations v. 1.1.0

  • AWS NIST 800-53 Rev 4

  • AWS PCI-DSS 3.2

  • AWS CSA CCM v.3.0.1

  • AWS ISO 27001:2013

  • AWS NIST CSF v1.1

  • AWS CloudGuard CheckUp

  • AWS CloudGuard SOC2 based on AICPA TSC 2017

  • AWS CIS Foundations v. 1.2.0

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Network Alerts for default VPC components

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS NIST 800-171

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.53

Ensure AWS IAM policies do not grant 'assume role' permission across all services

Modification

  • Logic

  • IamPolicy where arn unlike 'arn:aws:iam::aws%' and document.Statement contain [ Action='sts:AssumeRole' ] should not have document.Statement contain-any [Resource regexMatch /\*/ or Resource contain-any [$ regexMatch /\*/]]

  • IamPolicy should not have document.Statement contain-any [ Action='sts:AssumeRole' and Effect = 'Allow' and (Resource regexMatch /\*/ or Resource contain-any [$ regexMatch /\*/]) and Condition.StringEquals isEmpty() and Condition.StringLike isEmpty()]

  • AWS CloudGuard Well Architected Framework

  • AWS CloudGuard Best Practices

  • AWS MAS TRM Framework

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.61

Ensure that Trusted Policy Roles which can be assumed by external entities include a Condition String

Modification

  • Logic

  • IamRole where assumeRolePolicy.Statement contain [ Action='sts:AssumeRole' and Effect = 'Allow' and Principal.AWS regexMatch /(root)|(user)/] should not have assumeRolePolicy.Statement contain [Condition.StringEquals isEmpty() and Condition.StringLike isEmpty()]

  • IamRole should not have assumeRolePolicy.Statement contain-any [ Action='sts:AssumeRole' and Effect = 'Allow' and Principal.AWS regexMatch /(root)|(user)/ and (Condition.StringEquals isEmpty() and Condition.StringLike isEmpty())]

  • AWS CloudGuard Best Practices

  • AWS ITSG-33

September 29 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

 

 

 

 

 

 

 

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

 

 

 

 

 

 

 

D9.AZU.LOG.12

Ensure AuditEvent logging for Azure Key Vault is enabled

New

 

 

 

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.11

Ensure Transparent Data Encryption (TDE) is enabled for SQL Databases

Modification

  • Name

  • Severity

  • Ensure that 'Data encryption' is set to 'On' for Azure SQL Database

  • High

  • Ensure Transparent Data Encryption (TDE) is enabled for SQL Databases

  • Medium

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure Dashboard System Ruleset

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.02

Ensure that logging for Azure KeyVault is 'Enabled'

Removal

 

 

 

  • Azure CloudGuard CheckUp

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.06

Ensure that 'Secure transfer required' (HTTPS) is enabled for Storage Accounts

Modification

  • Name

  • Ensure that 'Secure transfer required' is enabled for Storage Accounts

  • Ensure that 'Secure transfer required' (HTTPS) is enabled for Storage Accounts

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure Dashboard System Ruleset

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.07

Ensure that Storage account supports customer-managed keys encryption for Blobs

Modification

  • Name

  • Severity

  • Ensure that 'Storage service encryption' is enabled for the Blob Service

  • High

  • Ensure that Storage account supports customer-managed keys encryption for Blobs

  • Medium

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.08

Ensure that Storage account supports customer-managed keys encryption for Files

Modification

  • Name

  • Severity

  • Ensure that 'Storage service encryption' is enabled for the File Service

  • High

  • Ensure that Storage account supports customer-managed keys encryption for Files

  • Medium

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure Dashboard System Ruleset

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

 

 

 

 

 

 

 

D9.AZU.CRY.12

Ensure expiration date is set for all keys

Modification

  • Name

  • Logic

  • Severity

  • Ensure that the expiry date is set on all keys

  • KeyVault where keys should have keys contain-none [ enabled=true and expires isEmpty() ] and keys contain-none [ enabled=true and expires before(1,'days') ]

  • High

  • Ensure expiration date is set for all keys

  • KeyVault where keys should not have keys contain [ enabled=true and expires isEmpty() ]

  • Medium

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure CIS Foundations v. 1.1.0

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.CRY.04

Ensure that the expiry date is set on all SQL Server keys

Removal

 

 

 

  • Azure CIS Foundations v. 1.0.0

  • Azure PCI-DSS 3.2

  • Azure NIST 800-53 Rev 4

  • Azure GDPR Readiness

  • Azure CSA CCM v.3.0.1

  • Azure ISO 27001:2013

  • Azure NIST CSF v1.1

  • Azure CloudGuard SOC2 based on AICPA TSC 2017

  • Azure HIPAA

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

 

 

 

 

 

 

 

D9.AZU.MON.26

Ensure that Activity Log Alert exists for Create Policy Assignment

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Authorization/policyAssignments/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Authorization/policyAssignments/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.28

Ensure that Activity Log Alert exists for Create or Update Network Security Group

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.29

Ensure that Activity Log Alert exists for Delete Network Security Group

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/delete' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.30

Ensure that Activity Log Alert exists for Create or Update Network Security Group Rule

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/securityRules/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/securityRules/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.31

Ensure that activity log alert exists for the Delete Network Security Group Rule

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/securityRules/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Network/networkSecurityGroups/securityRules/delete' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.32

Ensure that Activity Log Alert exists for Create or Update Security Solution

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Security/securitySolutions/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Security/securitySolutions/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.33

Ensure that Activity Log Alert exists for Delete Security Solution

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Security/securitySolutions/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Security/securitySolutions/delete' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.34

Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule

Modification

  • Name

  • Logic

  • Ensure that Activity Log Alert exists for Create or Update or Delete SQL Server Firewall Rule

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Sql/servers/firewallRules/write' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • Ensure that Activity Log Alert exists for Create or Update SQL Server Firewall Rule

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Sql/servers/firewallRules/write' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.MON.27

Ensure that Activity Log Alert exists for Delete Policy Assignment

Modification

  • Logic

  • ActivityLogAlertRule should have condition.allOf contain [ field='operationName' and equals='Microsoft.Authorization/policyAssignments/delete' ] and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ]

  • List<ActivityLogAlertRule> should have items with [condition.allOf contain [ field='operationName' and equals='Microsoft.Authorization/policyAssignments/delete' ] and enabled=true and not condition.allOf contain [ field='level' ] and not condition.allOf contain [ field='status' ] ]

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.3.0

 

 

 

 

 

 

 

D9.AZU.CRY.10

Ensure that storage account access keys are periodically regenerated

Removal

 

 

 

  • Azure CloudGuard Best Practices

 

 

 

 

 

 

 

D9.AZU.MON.40

Ensure that Activity Log Alert Rule is activated for New/Updated Policy Assignments

Removal

 

 

 

  • Azure CloudGuard Best Practices

 

 

 

 

 

 

 

September 13 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AWS.CRY.1002

S3 Buckets - without server-side-encryption enabled

Removal

 

 

 

  • Dome9 AWS Dashboards

  • AWS CloudGuard Best Practices

D9.AWS.IAM.1002

Accounts - without enforced Password Policy

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.IAM.1010

IAM Users - enabled while unused for 90 days or more

Removal

 

 

 

  • Dome9 AWS Dashboards

  • AWS HITRUST

  • AWS ITSG-33

D9.AWS.IAM.1011

IAM Users - with console password without MFA enabled

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.IAM.1012

IAM Users - with Inline IAM Policies applied

Removal

 

 

 

  • Dome9 AWS Dashboards

  • AWS HITRUST

D9.AWS.LOG.1018

S3 Buckets - without CloudTrail access logging

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.LOG.1019

S3 Buckets - without logging enabled

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.NET.1006

Instances - are not configured within a VPC

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AWS.NET.1008

Security Groups - with SSH admin port too exposed to the public internet

Removal

 

 

 

  • Dome9 AWS Dashboards

D9.AZU.CRY.01

Ensure Key Vault is in use

Modification

  • Name

  • Ensure that KeyVault is in use

  • Ensure Key Vault is in use

  • Azure NIST 800-53 Rev 4

  • Azure CSA CCM v.3.0.1

  • Azure NIST CSF v1.1

  • Azure HIPAA

  • Azure NIST 800-171

  • Azure CloudGuard Best Practices

  • Azure New Zealand Information Security Manual (NZISM) v.3.4

D9.AWS.IAM.1003

Avoid the use of the 'root' account

Removal

 

 

 

  • AWS CIS Foundations v. 1.0.0

D9.AZU.CRY.19

Ensure Web App is using the latest version of TLS encryption

Modification

  • Name

  • Severity

  • Ensure web app is using the latest version of TLS encryption

  • High

  • Ensure Web App is using the latest version of TLS encryption

  • Medium

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AWS.CRY.1001

Ensure rotation for customer created CMKs is enabled (Scored)

Removal

 

 

 

  • AWS CloudGuard Best Practices

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

Removal

 

 

 

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

D9.AZU.NET.64

Ensure Cosmos DB account is using Private Endpoints

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.05

Ensure that multi-factor authentication is enabled for all privileged users

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.11

Ensure that multi-factor authentication is enabled for all non-privileged users

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.12

MFA should be enabled on accounts with read permissions on your subscription

Removal

 

 

 

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

D9.AZU.IAM.13

MFA should be enabled on accounts with write permissions on your subscription

Removal

 

 

 

  • Azure CloudGuard Best Practices

  • Azure Security Benchmark

D9.AZU.IAM.16

Overly Permissive Scope Access of Role Assignment

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.17

Overly Permissive Subscription Access (Owner over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.18

Overly Permissive Subscription Access (Contributor over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.19

Overly Permissive Subscription Access (User Access Administrator over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.26

Overly Permissive Scope Access of Role Definition

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.27

Overly Permissive Subscription Access (Authorization over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.28

Overly Permissive Subscription Access (Full Access over the whole Subscription)

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.MON.49

Ensure that SQL Server Auditing is Enabled

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.08

Ensure there is an up to date Network Diagram for your cloud network

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.33

Ensure Web App is using the latest version of TLS encryption

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.GCP.AS.02

Asset is not labeled

Removal

 

 

 

  • GCP CloudGuard Best Practices

September 05 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.AZU.IAM.08

Enable App Service Authentication on Azure App Service

Modification

  • Name

  • Severity

  • Ensure App Service Authentication is set on Azure App Service

  • High

  • Enable App Service Authentication on Azure App Service

  • Medium

  • Azure CIS Foundations v. 1.1.0

  • Azure CloudGuard Best Practices

  • Azure CIS Foundations v. 1.2.0

  • Azure CIS Foundations v. 1.3.0

D9.AZU.CRY.29

Ensure Cosmos DB account is encrypted with customer-managed keys

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.62

Ensure Cosmos DB account public network access is disabled

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.63

Ensure Cosmos DB account access is not allowed from all networks

New

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.IAM.29

Enable WebApp Service Authentication

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AZU.NET.33

Ensure Web App is using the latest version of TLS encryption

Removal

 

 

 

  • Azure CloudGuard Best Practices

D9.AWS.LOG.22

Ensure VPC flow logging is enabled in all VPCs

Removal

 

 

 

  • AWS CloudGuard Best Practices

  • AWS CIS Foundations v. 1.3.0

  • AWS HITRUST

  • AWS ITSG-33

September 01, 2021

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

Rule ID

Rule Name

Change Type

Updated Content

Logic Before

Logic After

Affected Rulesets

D9.GCP.IAM.14

Ensure Basic Authentication is disabled on Kubernetes Engine Clusters

Removal

 

 

 

  • GCP CIS Foundations v. 1.0.0

  • GCP CloudGuard Containers Security

  • GCP HIPAA

  • GCP CloudGuard Best Practices

D9.CFT.CRY.01

Ensure all S3 buckets employ encryption-at-rest

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.02

Ensure that encryption is enabled for RDS Instances

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.03

Ensure ELB enforces recommended SSL/TLS protocol version

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.04

Ensure that AWS DynamoDB is encrypted using AWS managed CMKs (Customer Master Key) instead of AWS-owned CMK's

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.05

Ensure that your Amazon EFS file systems are encrypted

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.06

Ensure that encryption of data at rest is enabled on Elasticsearch domains

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.07

Ensure that node-to-node encryption is enabled for Elasticsearch service

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.08

Ensure that the KMS key have key rotation enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.CRY.09

Ensure AWS Kinesis streams are encrypted with KMS customer master keys

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.01

Ensure that S3 Buckets are configured with 'Block public access (bucket settings)'

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.02

S3 bucket should not allow all actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.03

S3 bucket should not allow delete actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.04

S3 bucket should not allow 'get' actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.05

S3 bucket should not allow list actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.06

S3 bucket should not allow put actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.07

S3 bucket should not allow restoring object actions from all principals

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.IAM.08

Ensure AWS EC2 Instances use IAM Roles to control access

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.LOG.01

Ensure CloudTrail logs are encrypted at rest using KMS CMKs

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.LOG.02

Ensure CloudTrail is enabled in all regions

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.LOG.03

Ensure CloudTrail logging is enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.01

Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.02

Ensure AWS VPC subnets have automatic public IP assignment disabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.03

Ensure no security groups allow ingress from 0.0.0.0/0 to SSH (TCP:22)

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.04

Ensure no security groups allow ingress from 0.0.0.0/0 to RDP (TCP:3389)

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.05

Ensure that all authorization Type in API Gateway is not set to None

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.06

Ensure that an API Key is required on a Method Request

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.NET.07

Ensure that S3 bucket versioning enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.OPE.01

Amazon EC2 instance must have an associated tag

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.OPE.02

Ensure AWS Lambda functions have tracing enabled

New

 

 

 

  • AWS CloudFormation Template ruleset

D9.CFT.OPE.03

Lambda Functions must have an associated tag

New

 

 

 

  • AWS CloudFormation Template ruleset