Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
All AWS service groups
Account Management
ACM
Amplify
API Gateway (REST APIs)
AppStream
AppSync
Athena
Batch
CloudFront
CloudTrail
CloudWatch
CodeBuild
Cognito
Config
DocumentDB
DynamoDB
EBS
EC2
ECR
ECS
EFS
EKS
ELB
EMR
ElastiCache
ElasticSearch
FSx
Glacier
Global Accelerator
Glue
IAM
Kinesis
KMS
Lambda
MQ
MSK
Neptune
QLDB
RDS
Redshift
S3
Sagemaker
Secrets Manager
SNS
SQS
SSM
Transfer
VPC
WAF
WorkSpaces
Azure
Google
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
M
Virtual Machine unattached managed disks should be encrypted with Customer Managed Keys
Storage
M
Virtual Machines should use Managed Disks
Storage
M
Virtual network DDoS protection plan is disabled
Network
M
Virtual Network Network Watcher should be enabled
Monitor
M
Virtual network security group permits ingress from '0.0.0.0/0' to port 22 (SSH)
Network
M
VM Agent is not provisioned automatically for linux
Compute
M
VM Agent is not provisioned automatically for Windows
Compute
M
VPC default security group allows unrestricted egress traffic
VPC
M
VPC default security group allows unrestricted ingress traffic
VPC
M
VPC endpoint policy allows full access to service
VPC
M
VPC flow logging is not enabled
VPC
M
VPC flow logs for VPC network subnets are disabled
Compute Engine
M
VPC network ACL allows ingress from '0.0.0.0/0' to port 22
VPC
M
VPC network ACL allows ingress from 0.0.0.0/0 to port 3389
VPC
M
VPC security group allows ingress from any address to all ports and protocols
VPC
M
VPC security group attached to EC2 instance allows ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group attached to EC2 instance permits ingress from '0.0.0.0/0' to port 389 (LDAP)
VPC
M
VPC security group attached to RDS instance permits ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group inbound rule allows ingress from '0.0.0.0/0' to all ports and protocols
VPC
M
VPC security group inbound rule permits ingress from a public address to all ports and protocols
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11214 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11215 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 135 (MSSQL Debugger)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 137 (NetBIOS Name Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 138 (NetBios Datagram Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 139 (NetBios Session Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1433 (MSSQL Server)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1434 (MSSQL Admin)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 22 (SSH)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 23 (Telnet)
VPC
Previous
Next