Tenable Cloud Security Policies Search

IDNameCSPDomainSeverity
AC_GCP_0119Ensure Telnet (TCP:23) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0122Ensure Memcached SSL (UDP:11215) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0123Ensure Memcached SSL (TCP:11215) is not exposed to more than 32 private hosts for Google Compute FirewallGCPInfrastructure Security
LOW
AC_GCP_0139Ensure Postgres SQL (UDP:5432) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0140Ensure Postgres SQL (UDP:5432) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0141Ensure Postgres SQL (TCP:5432) is not exposed to more than 32 private hosts for Google Compute FirewallGCPInfrastructure Security
LOW
AC_GCP_0143Ensure Postgres SQL (TCP:5432) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0151Ensure Oracle DB SSL (TCP:2484) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0158Ensure MSSQL Server (TCP:1433) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0170Ensure Unencrypted Mongo Instances (TCP:27017) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0179Ensure Elastic Search (TCP:9300) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0181Ensure Elastic Search (TCP:9200) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0183Ensure Cassandra Thrift (TCP:9160) is not exposed to more than 32 private hosts for Google Compute FirewallGCPInfrastructure Security
LOW
AC_GCP_0188Ensure Cassandra Client (TCP:9042) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0193Ensure Cassandra Monitoring (TCP:7199) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0200Ensure Redis (TCP:6379) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0201Ensure Redis (TCP:6379) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0212Ensure LDAP (UDP:389) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM
AC_GCP_0213Ensure LDAP (UDP:389) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0217Ensure CiscoSecure, Websm (TCP:9090) is not exposed to more than 32 private hosts for Google Compute FirewallGCPInfrastructure Security
LOW
AC_GCP_0219Ensure CiscoSecure, Websm (TCP:9090) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0222Ensure Hadoop Name Node (TCP:9000) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0228Ensure FTP (TCP:20) is not exposed to entire internet for Google Compute FirewallGCPInfrastructure Security
HIGH
AC_GCP_0255Ensure that IAM permissions are not granted directly to users for Google CloudGCPIdentity and Access Management
HIGH
AC_GCP_0272Ensure shielded nodes are enabled for all nodes in Google Container ClusterGCPInfrastructure Security
LOW
AC_GCP_0284Ensure datastore storage resource does not have access policy set to 'Public' for Google App Engine ApplicationGCPInfrastructure Security
MEDIUM
AC_GCP_0286Ensure compatibility firestore storage resource does not have access policy set to 'Public' for Google App Engine ApplicationGCPInfrastructure Security
MEDIUM
AC_GCP_0018Ensure that Alpha clusters are not used for production workloadsGCPSecurity Best Practices
LOW
AC_GCP_0025Ensure use of VPC-native clustersGCPCompliance Validation
HIGH
AC_GCP_0027Ensure Master Authorized Networks is EnabledGCPInfrastructure Security
HIGH
AC_GCP_0030Ensure Stackdriver Kubernetes Logging and Monitoring is EnabledGCPLogging and Monitoring
HIGH
AC_GCP_0033Ensure that VPC Flow Logs is Enabled for Every Subnet in a VPC NetworkGCPLogging and Monitoring
MEDIUM
AC_GCP_0099Ensure 'Log_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set AppropriatelyGCPCompliance Validation
LOW
AC_GCP_0240Ensure That Separation of Duties Is Enforced While Assigning Service Account Related Roles to UsersGCPIdentity and Access Management
LOW
AC_GCP_0259Ensure that the 'contained database authentication' database flag for Cloud SQL on the SQL Server instance is set to 'off'GCPCompliance Validation
LOW
AC_GCP_0262Ensure 'user options' database flag for Cloud SQL SQL Server instance is not configuredGCPCompliance Validation
LOW
AC_GCP_0263Ensure That a MySQL Database Instance Does Not Allow Anyone To Connect With Administrative PrivilegesGCPCompliance Validation
LOW
AC_GCP_0271Ensure Secure Boot for Shielded GKE Nodes is EnabledGCPInfrastructure Security
LOW
AC_GCP_0273Ensure That RSASHA1 Is Not Used for the Key-Signing Key in Cloud DNS DNSSECGCPInfrastructure Security
MEDIUM
AC_GCP_0279Ensure That the Log Metric Filter and Alerts Exist for VPC Network ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0299Ensure 'Log_min_error_statement' Database Flag for Cloud SQL PostgreSQL Instance Is Set to 'Error' or StricterGCPCompliance Validation
LOW
AC_GCP_0306Ensure That the Log Metric Filter and Alerts Exist for Audit Configuration ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0309Ensure That the Log Metric Filter and Alerts Exist for VPC Network Firewall Rule ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0310Ensure That the Log Metric Filter and Alerts Exist for VPC Network Route ChangesGCPLogging and Monitoring
MEDIUM
AC_GCP_0313Ensure That Cloud KMS Cryptokeys Are Not Anonymously or Publicly AccessibleGCPData Protection
MEDIUM
AC_GCP_0337Ensure Cloud Asset Inventory Is EnabledGCPLogging and Monitoring
MEDIUM
AC_GCP_0358Ensure That Retention Policies on Cloud Storage Buckets Used for Exporting Logs Are Configured Using Bucket LockGCPLogging and Monitoring
LOW
AC_GCP_0365Ensure API Keys Only Exist for Active ServicesGCPSecurity Best Practices
MEDIUM
AC_GCP_0021Ensure basic authentication is disabled on Google Container ClusterGCPIdentity and Access Management
HIGH
AC_GCP_0043Ensure Cassandra OpsCenter agent (TCP:61621) is not exposed to public for Google Compute FirewallGCPInfrastructure Security
MEDIUM