Skip to content

Files

This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Latest commit

20dcb5c · Mar 10, 2021

History

History
266 lines (253 loc) · 79 KB

terraform-queries.md

File metadata and controls

266 lines (253 loc) · 79 KB

Terraform Queries List

This page contains all queries from Terraform, classified by severity level.

High

Query Category Description Help
S3 Bucket Allows Get Action From All Principals
1df37f4b-7197-45ce-83f8-9994d2fcf885
Access Control S3 Buckets must not allow Get Action From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is Get, for all Principals. Documentation
S3 Bucket Allows Public Policy
1a4bc881-9f69-4d44-8c9a-d37d08f54c50
Access Control S3 bucket allows public policy Documentation
S3 Bucket With Any Principal
7af43613-6bb9-4a0e-8c4d-1314b799425e
Access Control S3 Buckets must not allow Actions From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when there are All Principals Documentation
S3 Bucket Allows Delete Action From All Principals
ffdf4b37-7703-4dfe-a682-9d2e99bc6c09
Access Control S3 Buckets must not allow Delete Action From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is Delete, for all Principals. Documentation
IAM Role With Full Privileges
b1ffa705-19a3-4b73-b9d0-0c97d0663842
Access Control IAM role policy that allow full administrative privileges (for all resources) Documentation
ECS Service Admin Role is Present
3206240f-2e87-4e58-8d24-3e19e7c83d7c
Access Control ECS Services must not have Admin roles, which means the attribute 'iam_role' must not be an admin role Documentation
SQS Queue Exposed
abb06e5f-ef9a-4a99-98c6-376d396bfcdf
Access Control Checks if the SQS Queue is exposed Documentation
S3 Bucket Allows Put Action From All Principals
d24c0755-c028-44b1-b503-8e719c898832
Access Control S3 Buckets must not allow Put Action From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is Put, for all Principals. Documentation
S3 Bucket Allows List Action From All Principals
66c6f96f-2d9e-417e-a998-9058aeeecd44
Access Control S3 Buckets must not allow List Action From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is List, for all Principals. Documentation
S3 Bucket Allows Write_ACP Action From All Principals
64a222aa-7793-4e40-915f-4b302c76e4d4
Access Control S3 Buckets must not allow Write_ACP Action From All Principals, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion. This means the 'Effect' must not be 'Allow' when the 'Action' is Write_ACP, for all Principals. Documentation
All Auth Users Get Read Access
57b9893d-33b1-4419-bcea-a717ea87e139
Access Control Misconfigured S3 buckets can leak private information to the entire internet or allow unauthorized data tampering / deletion Documentation
BigQuery Dataset Is Public
e576ce44-dd03-4022-a8c0-3906acca2ab4
Access Control BigQuery dataset is anonymously or publicly accessible Documentation
OSLogin Is Disabled
32ecd6eb-0711-421f-9627-1a28d9eff217
Access Control Verifies that the OSLogin is enabled Documentation
Cloud Storage Bucket With Public Access
c010082c-76e0-4b91-91d9-6e8439e455dd
Access Control Cloud Storage Bucket is anonymously or publicly accessible Documentation
VM with Full Cloud Access
bc280331-27b9-4acb-a010-018e8098aa5d
Access Control A VM instance is configured to use the default service account with full access to all Cloud APIs Documentation
Master Authentication is Disabled
1baba08e-3c8a-4be7-95eb-dced5833de21
Access Control Kubernetes Engine Clusters must have Master Authentication set to enabled, which means the attribute 'master_auth' must have the subattributes 'username' and 'password' defined and not empty Documentation
Role Assignment Of Guest Users
2bc626a8-0751-446f-975d-8139214fc790
Access Control There is a role assignment for guest user Documentation
Storage Container with Public Access
dd5230f8-a577-4bbb-b7ac-f2c2fe7d5299
Access Control Anonymous, public read access to a container and its blobs are enabled in Azure Blob Storage Documentation
Admin user is enabled for Container Registry
b897dfbf-322c-45a8-b67c-1e698beeaa51
Access Control Admin user is enabled for Container Registry Documentation
SQL Database Backup Configuration Disabled
cf3c7631-cd1e-42f3-8801-a561214a6e79
Backup Checks if backup configuration is enabled for all Cloud SQL Database instances Documentation
Geo Redundancy Is Disabled
8b042c30-e441-453f-b162-7696982ebc58
Backup Make sure that on PostgreSQL Geo Redundant Backups is enabled Documentation
EBS Volume Clusters Not Encrypted
cc997676-481b-4e93-aa81-d19f8c5e9b12
Encryption The value on AWS EBS Volume Cluster Encryption must be true Documentation
Memcached Disabled
4bd15dd9-8d5e-4008-8532-27eb0c3706d3
Encryption Check if the Memcached is disabled on the ElastiCache Documentation
DB Instance Storage Not Encrypted
08bd0760-8752-44e1-9779-7bb369b2b4e4
Encryption The parameter storage_encrypted in aws_db_instance must be true (the default is false) Documentation
Redis Not Compliant
254c932d-e3bf-44b2-bc9d-eb5fdb09f8d4
Encryption Check if the redis version is compliant with the necessary AWS PCI DSS requirements Documentation
Secure Ciphers Not Used
5c0003fb-9aa0-42c1-9da3-eb0e332bef21
Encryption Check if secure ciphers aren't used in CloudFront Documentation
EBS Volume Snapshot Not Encrypted
e6b4b943-6883-47a9-9739-7ada9568f8ca
Encryption The value on AWS EBS Volume Snapshot Encryptation must be true Documentation
Kinesis Not Encrypted With KMS
862fe4bf-3eec-4767-a517-40f378886b88
Encryption AWS Kinesis Streams and metadata should be protected with KMS Documentation
Redshift Not Encrypted
cfdcabb0-fc06-427c-865b-c59f13e898ce
Encryption Check if 'encrypted' field is false or undefined (default is false) Documentation
User Data Base64 Contains Encoded Private Key
443488f5-c734-460b-a36d-5b3f330174dc
Encryption User Data Base64 contains an encoded RSA Private Key Documentation
Base64 Shell Script Is Encoded
9cf718ce-46f9-430e-89ec-c456f8b469ee
Encryption Base64 Shell Script must be encoded Documentation
EBS Encryption Disabled
3d3f6270-546b-443c-adb4-bb6fb2187ca6
Encryption EBS Encryption should be enabled Documentation
ECS Task Definition Container Has Password
d40210ea-64b9-4cce-a4fb-e8604f3c062c
Encryption It's not recommend to use plaintext environment variables for sensitive information, such as credential data. Documentation
ELB Using Weak Ciphers
4a800e14-c94a-442d-9067-5a2e9f6c0a4c
Encryption ELB Predefined or Custom Security Policies must not use weak ciphers, to reduce the risk of the SSL connection between the client and the load balancer being exploited. That means the 'name' of 'policy_attributes' must not coincide with any of a predefined list of weak ciphers. Documentation
Kinesis SSE Not Configured
5c6dd5e7-1fe0-4cae-8f81-4c122717cef3
Encryption AWS Kinesis Server data at rest should have Server Side Encryption (SSE) enabled Documentation
EFS Is Not Encrypted
48207659-729f-4b5c-9402-f884257d794f
Encryption Elastic File System (EFS) must be encrypted Documentation
Launch Configuration Is Not Encrypted
4de9de27-254e-424f-bd70-4c1e95790838
Encryption Data stored in the Launch configuration EBS is not securely encrypted Documentation
ELB Using Insecure Protocols
126c1788-23c2-4a10-906c-ef179f4f96ec
Encryption ELB Predefined or Custom Security Policies must not use insecure protocols, to reduce the risk of the SSL connection between the client and the load balancer being exploited. That means the 'name' of 'policy_attributes' must not coincide with any of a predefined list of insecure protocols. Documentation
ECR Repository Has Public Access
e86e26fc-489e-44f0-9bcd-97305e4ba69a
Encryption Amazon ECR image repositories shouldn't have public access Documentation
CA certificate Identifier is outdated
9f40c07e-699e-4410-8856-3ba0f2e3a2dd
Encryption The CA certificate Identifier must be rds-ca-2019 Documentation
Auto Minor Version Upgrade Is Set To False
3b6d777b-76e3-4133-80a3-0d6f667ade7f
Encryption RDS Instance Auto Minor Version Upgrade feature in Aws Db Instance must be true Documentation
MSK Cluster Encryption Disabled
6db52fa6-d4da-4608-908a-89f0c59e743e
Encryption Ensure MSK Cluster encryption in rest and transit is enabled Documentation
HTTPS Traffic Disabled
55af1353-2f62-4fa0-a8e1-a210ca2708f5
Encryption Checks if the connection between the CloudFront and the origin server is encrypted Documentation
Ami Not Encrypted
8bbb242f-6e38-4127-86d4-d8f0b2687ae2
Encryption AWS AMI Encryption is not enabled Documentation
RDS Cluster Storage Not Encrypted
3199c26c-7871-4cb3-99c2-10a59244ce7f
Encryption Check if RDS Cluster Storage isn't encrypted. Happens when 'kms_key_id' field is false or undefined and 'engine_mode' field null or "". Documentation
IAM Database Auth Not Enabled
88fd05e0-ac0e-43d2-ba6d-fc0ba60ae1a6
Encryption IAM Database Auth Enabled must be configured to true Documentation
KMS Rotation Period Is Higher Than 365 Days
352271ca-842f-408a-8b24-f6f2b76eb027
Encryption Check that keys aren't the same for a period greater than 365 days. Documentation
Cloud SQL Instance With SSL Disabled
02474449-71aa-40a1-87ae-e14497747b00
Encryption Cloud SQL Database Instance with SSL disabled for incoming connections Documentation
DNSSEC Using RSASHA1
ccc3100c-0fdd-4a5e-9908-c10107291860
Encryption Checks if, within the 'dnssec_config' block, the 'default_key_specs' block exists with the 'algorithm' field is 'rsasha1' which is bad. Documentation
SSL Enforce Is Disabled
0437633b-daa6-4bbc-8526-c0d2443b946e
Encryption Make sure that for PosgreSQL, the 'Enforce SSL connection' is set to 'ENABLED' Documentation
Storage Account Not Forcing HTTPS
12944ec4-1fa0-47be-8b17-42a034f937c2
Encryption See that Storage Accounts forces the use of HTTPS Documentation
ECS Task Definition Network Mode Not Recommended
9f4a9409-9c60-4671-be96-9716dbf63db1
Insecure Configurations Network_Mode should be 'awsvpc' in ecs_task_defenition. AWS VPCs provides the controls to facilitate a formal process for approving and testing all network connections and changes to the firewall and router configurations Documentation
S3 Bucket Without Enabled MFA Delete
c5b31ab9-0f26-4a49-b8aa-4cc064392f4d
Insecure Configurations S3 bucket without enabled MFA Delete Documentation
S3 Bucket Without Encryption
6726dcc0-5ff5-459d-b473-a780bef7665c
Insecure Configurations S3 bucket should have encryption defined Documentation
Root Account Has Associated Active Access Keys
970d224d-b42a-416b-81f9-8f4dfe70c4bc
Insecure Configurations The AWS Root Account must not have active access keys associated, which means if there are access keys associated to the Root Account, they must be inactive. Documentation
IAM User Policy Without MFA
b5681959-6c09-4f55-b42b-c40fa12d03ec
Insecure Configurations Check if the root user is authenticated with MFA Documentation
Redshift Publicly Accessible
af173fde-95ea-4584-b904-bb3923ac4bda
Insecure Configurations Check if 'publicly_accessible' field is true or undefined (default is true) Documentation
S3 Bucket Without Versioning
568a4d22-3517-44a6-a7ad-6a7eed88722c
Insecure Configurations S3 bucket without versioning Documentation
DB Instance Publicly Accessible
35113e6f-2c6b-414d-beec-7a9482d3b2d1
Insecure Configurations The feature Publicly Accessible must be false Documentation
SQS With SSE Disabled
6e8849c1-3aa7-40e3-9063-b85ee300f29f
Insecure Configurations Amazon Simple Queue Service (SQS) queue is not protecting the contents of their messages using Server-Side Encryption (SSE) Documentation
No Password Policy Enabled
b592ffd4-0577-44b6-bd35-8c5ee81b5918
Insecure Configurations IAM password policies should be set through the password minimum length and reset password attributes Documentation
Static Websites Found
42bb6b7f-6d54-4428-b707-666f669d94fb
Insecure Configurations Checks if any static websties are hosted on buckets Documentation
KMS Key With Vulnerable Policy
7ebc9038-0bde-479a-acc4-6ed7b6758899
Insecure Configurations Checks if the policy is vulnerable and needs updating. Documentation
S3 Bucket Without Restriction Of Public Bucket
1ec253ab-c220-4d63-b2de-5b40e0af9293
Insecure Configurations S3 bucket without restriction of public bucket Documentation
Authentication Without MFA
3ddfa124-6407-4845-a501-179f90c65097
Insecure Configurations Users should authenticate with MFA (Multi-factor Authentication) Documentation
Pod Security Policy is Disabled
9192e0f9-eca5-4056-9282-ae2a736a4088
Insecure Configurations Kubernetes Clusters must have Pod Security Policy controller enabled, which means there must be a 'pod_security_policy_config' with the 'enabled' attribute equal to true Documentation
IAM Binding Check No Gmail Accounts
9356962e-4a4f-4d06-ac59-dc8008775eaa
Insecure Configurations Gmail accounts are being used instead of corporate credentials Documentation
GKE Basic Authentication is Enabled
70cdf849-b7d9-4569-b87d-5d82ffd44719
Insecure Configurations GCP - Google Kubernetes Engine (GKE) Basic Authentication must be disabled, which means the username and password provided in the master_auth block must be empty Documentation
Network Policy is Disabled
11e7550e-c4b6-472e-adff-c698f157cdd7
Insecure Configurations Kubernetes Engine Clusters must have Network Policy enabled, meaning that the attribute 'network_policy.enabled' must be true and the attribute 'addons_config.network_policy_config.disabled' must be false Documentation
Cluster Labels are Disabled
65c1bc7a-4835-4ac4-a2b6-13d310b0648d
Insecure Configurations Kubernetes Clusters must be configured with labels, which means the attribute 'resource_labels' must be defined Documentation
Node Auto Upgrade Not Enabled
b139213e-7d24-49c2-8025-c18faa21ecaa
Insecure Configurations Node 'auto_upgrade' should be enabled for Kubernetes Clusters Documentation
Private Cluster Is Disabled
6ccb85d7-0420-4907-9380-50313f80946b
Insecure Configurations Kubernetes Clusters must be created with Private Clusters enabled, meaning the 'private_cluster_config' must be defined and the attributes 'enable_private_nodes' and 'enable_private_endpoint' must be true Documentation
Legacy Authorization is Enabled
5baa92d2-d8ee-4c75-88a4-52d9d8bb8067
Insecure Configurations Kubernetes Engine Clusters must have Legacy Authorization set to disabled, which means the attribute 'enable_legacy_abac' must not be true Documentation
Client Certificate is Disabled
73fb21a1-b19a-45b1-b648-b47b1678681e
Insecure Configurations Kubernetes Clusters must be created with Client Certificate enabled, which means 'master_auth' must have 'client_certificate_config' with the attribute 'issue_client_certificate' equal to true Documentation
COS Node Image Not Used
8a893e46-e267-485a-8690-51f39951de58
Insecure Configurations A node image, that is not Container-Optimized OS (COS), is used for Kubernetes Engine Clusters Node image Documentation
IP Aliasing is Disabled
c606ba1d-d736-43eb-ac24-e16108f3a9e0
Insecure Configurations Kubernetes Clusters must be created with Alias IP ranges enabled, which means the attribut 'ip_allocation_policy' must be defined and, if defined, the attribute 'networking_mode' must be VPC_NATIVE Documentation
Redis Not Updated Regularly
b947809d-dd2f-4de9-b724-04d101c515aa
Insecure Configurations Redis Cache is not configured to be updated regularly with security and operational updates Documentation
Azurerm Container Registry With No Locks
a187ac47-8163-42ce-8a63-c115236be6fb
Insecure Configurations Azurerm Container Registry Must Contain Associated Locks Documentation
VM Not Attached To Network
bbf6b3df-4b65-4f87-82cc-da9f30f8c033
Insecure Configurations No Network Security Group is attached to the Virtual Machine Documentation
Network Watcher Flow Disabled
b90842e5-6779-44d4-9760-972f4c03ba1c
Insecure Configurations Check if enable field in the resource azurerm_network_watcher_flow_log is false. Documentation
SSL Connection Is Enabled
73e42469-3a86-4f39-ad78-098f325b4e9f
Insecure Configurations Make sure that for MySQL Database Server, 'Enforce SSL connection' is enabled Documentation
AD Admin Not Configured For SQL Server
a3a055d2-9a2e-4cc9-b9fb-12850a1a3a4b
Insecure Configurations The Active Directory Administrator is not configured for a SQL server Documentation
CosmosDB Account Ip Range Filter Not Setted
c2a3efb6-8a58-481c-82f2-bfddf34bb4b7
Insecure Configurations The Ip Range Must Contain Ips Documentation
Trusted Microsoft Services Not Enabled
5400f379-a347-4bdd-a032-446465fdcc6f
Insecure Configurations Trusted MIcrosoft Services are not enabled for Storage Account access Documentation
DB Security Group Has Public IP
f0d8781f-99bf-4958-9917-d39283b168a0
Networking and Firewall The CIDR IP must not be Public Documentation
Remote Desktop Port Open
151187cb-0efc-481c-babd-ad24e3c9bc22
Networking and Firewall The remote desktop port is open Documentation
'SSH' (TCP:22) in Public Scope
65905cec-d691-4320-b320-2000436cb696
Networking and Firewall SSH' (TCP:22) should not be public in AWS Security Group Documentation
ALB protocol is HTTP
de7f5e83-da88-4046-871f-ea18504b1d43
Networking and Firewall AWS Application Load Balancer (alb) should not listen on HTTP Documentation
HTTP Port Open
ffac8a12-322e-42c1-b9b9-81ff85c39ef7
Networking and Firewall HTTP port is open to the internet Documentation
Sensitive Port Is Exposed To Entire Network
381c3f2a-ef6f-4eff-99f7-b169cda3422c
Networking and Firewall A sensitive port, such as port 23 or port 110, is open for the whole network in either TCP or UDP protocol Documentation
Fully Open Ingress
4728cd65-a20c-49da-8b31-9c08b423e4db
Networking and Firewall Security groups allow ingress from 0.0.0.0:0 Documentation
Documentation
DB Security Group Higher than 256
4f615f3e-fb9c-4fad-8b70-2e9f781806ce
Networking and Firewall DB Security CIDR must be lower than 256 (/24) Documentation
EKS Cluster Has Public Access CIDRs
61cf9883-1752-4768-b18c-0d57f2737709
Networking and Firewall Amazon EKS public endpoint is enables and accessible to all: 0.0.0.0/0" Documentation
DB Security Group With Public Scope
1e0ef61b-ad85-4518-a3d3-85eaad164885
Networking and Firewall The CIDR must be diferent than 0.0.0.0/0 Documentation
Unknown Port Exposed To Internet
590d878b-abdc-428f-895a-e2b68a0e1998
Networking and Firewall AWS Security Group should not have an unknown port exposed to the entire Internet Documentation
Route53 Record Undefined
25db74bf-fa3b-44da-934e-8c3e005c0453
Networking and Firewall Check if Record is set Documentation
Default Security Group Does Not Restrict All Traffic
46883ce1-dc3e-4b17-9195-c6a601624c73
Networking and Firewall Check if default security group does not restrict all inbound and outbound traffic. Documentation
Cloud SQL DB Is Publicly Accessible
b187edca-b81e-4fdc-aff4-aab57db45edb
Networking and Firewall Check if any Cloud SQL instances are publicly accessible. Documentation
Sensitive Port Is Exposed To Entire Network
594c198b-4d79-41b8-9b36-fde13348b619
Networking and Firewall A sensitive port, such as port 23 or port 110, is open for the whole network in either TCP or UDP protocol Documentation
Redis Publicly Accessible
5089d055-53ff-421b-9482-a5267bdce629
Networking and Firewall Firewall rule allowing unrestricted access to Redis from other Azure sources Documentation
SQLServer Ingress from Any IP
25c0ea09-f1c5-4380-b055-3b83863f2bb8
Networking and Firewall Check if all IPs are allowed, check from start 0.0.0.0 to end 255.255.255.255. Documentation
SSH Is Exposed To The Internet
3e3c175e-aadf-4e2b-a464-3fdac5748d24
Networking and Firewall Port 22 (SSH) is exposed to the internet Documentation
Redis Entirely Accessible
fd8da341-6760-4450-b26c-9f6d8850575e
Networking and Firewall Firewall rule allowing unrestricted access to Redis from the Internet Documentation
Public Storage Account
17f75827-0684-48f4-8747-61129c7e4198
Networking and Firewall Check if 'network_rules' is open to public. Documentation
RDP Is Exposed To The Internet
efbf6449-5ec5-4cfe-8f15-acc51e0d787c
Networking and Firewall Port 3389 (Remote Desktop) is exposed to the internet Documentation
KMS Key No Deletion Window
0b530315-0ea4-497f-b34c-4ff86268f59d
Observability AWS KMS Key should have a valid deletion window Documentation
Config Configuration Aggregator All Regions Not Enabled
ac5a0bc0-a54c-45aa-90c3-15f7703b9132
Observability AWS Config Configuration Aggregator All Regions must be set to True Documentation
CloudTrail Logging Disabled
4bb76f17-3d63-4529-bdca-2b454529d774
Observability Checks if we have enabled logging in the CloudTrail Documentation
Stackdriver Monitoring is Disabled
30e8dfd2-3591-4d19-8d11-79e93106c93d
Observability Kubernetes Engine Clusters must have Stackdriver Monitoring enabled, which means the attribute 'monitoring_service' must be defined and different than 'none' Documentation
Stackdriver Logging is Disabled
4c7ebcb2-eae2-461e-bc83-456ee2d4f694
Observability Kubernetes Engine Clusters must have Stackdriver Logging enabled, which means the attribute 'logging_service' must be defined and different from 'none' Documentation
Cloud Storage Bucket Logging Not Enabled
d6cabc3a-d57e-48c2-b341-bf3dd4f4a120
Observability Cloud storage bucket with logging not enabled Documentation
Object Versioning Not Enabled
e7e961ac-d17e-4413-84bc-8a1fbe242944
Observability Object Versioning Not Enabled on Cloud Storage Bucket Documentation
IAM Audit Logging Has Not Proper Config
89fe890f-b480-460c-8b6b-7d8b1468adb4
Observability Audit Logging Configuration is defective Documentation
Vault with disabled Audit
38c71c00-c177-4cd7-8d36-cd1007cdb190
Observability Ensure that logging for Azure KeyVault is 'Enabled' Documentation
SQL Database disabled Audit
83a229ba-483e-47c6-8db7-dc96969bce5a
Resource Management Ensure that 'Threat Detection' is enabled for Azure SQL Database Documentation
S3 Bucket Rules With Master Key Id Null
ad03cb46-f174-4674-bf8e-2880a7000edd
Secret Management If algorithm is AES256 then the master key is null, empty or undefined, otherwise the master key is required Documentation
EFS Without KMS Key ID
25d251f3-f348-4f95-845c-1090e41a615c
Secret Management Elastic File System (EFS) must have KMS Key ID Documentation
Check Secret Expiration Is Set
dfa20ffa-f476-428f-a490-424b41e91c7f
Secret Management Make sure that for all secrets the expiration date is set Documentation
Check Key Expiration Is Set
4d080822-5ee2-49a4-8984-68f3d4c890fc
Secret Management Make sure that for all keys the expiration date is set Documentation
Logging Disabled For Key Vault
bb2d6cbc-b3af-4da7-9b1c-d91652dd9ead
Secret Management Logging for Azure Key Vault is disabled Documentation

Medium

Query Category Description Help
Google Project IAM Member Service Account has Token Creator or Account User Role
c68b4e6d-4e01-4ca1-b256-1e18e875785c
Access Control Verifies if Google Poject IAM Member Service Account doesn't have a Account User or Token Creator associated Documentation
SQS Policy Allows ALL (*) Actions
816ea8cf-d589-442d-a917-2dd0ce0e45e3
Access Control SQS policy allows ALL (*) actions Documentation
Google Project IAM Member Service Account Has Admin Role
84d36481-fd63-48cb-838e-635c44806ec2
Access Control Verifies that Google Project IAM Member Service Account doesn't have an Admin Role associated Documentation
IAM Policies With Full Privileges
2f37c4a3-58b9-4afe-8a87-d7f1d2286f84
Access Control IAM policies that allow full administrative privileges (for all resources) Documentation
SNS Topic is Publicly Accessible For Subscription
b26d2b7e-60f6-413d-a3a1-a57db24aa2b3
Access Control This query checks if SNS Topic is Accessible For Subscription Documentation
SQS Policy With Public Access
730675f9-52ed-49b6-8ead-0acb5dd7df7f
Access Control SQS policy with public access Documentation
Google Project IAM Binding Service Account has Token Creator or Account User Role
617ef6ff-711e-4bd7-94ae-e965911b1b40
Access Control Verifies if Google Project IAM Binding Service Account doesn't have an Account User or Token Creator Role associated Documentation
IAM Policy Allows All ('*') In Policy Statement
575a2155-6af1-4026-b1af-d5bc8fe2a904
Access Control IAM policies allow all ('*') in a statement action Documentation
S3 Bucket Allows Public ACL
d0cc8694-fcad-43ff-ac86-32331d7e867f
Access Control S3 bucket allows public ACL Documentation
Container Allow Privilege Escalation Is True
c878abb4-cca5-4724-92b9-289be68bd47c
Access Control Admission of privileged containers should be minimized Documentation
Container Has Allowed Capabilities
fe771ff7-ba15-4f8f-ad7a-8aa232b49a28
Access Control Kubernetes Pod should not have extra capabilities allowed Documentation
Cloud Storage Anonymous or Publicly Accessible
a6cd52a1-3056-4910-96a5-894de9f3f3b3
Access Control Cloud Storage Buckets must not be anonymously or publicly accessible, which means the attribute 'members' must not possess 'allUsers' or 'allAuthenticatedUsers' Documentation
Default Network Access is Allowed
9be09caf-2ba4-4fa9-9787-a670dc32c639
Access Control Default Network Access rule for Storage Accounts must be set to deny, which means the attribute 'default_action' must be 'Deny' Documentation
ElastiCache Nodes Are Not Created Across Multi AZ
6db03a91-f933-4f13-ab38-a8b87a7de54d
Availability Check if ElastiCache nodes are not being created across multi AZ Documentation
Stack Retention Is Disabled
6e0e2f68-3fd9-4cd8-a5e4-e2213ef0df97
Backup Make sure that retain_stack is enabled to keep the Stack and it's associated resources during resource destruction Documentation
RDS Without Backup
1dc73fb4-5b51-430c-8c5f-25dcf9090b02
Backup RDS configured without backup Documentation
Insecure SSL Is Enabled For GitHub Organization Webhook
ce7c874e-1b88-450b-a5e4-cb76ada3c8a9
Encryption Check if insecure SSL is being used in the GitHub organization webhooks Documentation
Config Rule For Encrypted Volumes Is Disabled
abdb29d4-5ca1-4e91-800b-b3569bbd788c
Encryption Check if AWS config rules do not identify Encrypted Volumes as a source. Documentation
Google Compute SSL Policy Weak Cipher Suits is Enabled
14a457f0-473d-4d1d-9e37-6d99b355b336
Encryption This query confirms if Google Compute SSL Policy Weak Chyper Suits is Enabled, to do so we need to check if TLS is TLS_1_2, because other version have Weak Chypers Documentation
Neptune Cluster Not Encrypted
98d59056-f745-4ef5-8613-32bca8d40b7e
Encryption Check if Neptune Cluster Storage is securely encrypted Documentation
API Gateway Content Encoding
ed35928e-195c-4405-a252-98ccb664ab7b
Encryption Enable Content Encoding through the attribute 'minimum_compression_size'. This value should be greater than -1 and smaller than 10485760 Documentation
Google KMS Crypto Key Rotation Period Not Recommended
d8c57c4e-bf6f-4e32-a2bf-8643532de77b
Encryption Make sure Encryption keys change after 90 days Documentation
ElasticSearch Not Encrypted At Rest
24e16922-4330-4e9d-be8a-caa90299466a
Encryption Check if ElasticSearch encryption is disabled at Rest Documentation
Image is not scanned
9630336b-3fed-4096-8173-b9afdfe346a7
Encryption Checks if the Image has been scanned Documentation
ElasticSearch Encryption With KMS Is Disabled
7af2f4a3-00d9-47f3-8d15-ca0888f4e5b2
Encryption Check if any ElasticSearch domain isn't encrypted with KMS Documentation
VM CSEK Encryption Is Disabled
b1d51728-7270-4991-ac2f-fc26e2695b38
Encryption VM disks for critical VMs must be encrypted with Customer Supplied Encryption Keys (CSEK), which means the attribute 'disk_encryption_key' must be defined and its sub attribute 'sha256' must also be defined and not empty Documentation
Ensure Encryption on Disk
a99130ab-4c0e-43aa-97f8-78d4fcb30024
Encryption Ensure that the encryption is active on the disk Documentation
Redis Cache Allows Non SSL Connections
e29a75e6-aba3-4896-b42d-b87818c16b58
Encryption Check if any Redis Cache resource allows non-SSL connections. Documentation
Public Repository Is Enabled
15d8a7fd-465a-4d15-a868-add86552f17b
Insecure Configurations Repositories must be set to private, which means the attribute 'visibility' must be set to 'private' and/or the attribute 'private' must be set to true (the attribute 'visibility' overrides 'private') Documentation
CloudFormation Without Template
91bea7b8-0c31-4863-adc9-93f6177266c4
Insecure Configurations AWS CloudFormation should have a template defined through the attribute template_url or attribute template_body Documentation
Organizations SCPs All Features Not Enabled
5ba6229c-8057-433e-91d0-21cf13569ca9
Insecure Configurations Check if the Amazon Organizations' policies ensure that all features are enabled to achieve full control over the use of AWS services and actions across multiple AWS accounts using Service Control Policies (SCPs). Documentation
Google Storage Bucket Level Access is Enabled
bb0db090-5509-4853-a827-75ced0b3caa0
Insecure Configurations Validates if the Google Storage Bucket Level Access is Enabled Documentation
MQ Broker Is Publicly Accessible
4eb5f791-c861-4afd-9f94-f2a6a3fe49cb
Insecure Configurations Check if any MQ Broker is not publicly accessible Documentation
AMI Shared To Multiple Accounts
ba4e0031-3e9d-4d7d-b0d6-bd8f003f8698
Insecure Configurations Limits access to AWS AMIs by checking if more than one account is using the same image Documentation
IAM Password Without Reuse Prevention
89806cdc-9c2e-4bd1-a0dc-53f339bcfb2a
Insecure Configurations Check if IAM account password has the reuse password configured with 24 Documentation
IAM Password Without Valid Minimum Length
1bc1c685-e593-450e-88fb-19db4c82aa1d
Insecure Configurations Check if IAM account password has the required minimum length Documentation
IAM Password Without Uppercase Letter
c5ff7bc9-d8ea-46dd-81cb-8286f3222249
Insecure Configurations Check if IAM account password has at least one uppercase letter Documentation
Google Container Node Pool Auto Repair is Disabled
acfdbec6-4a17-471f-b412-169d77553332
Insecure Configurations Verifies if Google Conatiner Node Pool Auto Repair is Enabled Documentation
IAM Password Without Lowercase Letter
bbc7c137-6c7b-4fc4-984a-0c88e91fcaf9
Insecure Configurations Check if IAM account password has at least one lowercase letter Documentation
Instance With No VPC
a31a5a29-718a-4ff4-8001-a69e5e4d029e
Insecure Configurations Instance should be configured in VPC (Virtual Private Cloud) Documentation
IAM Password Without Symbols
7a70eed6-de3a-4da2-94da-a2bbc8fe2a48
Insecure Configurations Check if IAM account password has the required symbols Documentation
IAM Access Key Is Exposed
7081f85c-b94d-40fd-8b45-a4f1cac75e46
Insecure Configurations Check if IAM Access Key is active for some user besides 'root' Documentation
Unchangeable password
9ef7d25d-9764-4224-9968-fa321c56ef76
Insecure Configurations Unchangeable passwords in AWS password policy Documentation
Public Lambda via API Gateway
3ef8696c-e4ae-4872-92c7-520bb44dfe77
Insecure Configurations Allowing to run lambda function using public API Gateway Documentation
EKS Cluster Has Public Access
42f4b905-3736-4213-bfe9-c0660518cda8
Insecure Configurations Amazon EKS public endpoint shoud be set to false Documentation
Container Read-Only Root Filesystem Is False
d532566b-8d9d-4f3b-80bd-361fe802f9c2
Insecure Configurations Container's root filesystem should be read-only Documentation
Container Host Pid Is True
587d5d82-70cf-449b-9817-f60f9bccb88c
Insecure Configurations Minimize the admission of containers wishing to share the host process ID namespace Documentation
Container Resources Not Defined
60af03ff-a421-45c8-b214-6741035476fa
Insecure Configurations Kubernetes container should have resource limitations defined such as CPU and memory Documentation
OSLogin Is Disabled For VM Instance
d0b4d550-c001-46c3-bbdb-d5d75d33f05f
Insecure Configurations Check if any VM instance disables OSLogin Documentation
Using Default Service Account
3cb4af0b-056d-4fb1-8b95-fdc4593625ff
Insecure Configurations Instances must not be configured to use the Default Service Account, that has full access to all Cloud APIs, which means the attribute 'service_account' and its sub attribute 'email' must be defined. Additionally, 'email' must not be empty and must also not be a default Google Compute Engine service account. Documentation
Google Project Auto Create Network Is Disabled
59571246-3f62-4965-a96f-c7d97e269351
Insecure Configurations Verifies if the Google Project Auto Create Network is Disabled Documentation
Shielded VM is Disabled
1b44e234-3d73-41a8-9954-0b154135280e
Insecure Configurations Compute instances must be launched with Shielded VM enabled, which means the attribute 'shielded_instance_config' must be defined and its sub attributes 'enable_secure_boot', 'enable_vtpm' and 'enable_integrity_monitoring' must be set to true Documentation
Project-wide SSH Keys Are Enabled In VM Instances
3e4d5ce6-3280-4027-8010-c26eeea1ec01
Insecure Configurations Check if SSH keys are enabled project-wide in VM instances Documentation
Serial Ports Are Enabled For VM Instances
97fa667a-d05b-4f16-9071-58b939f34751
Insecure Configurations Check if VM instance enables serial ports Documentation
Cloud DNS without DNSSEC
5ef61c88-bbb4-4725-b1df-55d23c9676bb
Insecure Configurations Cloud DNS without DNSSEC Documentation
Security Center Pricing Tier Is Not Standard
819d50fd-1cdf-45c3-9936-be408aaad93e
Insecure Configurations Make sure that the 'Standard' pricing tiers were selected. Documentation
Log Retention Is Greater Than 90 Days
7750fcca-dd03-4d38-b663-4b70289bcfd4
Insecure Configurations Flow logs enable capturing information about IP traffic flowing in and out of the network security groups. Network Security Group Flow Logs must be enabled with retention period greater than or equal to 90 days. This is important, because these logs are used to check for anomalies and give information of suspected breaches Documentation
AKS Network Policy Misconfigured
f5342045-b935-402d-adf1-8dbbd09c0eef
Insecure Configurations Check if the Azure Kubernetes Service doesn't have the proper network policy configuration. Documentation
Cosmos DB Account No Tags
56dad03e-e94f-4dd6-93a4-c253a03ff7a0
Insecure Configurations Cosmos DB Account must have a mapping of tags. Documentation
Security Group is Not Configured
5c822443-e1ea-46b8-84eb-758ec602e844
Insecure Configurations Azure Virtual Network subnet must be configured with a Network Security Group, which means the attribute 'security_group' must be defined and not empty Documentation
SQL Server Predictable Active Directory Account Name
bcd3fc01-5902-4f2a-b05a-227f9bbf5450
Insecure Configurations Azure SQL Server must avoid using predictable Active Directory Administrator Account names, like 'Admin', which means the attribute 'login' must be set to a name that is not easy to predict Documentation
SQL Server Predictable Admin Account Name
2ab6de9a-0136-415c-be92-79d2e4fd750f
Insecure Configurations Azure SQL Server's Admin account login must avoid using names like 'Admin', that are too predictable, which means the attribute 'administrator_login' must be set to a name that is not easy to predict Documentation
Kube Dashboard Is Enabled
61c3cb8b-0715-47e4-b788-86dde40dd2db
Insecure Configurations Check if the Kubernetes Dashboard is enabled. Documentation
API Gateway Endpoint Config is Private
6b2739db-9c49-4db7-b980-7816e0c248c1
Networking and Firewall Type of Endpoint Configuration is Private Documentation
API Gateway Without SSL Certificate
0b4869fc-a842-4597-aa00-1294df425440
Networking and Firewall SSL Client Certificate should be enabled in aws_api_gateway_stage resource Documentation
Sensitive Port Is Exposed To Small Public Network
e35c16a2-d54e-419d-8546-a804d8e024d0
Networking and Firewall A sensitive port, such as port 23 or port 110, is open for a small public network in either TCP or UDP protocol Documentation
SQL Analysis Services Port 2383 (TCP) Is Publicly Accessible
54c417bf-c762-48b9-9d31-b3d87047e3f0
Networking and Firewall Check if port 2383 on TCP is publicly accessible by checking the CIDR block range that can access it. Documentation
Sensitive Port Is Exposed To Wide Private Network
92fe237e-074c-4262-81a4-2077acb928c1
Networking and Firewall A sensitive port, such as port 23 or port 110, is open for a wide private network in either TCP or UDP protocol Documentation
SSH Access Is Not Restricted From The Internet
c4dcdcdf-10dd-4bf4-b4a0-8f6239e6aaa0
Networking and Firewall Check if Google Firewall allows SSH access (port 22) from the Internet (public CIDR block) Documentation
RDP Access Is Not Restricted
678fd659-96f2-454a-a2a0-c2571f83a4a3
Networking and Firewall Check if Google Firewall ingress allows RDP access (port 3389) Documentation
IP Forwarding is Enabled
f34c0c25-47b4-41eb-9c79-249b4dd47b89
Networking and Firewall Instances must not have IP forwarding enabled, which means the attribute 'can_ip_forward' must not be true Documentation
Firewall Rule Allows Too Many Hosts To Access Redis Cache
a829b715-cf75-4e92-b645-54c9b739edfb
Networking and Firewall Check if any firewall rule allows too many hosts to access Redis Cache Documentation
WAF Is Disabled For Azure Application Gateway
2e48d91c-50e4-45c8-9312-27b625868a72
Networking and Firewall Check if Web Application Firewall is disabled or not configured for Azure's Application Gateway. Documentation
Sensitive Port Is Exposed To Small Public Network
e9dee01f-2505-4df2-b9bf-7804d1fd9082
Networking and Firewall A sensitive port, such as port 23 or port 110, is open for small public network in either TCP or UDP protocol Documentation
SQL Server Accessibility Is Not Minimal
d7ba74da-2da0-4d4b-83c8-2fd72a3f6c28
Networking and Firewall Azure SQL Server Accessibility must be set to a minimal address range, which means the difference between the values of the 'end_ip_address' and 'start_ip_address' must be lesser than 256. Additionally, both ips must be different from '0.0.0.0' Documentation
Sensitive Port Is Exposed To Wide Private Network
c6c7b33d-d7f6-4ab8-8c82-ca0431ecdb7e
Networking and Firewall A sensitive port, such as port 23 or port 110, is open for wide private network in either TCP or UDP protocol Documentation
MQ Broker Has Disabled General Or Audit Logging
31245f98-a6a9-4182-9fc1-45482b9d030a
Observability Check if MQ Brokers don't have logging enabled in any of the two options possible (audit and general). Documentation
Redshift Cluster Logging Disabled
15ffbacc-fa42-4f6f-a57d-2feac7365caa
Observability Make sure Logging is enabled for Redshift Cluster Documentation
CloudWatch Logging Is Disabled
7dbba512-e244-42dc-98bb-422339827967
Observability Check if CloudWatch logging is disabled for Route53 hosted zones Documentation
MSK Cluster Logging Disabled
2f56b7ab-7fba-4e93-82f0-247e5ddeb239
Observability Ensure MSK Cluster Logging is enabled Documentation
Elasticsearch Without Slow Logs
e979fcbc-df6c-422d-9458-c33d65e71c45
Observability Ensure that AWS Elasticsearch enables support for slow logs Documentation
CloudFormation Stack Notifications Disabled
b72d0026-f649-4c91-a9ea-15d8f681ac09
Observability Enable AWS CloudFormation Stack Notifications Documentation
Default VPC Exists
96ed3526-0179-4c73-b1b2-372fde2e0d13
Observability It isn't recommended to use resources in default VPC Documentation
VPC Flow Logs Disabled
f83121ea-03da-434f-9277-9cd247ab3047
Observability Sees if the id of the flow logs is the same as the vpc, if they are VPC flow logs are Enabled Documentation
API Gateway Without Cloudwatch Log
982aa526-6970-4c59-8b9b-2ce7e019fe36
Observability AWS CloudWatch Logs for APIs is not enabled Documentation
API Gateway X-Ray Disabled
5813ef56-fa94-406a-b35d-977d4a56ff2b
Observability Xray Tracing is not enabled Documentation
Cloudfront Logging is Disabled
94690d79-b3b0-43de-b656-84ebef5753e5
Observability AWS Cloudfront distributions must be have logging enabled, which means the attribute 'logging_config' must be defined Documentation
CloudWatch Metrics Not Enabled
081069cb-588b-4ce1-884c-2a1ce3029fe5
Observability Enable the CloudWatch Metrics Documentation
CloudWatch Without Retention Period Specified
ef0b316a-211e-42f1-888e-64efe172b755
Observability AWS CloudWatch Log groups should have retention days specified Documentation
Cloud Trail Multi Region Disabled
8173d5eb-96b5-4aa6-a71b-ecfa153c123d
Observability Check if MultiRegion is Enabled Documentation
CloudTrail SNS Topic Name Is Undefined
482b7d26-0bdb-4b5f-bf6f-545826c0a3dd
Observability Check if SNS topic name is set for CloudTrail Documentation
Google Compute Subnetwork Logs are Disabled
40430747-442d-450a-a34f-dc57149f4609
Observability This query checks if logs are enabled for google compute subnetwork Documentation
GuardDuty Detector Disabled
704dadd3-54fc-48ac-b6a0-02f170011473
Observability Make sure that Amazon GuardDuty is Enabled Documentation
SQL Server Auditing Is Enabled
f7e296b0-6660-4bc5-8f87-22ac4a815edf
Observability Make sure that for SQL Servers, 'Auditing' is set to 'On' Documentation
PostgreSQL Logs Checkpoints Is On
3790d386-be81-4dcf-9850-eaa7df6c10d9
Observability Make sure that for Postgre SQL Database Server, parameter 'log_checkpoints' is set to 'ON' Documentation
MSSQL Audit Retention
9c301481-e6ec-44f7-8a49-8ec63e2969ea
Observability Make sure that for MSSQL Server, the Auditing Retention is greater than 90 days Documentation
Log Disconnections Is Not Set
07f7134f-9f37-476e-8664-670c218e4702
Observability Make sure that for PostgreSQL Database, server parameter 'log_disconnections' is set to 'ON' Documentation
MSSQL Server Auditing Is Enabled
609839ae-bd81-4375-9910-5bce72ae7b92
Observability Make sure that for MSSQL Servers, that 'Auditing' is set to 'On' Documentation
PostgreSQL DB Server Log Retention Is Low
261a83f8-dd72-4e8c-b5e1-ebf06e8fe606
Observability Check if PostgreSQL Database Server retains logs for less than 3 Days Documentation
SQL Audit Retention
59acb56b-2b10-4c2c-ba38-f2223c3f5cfc
Observability Make sure for SQL Servers that Auditing Retention is greater than 90 days Documentation
Log Duration Is Not Set
16e0879a-c4ae-4ff8-a67d-a2eed5d67b8f
Observability Make sure that for PostgreSQL Database, server parameter 'log_duration' is set to 'ON' Documentation
Log Connections Is Not Set
c640d783-10c5-4071-b6c1-23507300d333
Observability Make sure that for PostgreSQL Database, server parameter 'log_connections' is set to 'ON' Documentation
Log Retention Is Not Set
ffb02aca-0d12-475e-b77c-a726f7aeff4b
Observability Make sure that for PostgreSQL Database, server parameter 'log_retention' is set to 'ON' Documentation
Email Alerts Are Disabled
9db38e87-f6aa-4b5e-a1ec-7266df259409
Observability Make sure that alerts notifications are set to 'On' in the Azure Security Center Contact Documentation
PostgreSQL Server Without Connection Throttling
2b3c671f-1b76-4741-8789-ed1fe0785dc4
Observability Ensure that Connection Throttling is set for the PostgreSQL server Documentation
CloudFormation Without Stack Policy
2f01fb2d-828a-499d-b98e-b83747305052
Resource Management AWS CloudFormation Stack should have a stack policy in order to protect stack resources from update actions Documentation
Incorrect Password Policy Expiration
ce60d060-efb8-4bfd-9cf7-ff8945d00d90
Secret Management No password exeration policy Documentation

Low

Query Category Description Help
IAM Role Allows All Principals To Assume
12b7e704-37f0-4d1e-911a-44bf60c48c21
Access Control IAM role allows all services or principals to assume it Documentation
IAM Role Allows Public Assume
bcdcbdc6-a350-4855-ae7c-d1e6436f7c97
Access Control IAM role allows All services or principals to assume it Documentation
S3 Bucket With All Permissions
a4966c4f-9141-48b8-a564-ffe9959945bc
Encryption S3 Buckets must not have all permissions, as to prevent leaking private information to the entire internet or allow unauthorized data tampering / deletion Documentation
IAM Policies Attached To User
b4378389-a9aa-44ee-91e7-ef183f11079e
Insecure Configurations IAM policies should be attached only to groups or roles Documentation
S3 Bucket With Ignore Public ACL
4fa66806-0dd9-4f8d-9480-3174d39c7c91
Insecure Configurations S3 bucket with ignore public ACL Documentation
Open Access To Resources Through API
108aa260-6dab-4a75-ae3f-de917d634840
Insecure Configurations Open access to back-end resources through API Documentation
Cloudfront Without WAF
1419b4c6-6d5c-4534-9cf6-6a5266085333
Networking and Firewall CloudFront Distribution without WAF enabled Documentation
S3 Bucket Without Logging
f861041c-8c9f-4156-acfc-5e6e524f5884
Observability S3 bucket without logging Documentation
Missing Cluster Log Types
66f130d9-b81d-4e8e-9b08-da74b9c891df
Observability Amazon EKS control plane logging don't enabled for all log types Documentation
Lambda Hardcoded AWS Access Key
1402afd8-a95c-4e84-8b0b-6fb43758e6ce
Secret Management Lambda hardcoded AWS access/secret keys Documentation
Hardcoded AWS access key
d7b9d850-3e06-4a75-852f-c46c2e92240b
Secret Management Hard-coded AWS access key / secret key exists in EC2 user data Documentation

Info

Query Category Description Help
S3 Bucket With Public RW Access
38c5ee0d-7f22-4260-ab72-5073048df100
Access Control S3 bucket with public READ/WRITE access Documentation