Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
M
Logging metric filter and alert for custom role changes are not configured
IAM
M
Logging metric filter and alert for network changes should be configured
Cloud Platform
M
Logging metric filter and alert for network firewall rule changes should be configured
Cloud Platform
M
Logging metric filter and alert for network route changes should be configured
Cloud Platform
M
Logging metric filter and alert for project ownership assignments/changes should be configured
Monitor
M
Logging metric filter and alert for SQL instance configuration are not configured
Cloud SQL
M
Logging metric filter and alert for Storage IAM permission changes should be configured
Cloud Storage
M
Logging storage bucket retention policies and Bucket Lock are not configured
Cloud Storage
M
Logging storage bucket retention policies and Bucket Lock should be configured
Storage
M
MariaDB firewall rule allows public access
Database
M
MariaDB geo-redundant backup is disabled
Database
M
MariaDB public access is enabled
Database
M
Master authorized networks feature is disabled
Cloud Storage
M
Memory store (Redis) does not use Standard Tier for High Availability
Redis
M
Microsoft Cloud App Security (MCAS) integration in Security Center is disabled
Security Center
M
Microsoft Defender for Cosmos DB is disabled
Security Center
M
Microsoft Defender for DNS is disabled
Security Center
M
Migrate from Legacy Express Route Gateway SKUs
Network
M
Monitor activity log alert does not exist for "Create or Update Network Security Group Rule" events
Monitor
M
Monitor activity log alert does not exist for "Create or Update Network Security Group" events
Monitor
M
Monitor activity log alert does not exist for "Create or Update Security Solution" events
Monitor
M
Monitor activity log alert does not exist for "Create Policy Assignment" events
Monitor
M
Monitor activity log alert does not exist for "Delete Network Security Group Rule" events
Monitor
M
Monitor activity log alert does not exist for "Delete Security Solution" events
Monitor
M
Monitor activity log alert does not exist for "Update Security Policy" events
Monitor
M
Monitor activity log alert is not configured for "Create or Update or Delete SQL Server Firewall Rule" events
Monitor
M
Monitor activity log alert is not configured for "Delete Policy Assignment" events
Monitor
M
Monitor Activity Log Alert should exist for Delete Network Security Group
Monitor
M
Monitor activity log retention is set to less than 365 days
Monitor
M
Monitor log profile does not have activity logs for global services and all regions
Monitor
Previous
Next