Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_AWS_0285Ensure LDAP SSL (TCP,636) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0290Ensure Memcached SSL (TCP,11214) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0292Ensure Memcached SSL (UDP,11214) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0299Ensure NetBios Datagram Service (UDP,138) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0300Ensure NetBios Session Service (TCP,139) is not accessible by a CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0301Ensure NetBios Session Service (UDP,139) is not accessible by a CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0302Ensure Oracle DB SSL (TCP,2484) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0307Ensure Puppet Master (TCP:8140) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0310Ensure SQL Server Analysis Services (TCP,2383) is not accessible by a public CIDR block rangeAWSInfrastructure Security
MEDIUM
AC_AWS_0312Ensure Oracle Database Server (TCP,1521) is not accessible by a public CIDR block rangeAWSInfrastructure Security
HIGH
AC_AWS_0316Ensure MongoDB (TCP,27017) is not accessible by a public CIDR block rangeAWSInfrastructure Security
HIGH
AC_AWS_0319Ensure SSH (TCP,22) is not accessible by a public CIDR block rangeAWSInfrastructure Security
LOW
AC_AWS_0321Ensure Security Groups Unrestricted Specific Ports http (TCP,80) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0323Ensure Security Groups Unrestricted Specific Ports remote desktop port (TCP,3389) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0325Ensure Security Groups Unrestricted Specific Ports SaltStackMaster (TCP,4506) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0328Ensure Security Groups Unrestricted Specific Ports MSSQLAdmin (TCP,1434) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0333Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (TCP,11215) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0334Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (UDP,11214) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0335Ensure Security Groups Unrestricted Specific Ports MemcachedSSL (UDP,11215) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0337Ensure CIFS/SMB' (TCP,3020) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0343Ensure NetBIOSNameService' (TCP,137) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0346Ensure NetBIOSDatagramService' (UDP,138) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0355Ensure SNMP' (UDP,161) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0357Ensure SQLServerAnalysisServices' (TCP,2383) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0360Ensure SMTP' (TCP,25) is not exposed to more than 32 private hostsAWSInfrastructure Security
LOW
AC_AWS_0364Ensure server side encryption (SSE) is enabled for Amazon Simple Notification Service (SNS) TopicAWSData Protection
MEDIUM
AC_AZURE_0155Ensure encryption is configured for Azure Kubernetes Cluster using a customer managed keyAzureData Protection
MEDIUM
AC_AZURE_0184Ensure to filter source IP's for Azure CosmosDB AccountAzureInfrastructure Security
HIGH
AC_AZURE_0395Ensure missing service endpoints are disabled for Azure PostgreSQL Virtual Network RuleAzureSecurity Best Practices
MEDIUM
AC_GCP_0021Ensure basic authentication is disabled on Google Container ClusterGCPIdentity and Access Management
HIGH
AC_GCP_0043Ensure Cassandra OpsCenter agent (TCP:61621) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0046Ensure Mongo Web Portal (TCP:27018) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0053Ensure SQL Server Analysis Service browser (TCP:2382) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0055Ensure MSSQL Browser Service (UDP:1434) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0060Ensure VNC Server (TCP:5900) is not exposed to more than 32 private hosts for Google Compute FirewallGCPInfrastructure Security
LOW
AC_GCP_0064Ensure VNC Listener (TCP:5500) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0071Ensure Known internal web port (TCP:8000) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0072Ensure SaltStack Master (TCP:4506) is not exposed to more than 32 private hosts for Google Compute FirewallGCPInfrastructure Security
LOW
AC_GCP_0073Ensure SaltStack Master (TCP:4506) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0076Ensure SaltStack Master (TCP:4505) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0079Ensure CIFS / SMB (TCP:3020) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0082Ensure Prevalent known internal port (TCP:3000) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0084Ensure DNS (UDP:53) is not exposed to more than 32 private hosts for Google Compute FirewallGCPInfrastructure Security
LOW
AC_GCP_0085Ensure DNS (UDP:53) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0094Ensure NetBios Session Service (TCP:139) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0105Ensure NetBIOS Name Service (TCP:137) is not exposed to more than 32 private hosts for Google Compute FirewallGCPInfrastructure Security
LOW
AC_GCP_0106Ensure NetBIOS Name Service (TCP:137) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0118Ensure Telnet (TCP:23) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0127Ensure Memcached SSL (UDP:11214) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0128Ensure Memcached SSL (UDP:11214) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH