Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
All Google service groups
App Engine
Artifact Registry
BigQuery
Cloud DNS
Cloud Functions
Cloud KMS
Cloud Platform
Cloud SQL
Cloud Storage
Compute Engine
Compute
Container
Dataflow
Dataproc
Filestore
IAM
Kubernetes (Container) Engine
Monitor
Network
Redis
Secrets Manager
Storage
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
H
Public ALB Must Be Protected by AWS WAF
WAF
H
Public read access is enabled for storage containers and blobs
Storage
H
RDS database instance is publicly accessible
RDS
H
Redis cache insecure port is enabled
Redis
H
Redshift cluster does not require SSL connections
Redshift
H
Redshift cluster is publicly accessible
Redshift
H
Roles and cluster roles should not use wildcards for resource, verb, or apiGroup entries
Role
H
S3 bucket ACL allows public access to S3 bucket storing CloudTrail log files
S3
H
S3 bucket does not have `ignore_public_acls` enabled
S3
H
S3 bucket has `restrict_public_buckets` disabled
S3
H
S3 bucket is publicly readable
S3
H
S3 Bucket is publicly readable
S3
H
SageMaker Notebook root access is enabled
Sagemaker
H
SAS token can be used over insecure HTTP
Storage
H
Sensitive certificate key material is stored in state file
Secrets Manager
H
Service account has admin privileges
IAM
H
Service is using an external IP
Service
H
SQS queue policy allows all actions on the resource
SQS
H
SQS Queues are not encrypted at rest
SQS
H
SSL is not enabled on CloudSQL instance
Cloud SQL
H
Storage account blob service soft delete is disabled
Storage
H
Storage account does not enforce HTTPS
Storage
H
Storage container allows public access
Storage
H
Storage queue service logging is disabled
Storage
H
The built-in "cluster-admin" role is used
Deployment
H
The client traffic will not be encrypted in transit
MSK
H
The ElasticSearch cluster does not enforce HTTPS
ElasticSearch
H
The FSx for Windows File Server does not have retention backup period configured
FSx
H
The IAM role can be assumed by any service or principal
IAM
H
The log_connections setting is disabled on Postgresql DB
Cloud SQL
Previous
Next