AC_AWS_0237 | Ensure Security Groups do not have unrestricted specific ports open - CIFS / SMB (TCP,3020) | AWS | Infrastructure Security | HIGH |
AC_AWS_0238 | Ensure Security Groups do not have unrestricted specific ports open - Cassandra OpsCenter agent (TCP,61621) | AWS | Infrastructure Security | HIGH |
AC_AWS_0242 | Ensure Security Groups do not have unrestricted specific ports open - Known internal web port (TCP,8080) | AWS | Infrastructure Security | HIGH |
AC_AWS_0256 | Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Datagram Service (TCP,138) | AWS | Infrastructure Security | HIGH |
AC_AWS_0259 | Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Session Service (UDP,139) | AWS | Infrastructure Security | HIGH |
AC_AWS_0265 | Ensure Security Groups do not have unrestricted specific ports open - Puppet Master (TCP,8140) | AWS | Infrastructure Security | HIGH |
AC_AWS_0267 | Ensure Security Groups do not have unrestricted specific ports open - SQL Server Analysis Service browser (TCP,2382) | AWS | Infrastructure Security | HIGH |
AC_AWS_0282 | Ensure Hadoop Name Node (TCP,9000) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0285 | Ensure LDAP SSL (TCP,636) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0290 | Ensure Memcached SSL (TCP,11214) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0292 | Ensure Memcached SSL (UDP,11214) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0299 | Ensure NetBios Datagram Service (UDP,138) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0300 | Ensure NetBios Session Service (TCP,139) is not accessible by a CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0301 | Ensure NetBios Session Service (UDP,139) is not accessible by a CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0302 | Ensure Oracle DB SSL (TCP,2484) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0307 | Ensure Puppet Master (TCP:8140) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0310 | Ensure SQL Server Analysis Services (TCP,2383) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0312 | Ensure Oracle Database Server (TCP,1521) is not accessible by a public CIDR block range | AWS | Infrastructure Security | HIGH |
AC_AWS_0316 | Ensure MongoDB (TCP,27017) is not accessible by a public CIDR block range | AWS | Infrastructure Security | HIGH |
AC_AWS_0319 | Ensure SSH (TCP,22) is not accessible by a public CIDR block range | AWS | Infrastructure Security | LOW |
AC_AWS_0321 | Ensure Security Groups Unrestricted Specific Ports http (TCP,80) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0323 | Ensure Security Groups Unrestricted Specific Ports remote desktop port (TCP,3389) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0325 | Ensure Security Groups Unrestricted Specific Ports SaltStackMaster (TCP,4506) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0328 | Ensure Security Groups Unrestricted Specific Ports MSSQLAdmin (TCP,1434) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0333 | Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (TCP,11215) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0334 | Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (UDP,11214) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0335 | Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (UDP,11215) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0337 | Ensure CIFS/SMB' (TCP,3020) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0343 | Ensure NetBIOSNameService' (TCP,137) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0346 | Ensure NetBIOSDatagramService' (UDP,138) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0355 | Ensure SNMP' (UDP,161) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0357 | Ensure SQLServerAnalysisServices' (TCP,2383) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0360 | Ensure SMTP' (TCP,25) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0364 | Ensure server side encryption (SSE) is enabled for Amazon Simple Notification Service (SNS) Topic | AWS | Data Protection | MEDIUM |
AC_AZURE_0130 | Ensure advanced threat protection is used for Azure MySQL Single Server | Azure | Infrastructure Security | HIGH |
AC_AZURE_0155 | Ensure encryption is configured for Azure Kubernetes Cluster using a customer managed key | Azure | Data Protection | MEDIUM |
AC_AZURE_0184 | Ensure to filter source IP's for Azure CosmosDB Account | Azure | Infrastructure Security | HIGH |
AC_AZURE_0395 | Ensure missing service endpoints are disabled for Azure PostgreSQL Virtual Network Rule | Azure | Security Best Practices | MEDIUM |
AC_AZURE_0422 | Ensure VNC Server (TCP:5900) is not exposed to more than 32 private hosts for Azure Network Security Rule | Azure | Infrastructure Security | LOW |
AC_AZURE_0429 | Ensure Telnet (TCP:23) is not exposed to public for Azure Network Security Rule | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0432 | Ensure SaltStack Master (TCP:4506) is not exposed to public for Azure Network Security Rule | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0439 | Ensure SQL Server Analysis (TCP:2383) is not exposed to entire internet for Azure Network Security Rule | Azure | Infrastructure Security | HIGH |
AC_AZURE_0440 | Ensure SQL Server Analysis (TCP:2382) is not exposed to more than 32 private hosts for Azure Network Security Rule | Azure | Infrastructure Security | LOW |
AC_AZURE_0444 | Ensure SNMP (Udp:161) is not exposed to public for Azure Network Security Rule | Azure | Infrastructure Security | MEDIUM |
AC_AZURE_0446 | Ensure SMTP (TCP:25) is not exposed to more than 32 private hosts for Azure Network Security Rule | Azure | Infrastructure Security | LOW |
AC_AZURE_0454 | Ensure web port (TCP:3000) is not exposed to entire internet for Azure Network Security Rule | Azure | Infrastructure Security | HIGH |
AC_AZURE_0457 | Ensure PostgreSQL (Udp:5432) is not exposed to entire internet for Azure Network Security Rule | Azure | Infrastructure Security | HIGH |
AC_AZURE_0460 | Ensure PostgreSQL (TCP:5432) is not exposed to entire internet for Azure Network Security Rule | Azure | Infrastructure Security | HIGH |
AC_AZURE_0469 | Ensure Oracle DB SSL (TCP:2484) is not exposed to entire internet for Azure Network Security Rule | Azure | Infrastructure Security | HIGH |
AC_AZURE_0470 | Ensure NetBIOS Session Service (Udp:139) is not exposed to more than 32 private hosts for Azure Network Security Rule | Azure | Infrastructure Security | LOW |