Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
Kubernetes
All Kubernetes service groups
Container
Deployment
Network Policy
Network
Pod Security Policy
Role
RoleBinding
Service
Report a new vulnerability
RULE
SERVICE GROUP
M
Logging metric filter and alert for network changes should be configured
Cloud Platform
M
Logging metric filter and alert for network firewall rule changes should be configured
Cloud Platform
M
Logging metric filter and alert for network route changes should be configured
Cloud Platform
M
Logging metric filter and alert for project ownership assignments/changes should be configured
Monitor
M
Logging metric filter and alert for SQL instance configuration are not configured
Cloud SQL
M
Logging metric filter and alert for Storage IAM permission changes should be configured
Cloud Storage
M
Logging storage bucket retention policies and Bucket Lock are not configured
Cloud Storage
M
Logging storage bucket retention policies and Bucket Lock should be configured
Storage
M
MariaDB firewall rule allows public access
Database
M
MariaDB geo-redundant backup is disabled
Database
M
MariaDB public access is enabled
Database
M
Master authorized networks feature is disabled
Cloud Storage
M
Memory store (Redis) does not use Standard Tier for High Availability
Redis
M
Microsoft Cloud App Security (MCAS) integration in Security Center is disabled
Security Center
M
Microsoft Defender for Cosmos DB is disabled
Security Center
M
Microsoft Defender for DNS is disabled
Security Center
M
Migrate from Legacy Express Route Gateway SKUs
Network
M
Monitor activity log alert does not exist for "Create or Update Network Security Group Rule" events
Monitor
M
Monitor activity log alert does not exist for "Create or Update Network Security Group" events
Monitor
M
Monitor activity log alert does not exist for "Create or Update Security Solution" events
Monitor
M
Monitor activity log alert does not exist for "Create Policy Assignment" events
Monitor
M
Monitor activity log alert does not exist for "Delete Network Security Group Rule" events
Monitor
M
Monitor activity log alert does not exist for "Delete Security Solution" events
Monitor
M
Monitor activity log alert does not exist for "Update Security Policy" events
Monitor
M
Monitor activity log alert is not configured for "Create or Update or Delete SQL Server Firewall Rule" events
Monitor
M
Monitor activity log alert is not configured for "Delete Policy Assignment" events
Monitor
M
Monitor Activity Log Alert should exist for Delete Network Security Group
Monitor
M
Monitor activity log retention is set to less than 365 days
Monitor
M
Monitor log profile does not have activity logs for global services and all regions
Monitor
M
Monitor log profile should be created
Monitor
Previous
Next