Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/az id field #808

Merged
merged 4 commits into from
Jun 1, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@
"description": "Ensure Azure Application Gateway Web application firewall (WAF) is enabled",
"reference_id": "accurics.azure.NS.147",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0189"
}
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@
"description": "Ensure Container Registry has locks",
"reference_id": "accurics.azure.AKS.3",
"category": "Resilience",
"version": 2
"version": 2,
"id": "AC_AZURE_0185"
}
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@
"description": "Ensure that admin user is disabled for Container Registry",
"reference_id": "accurics.azure.EKM.164",
"category": "Identity and Access Management",
"version": 2
"version": 2,
"id": "AC_AZURE_0186"
}
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@
"description": "Ensure that Cosmos DB Account has an associated tag",
"reference_id": "accurics.azure.CAM.162",
"category": "Compliance Validation",
"version": 2
"version": 2,
"id": "AC_AZURE_0277"
}
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@
"description": "Ensure to filter source Ips for Cosmos DB Account",
"reference_id": "accurics.azure.NS.32",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0184"
}
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@
"description": "Ensure the key vault is recoverable - enable \"Soft Delete\" setting for a Key Vault",
"reference_id": "accurics.azure.EKM.164",
"category": "Data Protection",
"version": 2
"version": 2,
"id": "AC_AZURE_0170"
}
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@
"description": "Ensure that logging for Azure KeyVault is 'Enabled'",
"reference_id": "accurics.azure.EKM.20",
"category": "Logging and Monitoring",
"version": 2
"version": 2,
"id": "AC_AZURE_0169"
}
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@
"description": "Ensure that the expiration date is set on all keys",
"reference_id": "accurics.azure.EKM.25",
"category": "Data Protection",
"version": 2
"version": 2,
"id": "AC_AZURE_0164"
}
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@
"description": "Ensure that the expiration date is set on all secrets",
"reference_id": "accurics.azure.EKM.26",
"category": "Data Protection",
"version": 2
"version": 2,
"id": "AC_AZURE_0163"
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,5 +8,6 @@
"description": "Ensure AKS cluster has Network Policy configured.",
"reference_id": "accurics.azure.NS.382",
"category": "Infrastructure Security",
"version": 1
"version": 1,
"id": "AC_AZURE_0158"
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,5 +8,6 @@
"description": "Ensure Kube Dashboard is disabled",
"reference_id": "accurics.azure.NS.383",
"category": "Infrastructure Security",
"version": 1
"version": 1,
"id": "AC_AZURE_0161"
}
Original file line number Diff line number Diff line change
Expand Up @@ -11,5 +11,6 @@
"description": "Ensure that 'Auditing' Retention is 'greater than 90 days' for MSSQL servers.",
"reference_id": "accurics.azure.LOG.357",
"category": "Logging and Monitoring",
"version": 1
"version": 1,
"id": "AC_AZURE_0136"
}
Original file line number Diff line number Diff line change
Expand Up @@ -11,5 +11,6 @@
"description": "Ensure that 'Auditing' is set to 'On' for MSSQL servers",
"reference_id": "accurics.azure.MON.355",
"category": "Logging and Monitoring",
"version": 1
"version": 1,
"id": "AC_AZURE_0137"
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,5 +8,6 @@
"description": "Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server.",
"reference_id": "accurics.azure.NS.361",
"category": "Infrastructure Security",
"version": 1
"version": 1,
"id": "AC_AZURE_0131"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Puppet Master (TCP:8140) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.101",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0451"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "SMTP (TCP:25) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.103",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0448"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "SNMP (UDP:161) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.105",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0445"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "SQL Server Analysis (TCP:2382) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.107",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0442"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "SQL Server Analysis (TCP:2383) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.109",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0439"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "SaltStack Master (TCP:4505) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.111",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0436"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "SaltStack Master (TCP:4506) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.113",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0433"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Telnet (TCP:23) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.115",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0430"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "VNC Listener (TCP:5500) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.117",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0427"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "VNC Server (TCP:5900) is exposed to entire Public network",
"reference_id": "accurics.azure.NPS.119",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0424"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Remote Desktop (TCP:3389) is exposed to the entire public internet",
"reference_id": "accurics.azure.NPS.171",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0342"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "SSH (TCP:22) is exposed to the entire public internet",
"reference_id": "accurics.azure.NPS.172",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0285"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "CIFS / SMB (TCP:3020) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.174",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0272"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Cassandra (TCP:7001) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.176",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0275"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Cassandra OpsCenter (TCP:61621) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.178",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0536"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "DNS (UDP:53) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.180",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0533"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Hadoop Name Node (TCP:9000) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.182",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0530"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": " Known internal web port (TCP:8000) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.184",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0527"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": " Known internal web port (TCP:8080) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.186",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0524"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "LDAP SSL (TCP:636) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.188",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0521"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "MSSQL Admin (TCP:1434) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.190",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0518"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "MSSQL Browser (UDP:1434) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.192",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0518"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "MSSQL Debugger (TCP:135) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.194",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0512"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "MSSQL Server (TCP:1433) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.196",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0509"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Memcached SSL (TCP:11214) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.198",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0506"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Memcached SSL (TCP:11215) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.200",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0503"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Memcached SSL (UDP:11214) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.202",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0506"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Memcached SSL (UDP:11215) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.204",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0503"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Microsoft-DS (TCP:445) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.206",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0494"
}
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@
"description": "Mongo Web Portal (TCP:27018) is exposed to wide Private network",
"reference_id": "accurics.azure.NPS.208",
"category": "Infrastructure Security",
"version": 2
"version": 2,
"id": "AC_AZURE_0491"
}