AC_AWS_0121 | Ensure cross zone load balancing is enabled for AWS ELB | AWS | Resilience | MEDIUM |
AC_AWS_0123 | Ensure access logging is enabled for AWS ELB | AWS | Logging and Monitoring | MEDIUM |
AC_AWS_0234 | Ensure Security Groups do not have unrestricted specific ports open - Elasticsearch (TCP,9200) | AWS | Infrastructure Security | HIGH |
AC_AWS_0239 | Ensure Security Groups do not have unrestricted specific ports open - Cassandra (TCP,7001) | AWS | Infrastructure Security | HIGH |
AC_AWS_0243 | Ensure Security Groups do not have unrestricted specific ports open - LDAP SSL (TCP,636) | AWS | Infrastructure Security | HIGH |
AC_AWS_0247 | Ensure Security Groups do not have unrestricted specific ports open - MSSQL Server (TCP,1433) | AWS | Infrastructure Security | HIGH |
AC_AWS_0252 | Ensure Security Groups do not have unrestricted specific ports open - Mongo Web Portal (TCP,27018) | AWS | Infrastructure Security | HIGH |
AC_AWS_0254 | Ensure Security Groups do not have unrestricted specific ports open - NetBIOS Name Service (TCP,137) | AWS | Infrastructure Security | HIGH |
AC_AWS_0262 | Ensure Security Groups do not have unrestricted specific ports open - Postgres SQL (TCP,5432) | AWS | Infrastructure Security | HIGH |
AC_AWS_0269 | Ensure Security Groups do not have unrestricted specific ports open - SaltStack Master (TCP,4505) | AWS | Infrastructure Security | HIGH |
AC_AWS_0272 | Ensure Security Groups do not have unrestricted specific ports open - SMTP (TCP,25) | AWS | Infrastructure Security | HIGH |
AC_AWS_0275 | Ensure no security groups is wide open to public, that is, allows traffic from 0.0.0.0/0 to ALL ports and protocols | AWS | Infrastructure Security | HIGH |
AC_AWS_0276 | Ensure Unknown Port is not exposed to the entire internet | AWS | Infrastructure Security | HIGH |
AC_AWS_0280 | Ensure Cassandra OpsCenter agent port (TCP,61621) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0284 | Ensure Known internal web port (TCP,8080) is not accessible by a CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0289 | Ensure MSSQL Server (TCP,1433) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0294 | Ensure Mongo Web Portal (TCP,27018) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0298 | Ensure NetBios Datagram Service (TCP,138) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0303 | Ensure Oracle DB SSL (UDP,2484) is not accessible by a public CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0305 | Ensure Postgres SQL (UDP,5432) is not accessible by a CIDR block range | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0326 | Ensure Security Groups Unrestricted Specific Ports CassandraOpsCenteragent (TCP,61621) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0329 | Ensure Security Groups Unrestricted Specific Ports MSSQLBrowserService (UDP,1434) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0330 | Ensure Security Groups Unrestricted Specific Ports MSSQLDebugger (TCP,135) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0340 | Ensure Knowninternalwebport' (TCP,8000) not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0347 | Ensure NetBIOSSessionService' (TCP,139) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0349 | Ensure OracleDBSSL' (TCP,2484) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0350 | Ensure OracleDBSSL' (UDP,2484) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0351 | Ensure PostgresSQL' (TCP,5432) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0358 | Ensure OracleDatabaseServer' (TCP,521) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0363 | Ensure Elasticsearch' (TCP,9300) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0510 | Ensure Cassandra Internode Communication (TCP:7000) is not exposed to public | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0513 | Ensure Cassandra Monitoring (TCP:7199) is not exposed to public | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0516 | Ensure Cassandra OpsCenter Monitoring (TCP:61620) is not exposed to public | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0519 | Ensure Cassandra OpsCenter Website (TCP:8888) is not exposed to public | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0520 | Ensure Cassandra OpsCenter Website (TCP:8888) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0521 | Ensure Cassandra Thrift (TCP:9160) is not exposed to entire internet | AWS | Infrastructure Security | HIGH |
AC_AWS_0525 | Ensure LDAP (TCP:389) is not exposed to public | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0535 | Ensure Memcached SSL (UDP:11211) is not exposed to more than 32 private hosts | AWS | Infrastructure Security | LOW |
AC_AWS_0539 | Ensure Oracle DB (UDP:2483) is not exposed to entire internet | AWS | Infrastructure Security | HIGH |
AC_AWS_0543 | Ensure Redis without SSL (TCP:6379) is not exposed to public | AWS | Infrastructure Security | MEDIUM |
AC_AWS_0556 | Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote server administration ports | AWS | Infrastructure Security | HIGH |
AC_AWS_0578 | Ensure AWS NAT Gateways are used instead of default routes for AWS Route Table | AWS | Data Protection | HIGH |
AC_AWS_0612 | Ensure VPC flow logging is enabled in all VPCs | AWS | Logging and Monitoring | LOW |
AC_AZURE_0092 | Ensure shared access policies are not used for IoT Hub Device Provisioning Service (DPS) | Azure | Infrastructure Security | HIGH |
AC_AZURE_0206 | Ensure cross account access is disabled for Azure SQL Firewall Rule | Azure | Identity and Access Management | MEDIUM |
AC_AZURE_0224 | Ensure latest TLS/SSL version is in use for Azure API Management | Azure | Infrastructure Security | MEDIUM |
AC_AWS_0009 | Ensure stage cache have encryption enabled for AWS API Gateway Method Settings | AWS | Logging and Monitoring | MEDIUM |
AC_AWS_0122 | Ensure connection draining is enabled for AWS ELB | AWS | Resilience | MEDIUM |
AC_AWS_0156 | Ensure cross-zone load balancing is enabled for AWS LB (Load Balancer) | AWS | Resilience | MEDIUM |
AC_AWS_0172 | Ensure recommended SSL/TLS protocol version is used for AWS Elastic Load Balancers (ELB) | AWS | Infrastructure Security | HIGH |