Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
Google
Kubernetes
All Kubernetes service groups
Container
Deployment
Network Policy
Network
Pod Security Policy
Role
RoleBinding
Service
Report a new vulnerability
RULE
SERVICE GROUP
M
Virtual Machine unattached managed disks should be encrypted with Customer Managed Keys
Storage
M
Virtual Machines should use Managed Disks
Storage
M
Virtual network DDoS protection plan is disabled
Network
M
Virtual Network Network Watcher should be enabled
Monitor
M
Virtual network security group permits ingress from '0.0.0.0/0' to port 22 (SSH)
Network
M
VM Agent is not provisioned automatically for linux
Compute
M
VM Agent is not provisioned automatically for Windows
Compute
M
VPC default security group allows unrestricted egress traffic
VPC
M
VPC default security group allows unrestricted ingress traffic
VPC
M
VPC endpoint policy allows full access to service
VPC
M
VPC flow logging is not enabled
VPC
M
VPC flow logs for VPC network subnets are disabled
Compute Engine
M
VPC network ACL allows ingress from '0.0.0.0/0' to port 22
VPC
M
VPC network ACL allows ingress from 0.0.0.0/0 to port 3389
VPC
M
VPC security group allows ingress from any address to all ports and protocols
VPC
M
VPC security group attached to EC2 instance allows ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group attached to EC2 instance permits ingress from '0.0.0.0/0' to port 389 (LDAP)
VPC
M
VPC security group attached to RDS instance permits ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group inbound rule allows ingress from '0.0.0.0/0' to all ports and protocols
VPC
M
VPC security group inbound rule permits ingress from a public address to all ports and protocols
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11214 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11215 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 135 (MSSQL Debugger)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 137 (NetBIOS Name Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 138 (NetBios Datagram Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 139 (NetBios Session Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1433 (MSSQL Server)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1434 (MSSQL Admin)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 22 (SSH)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 23 (Telnet)
VPC
Previous
Next