@mitre/hdf-converters 2.5.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (89) hide show
  1. package/LICENSE.md +9 -0
  2. package/README.md +4 -0
  3. package/lib/data/U_CCI_List.xml +38403 -0
  4. package/lib/data/aws-config-mapping.csv +107 -0
  5. package/lib/data/cwe-nist-mapping.csv +203 -0
  6. package/lib/data/nessus-plugins-nist-mapping.csv +108 -0
  7. package/lib/data/nikto-nist-mapping.csv +8942 -0
  8. package/lib/data/owasp-nist-mapping.csv +11 -0
  9. package/lib/data/scoutsuite-nist-mapping.csv +140 -0
  10. package/lib/index.d.ts +12 -0
  11. package/lib/index.js +25 -0
  12. package/lib/index.js.map +1 -0
  13. package/lib/package.json +45 -0
  14. package/lib/src/base-converter.d.ts +39 -0
  15. package/lib/src/base-converter.js +216 -0
  16. package/lib/src/base-converter.js.map +1 -0
  17. package/lib/src/burpsuite-mapper.d.ts +7 -0
  18. package/lib/src/burpsuite-mapper.js +157 -0
  19. package/lib/src/burpsuite-mapper.js.map +1 -0
  20. package/lib/src/dbprotect-mapper.d.ts +7 -0
  21. package/lib/src/dbprotect-mapper.js +165 -0
  22. package/lib/src/dbprotect-mapper.js.map +1 -0
  23. package/lib/src/fortify-mapper.d.ts +8 -0
  24. package/lib/src/fortify-mapper.js +180 -0
  25. package/lib/src/fortify-mapper.js.map +1 -0
  26. package/lib/src/jfrog-xray-mapper.d.ts +7 -0
  27. package/lib/src/jfrog-xray-mapper.js +169 -0
  28. package/lib/src/jfrog-xray-mapper.js.map +1 -0
  29. package/lib/src/mappings/CciNistMapping.d.ts +6 -0
  30. package/lib/src/mappings/CciNistMapping.js +60 -0
  31. package/lib/src/mappings/CciNistMapping.js.map +1 -0
  32. package/lib/src/mappings/CciNistMappingItem.d.ts +5 -0
  33. package/lib/src/mappings/CciNistMappingItem.js +11 -0
  34. package/lib/src/mappings/CciNistMappingItem.js.map +1 -0
  35. package/lib/src/mappings/CweNistMapping.d.ts +6 -0
  36. package/lib/src/mappings/CweNistMapping.js +74 -0
  37. package/lib/src/mappings/CweNistMapping.js.map +1 -0
  38. package/lib/src/mappings/CweNistMappingItem.d.ts +8 -0
  39. package/lib/src/mappings/CweNistMappingItem.js +34 -0
  40. package/lib/src/mappings/CweNistMappingItem.js.map +1 -0
  41. package/lib/src/mappings/NessusPluginsNistMapping.d.ts +6 -0
  42. package/lib/src/mappings/NessusPluginsNistMapping.js +48 -0
  43. package/lib/src/mappings/NessusPluginsNistMapping.js.map +1 -0
  44. package/lib/src/mappings/NessusPluginsNistMappingItem.d.ts +7 -0
  45. package/lib/src/mappings/NessusPluginsNistMappingItem.js +23 -0
  46. package/lib/src/mappings/NessusPluginsNistMappingItem.js.map +1 -0
  47. package/lib/src/mappings/NiktoNistMapping.d.ts +6 -0
  48. package/lib/src/mappings/NiktoNistMapping.js +40 -0
  49. package/lib/src/mappings/NiktoNistMapping.js.map +1 -0
  50. package/lib/src/mappings/NiktoNistMappingItem.d.ts +7 -0
  51. package/lib/src/mappings/NiktoNistMappingItem.js +28 -0
  52. package/lib/src/mappings/NiktoNistMappingItem.js.map +1 -0
  53. package/lib/src/mappings/OwaspNistMapping.d.ts +6 -0
  54. package/lib/src/mappings/OwaspNistMapping.js +55 -0
  55. package/lib/src/mappings/OwaspNistMapping.js.map +1 -0
  56. package/lib/src/mappings/OwaspNistMappingItem.d.ts +8 -0
  57. package/lib/src/mappings/OwaspNistMappingItem.js +34 -0
  58. package/lib/src/mappings/OwaspNistMappingItem.js.map +1 -0
  59. package/lib/src/mappings/ScoutsuiteNistMapping.d.ts +6 -0
  60. package/lib/src/mappings/ScoutsuiteNistMapping.js +39 -0
  61. package/lib/src/mappings/ScoutsuiteNistMapping.js.map +1 -0
  62. package/lib/src/mappings/ScoutsuiteNistMappingItem.d.ts +5 -0
  63. package/lib/src/mappings/ScoutsuiteNistMappingItem.js +21 -0
  64. package/lib/src/mappings/ScoutsuiteNistMappingItem.js.map +1 -0
  65. package/lib/src/nessus-mapper.d.ts +13 -0
  66. package/lib/src/nessus-mapper.js +303 -0
  67. package/lib/src/nessus-mapper.js.map +1 -0
  68. package/lib/src/netsparker-mapper.d.ts +7 -0
  69. package/lib/src/netsparker-mapper.js +221 -0
  70. package/lib/src/netsparker-mapper.js.map +1 -0
  71. package/lib/src/nikto-mapper.d.ts +7 -0
  72. package/lib/src/nikto-mapper.js +96 -0
  73. package/lib/src/nikto-mapper.js.map +1 -0
  74. package/lib/src/sarif-mapper.d.ts +7 -0
  75. package/lib/src/sarif-mapper.js +143 -0
  76. package/lib/src/sarif-mapper.js.map +1 -0
  77. package/lib/src/scoutsuite-mapper.d.ts +7 -0
  78. package/lib/src/scoutsuite-mapper.js +258 -0
  79. package/lib/src/scoutsuite-mapper.js.map +1 -0
  80. package/lib/src/snyk-mapper.d.ts +14 -0
  81. package/lib/src/snyk-mapper.js +165 -0
  82. package/lib/src/snyk-mapper.js.map +1 -0
  83. package/lib/src/xccdf-results-mapper.d.ts +6 -0
  84. package/lib/src/xccdf-results-mapper.js +206 -0
  85. package/lib/src/xccdf-results-mapper.js.map +1 -0
  86. package/lib/src/zap-mapper.d.ts +8 -0
  87. package/lib/src/zap-mapper.js +177 -0
  88. package/lib/src/zap-mapper.js.map +1 -0
  89. package/package.json +45 -0
@@ -0,0 +1,107 @@
1
+ AwsConfigRuleSourceIdentifier,AwsConfigRuleName,NIST-ID,Rev
2
+ SECRETSMANAGER_SCHEDULED_ROTATION_SUCCESS_CHECK,secretsmanager-scheduled-rotation-success-check,AC-2(1)|AC-2(j),4
3
+ IAM_USER_GROUP_MEMBERSHIP_CHECK,iam-user-group-membership-check,AC-2(1)|AC-2(j)|AC-3|AC-6,4
4
+ IAM_PASSWORD_POLICY,iam-password-policy,AC-2(1)|AC-2(f)|AC-2(j)|IA-2|IA-5(1)(a)(d)(e)|IA-5(4),4
5
+ ACCESS_KEYS_ROTATED,access-keys-rotated,AC-2(1)|AC-2(j),4
6
+ IAM_USER_UNUSED_CREDENTIALS_CHECK,iam-user-unused-credentials-check,AC-2(1)|AC-2(3)|AC-2(f)|AC-3|AC-6,4
7
+ SECURITYHUB_ENABLED,securityhub-enabled,AC-2(1)|AC-2(4)|AC-2(12)(a)|AC-2(g)|AC-17(1)|AU-6(1)(3)|CA-7(a)(b)|SA-10|SI-4(2)|SI-4(4)|SI-4(5)|SI-4(16)|SI-4(a)(b)(c),4
8
+ GUARDDUTY_ENABLED_CENTRALIZED,guardduty-enabled-centralized,AC-2(1)|AC-2(4)|AC-2(12)(a)|AC-2(g)|AC-17(1)|AU-6(1)(3)|CA-7(a)(b)|RA-5|SA-10|SI-4(1)|SI-4(2)|SI-4(4)|SI-4(5)|SI-4(16)|SI-4(a)(b)(c),4
9
+ CLOUD_TRAIL_CLOUD_WATCH_LOGS_ENABLED,cloud-trail-cloud-watch-logs-enabled,AC-2(4)|AC-2(g)|AU-2(a)(d)|AU-3|AU-6(1)(3)|AU-7(1)|AU-12(a)(c)|CA-7(a)(b)|SI-4(2)|SI-4(4)|SI-4(5)|SI-4(a)(b)(c),4
10
+ CLOUD_TRAIL_ENABLED,cloudtrail-enabled,AC-2(4)|AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
11
+ MULTI_REGION_CLOUD_TRAIL_ENABLED,multi-region-cloudtrail-enabled,AC-2(4)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
12
+ RDS_LOGGING_ENABLED,rds-logging-enabled,AC-2(4)|AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
13
+ CLOUDWATCH_ALARM_ACTION_CHECK,cloudwatch-alarm-action-check,AC-2(4)|AU-6(1)(3)|AU-7(1)|CA-7(a)(b)|IR-4(1)|SI-4(2)|SI-4(4)|SI-4(5)|SI-4(a)(b)(c),4
14
+ REDSHIFT_CLUSTER_CONFIGURATION_CHECK,redshift-cluster-configuration-check,AC-2(4)|AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c)|SC-13|SC-28,4
15
+ IAM_ROOT_ACCESS_KEY_CHECK,iam-root-access-key-check,AC-2(f)|AC-2(j)|AC-3|AC-6|AC-6(10),4
16
+ S3_BUCKET_LOGGING_ENABLED,s3-bucket-logging-enabled,AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
17
+ CLOUDTRAIL_S3_DATAEVENTS_ENABLED,cloudtrail-s3-dataevents-enabled,AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
18
+ ROOT_ACCOUNT_MFA_ENABLED,root-account-mfa-enabled,AC-2(j)|IA-2(1)(11),4
19
+ EMR_KERBEROS_ENABLED,emr-kerberos-enabled,AC-2(j)|AC-3|AC-5(c)|AC-6,4
20
+ IAM_GROUP_HAS_USERS_CHECK,iam-group-has-users-check,AC-2(j)|AC-3|AC-5(c)|AC-6|SC-2,4
21
+ IAM_POLICY_NO_STATEMENTS_WITH_ADMIN_ACCESS,iam-policy-no-statements-with-admin-access,AC-2(j)|AC-3|AC-5(c)|AC-6|SC-2,4
22
+ IAM_USER_NO_POLICIES_CHECK,iam-user-no-policies-check,AC-2(j)|AC-3|AC-5(c)|AC-6,4
23
+ S3_BUCKET_PUBLIC_WRITE_PROHIBITED,s3-bucket-public-write-prohibited,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
24
+ LAMBDA_FUNCTION_PUBLIC_ACCESS_PROHIBITED,lambda-function-public-access-prohibited,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
25
+ RDS_SNAPSHOTS_PUBLIC_PROHIBITED,rds-snapshots-public-prohibited,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
26
+ REDSHIFT_CLUSTER_PUBLIC_ACCESS_CHECK,redshift-cluster-public-access-check,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
27
+ S3_BUCKET_POLICY_GRANTEE_CHECK,s3-bucket-policy-grantee-check,AC-3|AC-6|SC-7|SC-7(3),4
28
+ S3_BUCKET_PUBLIC_READ_PROHIBITED,s3-bucket-public-read-prohibited,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
29
+ S3_ACCOUNT_LEVEL_PUBLIC_ACCESS_BLOCKS,s3-account-level-public-access-blocks,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
30
+ DMS_REPLICATION_NOT_PUBLIC,dms-replication-not-public,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
31
+ EBS_SNAPSHOT_PUBLIC_RESTORABLE_CHECK,ebs-snapshot-public-restorable-check,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
32
+ SAGEMAKER_NOTEBOOK_NO_DIRECT_INTERNET_ACCESS,sagemaker-notebook-no-direct-internet-access,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
33
+ RDS_INSTANCE_PUBLIC_ACCESS_CHECK,rds-instance-public-access-check,AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
34
+ LAMBDA_INSIDE_VPC,lambda-inside-vpc,AC-4|SC-7|SC-7(3),4
35
+ INSTANCES_IN_VPC,ec2-instances-in-vpc,AC-4|SC-7|SC-7(3),4
36
+ RESTRICTED_INCOMING_TRAFFIC,restricted-common-ports,AC-4|CM-2|SC-7|SC-7(3),4
37
+ INCOMING_SSH_DISABLED,restricted-ssh,AC-4|SC-7|SC-7(3),4
38
+ VPC_DEFAULT_SECURITY_GROUP_CLOSED,vpc-default-security-group-closed,AC-4|SC-7|SC-7(3),4
39
+ VPC_SG_OPEN_ONLY_TO_AUTHORIZED_PORTS,vpc-sg-open-only-to-authorized-ports,AC-4|SC-7|SC-7(3),4
40
+ ACM_CERTIFICATE_EXPIRATION_CHECK,acm-certificate-expiration-check,AC-4|AC-17(2)|SC-12,4
41
+ EC2_INSTANCE_NO_PUBLIC_IP,ec2-instance-no-public-ip,AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
42
+ ELASTICSEARCH_IN_VPC_ONLY,elasticsearch-in-vpc-only,AC-4|SC-7|SC-7(3),4
43
+ EMR_MASTER_NO_PUBLIC_IP,emr-master-no-public-ip,AC-4|AC-21(b)|SC-7|SC-7(3),4
44
+ INTERNET_GATEWAY_AUTHORIZED_VPC_ONLY,internet-gateway-authorized-vpc-only,AC-4|AC-17(3)|SC-7|SC-7(3),4
45
+ CODEBUILD_PROJECT_ENVVAR_AWSCRED_CHECK,codebuild-project-envvar-awscred-check,AC-6|IA-5(7)|SA-3(a),4
46
+ EC2_IMDSV2_CHECK,ec2-imdsv2-check,AC-6,4
47
+ IAM_NO_INLINE_POLICY_CHECK,iam-no-inline-policy-check,AC-6,4
48
+ ALB_HTTP_TO_HTTPS_REDIRECTION_CHECK,alb-http-to-https-redirection-check,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-13|SC-23,4
49
+ REDSHIFT_REQUIRE_TLS_SSL,redshift-require-tls-ssl,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-13,4
50
+ S3_BUCKET_SSL_REQUESTS_ONLY,s3-bucket-ssl-requests-only,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-13,4
51
+ ELB_ACM_CERTIFICATE_REQUIRED,elb-acm-certificate-required,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-13,4
52
+ ALB_HTTP_DROP_INVALID_HEADER_ENABLED,alb-http-drop-invalid-header-enabled,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-23,4
53
+ ELB_TLS_HTTPS_LISTENERS_ONLY,elb-tls-https-listeners-only,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-23,4
54
+ API_GW_EXECUTION_LOGGING_ENABLED,api-gw-execution-logging-enabled,AU-2(a)(d)|AU-3|AU-12(a)(c),4
55
+ ELB_LOGGING_ENABLED,elb-logging-enabled,AU-2(a)(d)|AU-3|AU-12(a)(c),4
56
+ VPC_FLOW_LOGS_ENABLED,vpc-flow-logs-enabled,AU-2(a)(d)|AU-3|AU-12(a)(c),4
57
+ WAFV2_LOGGING_ENABLED,wafv2-logging-enabled,AU-2(a)(d)|AU-3|AU-12(a)(c)|SC-7|SI-4(a)(b)(c),4
58
+ CLOUD_TRAIL_ENCRYPTION_ENABLED,cloud-trail-encryption-enabled,AU-9|SC-13|SC-28,4
59
+ CLOUDWATCH_LOG_GROUP_ENCRYPTED,cloudwatch-log-group-encrypted,AU-9|SC-13|SC-28,4
60
+ S3_BUCKET_REPLICATION_ENABLED,s3-bucket-replication-enabled,AU-9(2)|CP-9(b)|CP-10|SC-5|SC-36,4
61
+ CW_LOGGROUP_RETENTION_PERIOD_CHECK,cw-loggroup-retention-period-check,AU-11|SI-12,4
62
+ EC2_INSTANCE_DETAILED_MONITORING_ENABLED,ec2-instance-detailed-monitoring-enabled,CA-7(a)(b)|SI-4(2)|SI-4(a)(b)(c),4
63
+ RDS_ENHANCED_MONITORING_ENABLED,rds-enhanced-monitoring-enabled,CA-7(a)(b),4
64
+ EC2_INSTANCE_MANAGED_BY_SSM,ec2-instance-managed-by-systems-manager,CM-2|CM-7(a)|CM-8(1)|CM-8(3)(a)|SA-3(a)|SA-10|SI-2(2)|SI-7(1),4
65
+ EC2_MANAGEDINSTANCE_ASSOCIATION_COMPLIANCE_STATUS_CHECK,ec2-managedinstance-association-compliance-status-check,CM-2|CM-7(a)|CM-8(3)(a)|SI-2(2),4
66
+ EC2_STOPPED_INSTANCE,ec2-stopped-instance,CM-2,4
67
+ EC2_VOLUME_INUSE_CHECK,ec2-volume-inuse-check,CM-2|SC-4,4
68
+ ELB_DELETION_PROTECTION_ENABLED,elb-deletion-protection-enabled,CM-2|CP-10,4
69
+ CLOUDTRAIL_SECURITY_TRAIL_ENABLED,cloudtrail-security-trail-enabled,CM-2,4
70
+ EC2_MANAGEDINSTANCE_PATCH_COMPLIANCE_STATUS_CHECK,ec2-managedinstance-patch-compliance-status-check,CM-8(3)(a)|SI-2(2)|SI-7(1),4
71
+ DB_INSTANCE_BACKUP_ENABLED,db-instance-backup-enabled,CP-9(b)|CP-10|SI-12,4
72
+ DYNAMODB_PITR_ENABLED,dynamodb-pitr-enabled,CP-9(b)|CP-10|SI-12,4
73
+ ELASTICACHE_REDIS_CLUSTER_AUTOMATIC_BACKUP_CHECK,elasticache-redis-cluster-automatic-backup-check,CP-9(b)|CP-10|SI-12,4
74
+ DYNAMODB_IN_BACKUP_PLAN,dynamodb-in-backup-plan,CP-9(b)|CP-10|SI-12,4
75
+ EBS_IN_BACKUP_PLAN,ebs-in-backup-plan,CP-9(b)|CP-10|SI-12,4
76
+ EFS_IN_BACKUP_PLAN,efs-in-backup-plan,CP-9(b)|CP-10|SI-12,4
77
+ RDS_IN_BACKUP_PLAN,rds-in-backup-plan,CP-9(b)|CP-10|SI-12,4
78
+ DYNAMODB_AUTOSCALING_ENABLED,dynamodb-autoscaling-enabled,CP-10|SC-5,4
79
+ RDS_MULTI_AZ_SUPPORT,rds-multi-az-support,CP-10|SC-5|SC-36,4
80
+ S3_BUCKET_VERSIONING_ENABLED,s3-bucket-versioning-enabled,CP-10|SI-12,4
81
+ VPC_VPN_2_TUNNELS_UP,vpc-vpn-2-tunnels-up,CP-10,4
82
+ ELB_CROSS_ZONE_LOAD_BALANCING_ENABLED,elb-cross-zone-load-balancing-enabled,CP-10|SC-5,4
83
+ ROOT_ACCOUNT_HARDWARE_MFA_ENABLED,root-account-hardware-mfa-enabled,IA-2(1)(11),4
84
+ MFA_ENABLED_FOR_IAM_CONSOLE_ACCESS,mfa-enabled-for-iam-console-access,IA-2(1)(2)(11),4
85
+ IAM_USER_MFA_ENABLED,iam-user-mfa-enabled,IA-2(1)(2)(11),4
86
+ GUARDDUTY_NON_ARCHIVED_FINDINGS,guardduty-non-archived-findings,IR-4(1)|IR-6(1)|IR-7(1)|RA-5|SA-10|SI-4(a)(b)(c),4
87
+ CODEBUILD_PROJECT_SOURCE_REPO_URL_CHECK,codebuild-project-source-repo-url-check,SA-3(a),4
88
+ AUTOSCALING_GROUP_ELB_HEALTHCHECK_REQUIRED,autoscaling-group-elb-healthcheck-required,SC-5,4
89
+ RDS_INSTANCE_DELETION_PROTECTION_ENABLED,rds-instance-deletion-protection-enabled,SC-5,4
90
+ ALB_WAF_ENABLED,alb-waf-enabled,SC-7|SI-4(a)(b)(c),4
91
+ ELASTICSEARCH_NODE_TO_NODE_ENCRYPTION_CHECK,elasticsearch-node-to-node-encryption-check,SC-7|SC-8|SC-8(1),4
92
+ CMK_BACKING_KEY_ROTATION_ENABLED,cmk-backing-key-rotation-enabled,SC-12,4
93
+ KMS_CMK_NOT_SCHEDULED_FOR_DELETION,kms-cmk-not-scheduled-for-deletion,SC-12|SC-28,4
94
+ API_GW_CACHE_ENABLED_AND_ENCRYPTED,api-gw-cache-enabled-and-encrypted,SC-13|SC-28,4
95
+ EFS_ENCRYPTED_CHECK,efs-encrypted-check,SC-13|SC-28,4
96
+ ELASTICSEARCH_ENCRYPTED_AT_REST,elasticsearch-encrypted-at-rest,SC-13|SC-28,4
97
+ ENCRYPTED_VOLUMES,encrypted-volumes,SC-13|SC-28,4
98
+ RDS_STORAGE_ENCRYPTED,rds-storage-encrypted,SC-13|SC-28,4
99
+ S3_BUCKET_SERVER_SIDE_ENCRYPTION_ENABLED,s3-bucket-server-side-encryption-enabled,SC-13|SC-28,4
100
+ SAGEMAKER_ENDPOINT_CONFIGURATION_KMS_KEY_CONFIGURED,sagemaker-endpoint-configuration-kms-key-configured,SC-13|SC-28,4
101
+ SAGEMAKER_NOTEBOOK_INSTANCE_KMS_KEY_CONFIGURED,sagemaker-notebook-instance-kms-key-configured,SC-13|SC-28,4
102
+ SNS_ENCRYPTED_KMS,sns-encrypted-kms,SC-13|SC-28,4
103
+ DYNAMODB_TABLE_ENCRYPTED_KMS,dynamodb-table-encrypted-kms,SC-13,4
104
+ S3_BUCKET_DEFAULT_LOCK_ENABLED,s3-bucket-default-lock-enabled,SC-28,4
105
+ EC2_EBS_ENCRYPTION_BY_DEFAULT,ec2-ebs-encryption-by-default,SC-28,4
106
+ RDS_SNAPSHOT_ENCRYPTED,rds-snapshot-encrypted,SC-28,4
107
+ CLOUD_TRAIL_LOG_FILE_VALIDATION_ENABLED,cloud-trail-log-file-validation-enabled,SI-7|SI-7(1),4
@@ -0,0 +1,203 @@
1
+ CWE-ID,CWE Name,NIST-ID,Rev,NIST Name
2
+ 5, J2EE Misconfiguration: Data Transmission Without Encryption,SC-8,4,Transmission Confidentiality and Integrity
3
+ 6, J2EE Misconfiguration: Insufficient Session-ID Length,SC-23,4,Session Authenticity
4
+ 7, J2EE Misconfiguration: Missing Custom Error Page,SI-11,4,Error Handling
5
+ 8, J2EE Misconfiguration: Entity Bean Declared Remote,AC-3,4,Access Enforcement
6
+ 9, J2EE Misconfiguration: Weak Access Permissions for EJB Methods,AC-3,4,Access Enforcement
7
+ 11, ASP.NET Misconfiguration: Creating Debug Binary,SI-11,4,Error Handling
8
+ 14, Compiler Removal of Code to Clear Buffers,SI-16,4,Memory Protection
9
+ 15, External Control of System or Configuration Setting,SI-10,4,Information Input Validation
10
+ 20, Improper Input Validation,SI-10,4,Information Input Validation
11
+ 22, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),SI-10,4,Information Input Validation
12
+ 23, Relative Path Traversal,SI-10,4,Information Input Validation
13
+ 36, Absolute Path Traversal,SI-10,4,Information Input Validation
14
+ 73, External Control of File Name or Path,SI-10,4,Information Input Validation
15
+ 77, Improper Neutralization of Special Elements used in a Command ('Command Injection'),SI-10,4,Information Input Validation
16
+ 78, Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'),SI-10,4,Information Input Validation
17
+ 79, Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),SI-10,4,Information Input Validation
18
+ 89, Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'),SI-10,4,Information Input Validation
19
+ 90, Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection'),SI-10,4,Information Input Validation
20
+ 91, XML Injection (aka Blind XPath Injection),SI-10,4,Information Input Validation
21
+ 94, Improper Control of Generation of Code ('Code Injection'),SI-10,4,Information Input Validation
22
+ 95, Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection'),SI-10,4,Information Input Validation
23
+ 99, Improper Control of Resource Identifiers ('Resource Injection'),SI-10,4,Information Input Validation
24
+ 101, Struts Validation Problems,SI-10,4,Information Input Validation
25
+ 102, Struts: Duplicate Validation Forms,SI-10,4,Information Input Validation
26
+ 103, Struts: Incomplete validate() Method Definition,SI-10,4,Information Input Validation
27
+ 104, Struts: Form Bean Does Not Extend Validation Class,SI-10,4,Information Input Validation
28
+ 105, Struts: Form Field Without Validator,SI-10,4,Information Input Validation
29
+ 106, Struts: Plug-in Framework not in Use,SI-10,4,Information Input Validation
30
+ 107, Struts: Unused Validation Form,SI-10,4,Information Input Validation
31
+ 108, Struts: Unvalidated Action Form,SI-10,4,Information Input Validation
32
+ 109, Struts: Validator Turned Off,SI-10,4,Information Input Validation
33
+ 110, Struts: Validator Without Form Field,SI-10,4,Information Input Validation
34
+ 111, Direct Use of Unsafe JNI,SI-10,4,Information Input Validation
35
+ 112, Missing XML Validation,SI-10,4,Information Input Validation
36
+ 113, Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting'),SI-10,4,Information Input Validation
37
+ 114, Process Control,SI-10,4,Information Input Validation
38
+ 117, Improper Output Neutralization for Logs,SI-10,4,Information Input Validation
39
+ 119, Improper Restriction of Operations within the Bounds of a Memory Buffer,SI-10,4,Information Input Validation
40
+ 120, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'),SI-10,4,Information Input Validation
41
+ 125, Out-of-bounds Read,SI-10,4,Information Input Validation
42
+ 126, Buffer Over-read,SI-10,4,Information Input Validation
43
+ 129, Improper Validation of Array Index,,4,
44
+ 131, Incorrect Calculation of Buffer Size,SI-10,4,Information Input Validation
45
+ 134, Uncontrolled Format String,SI-10,4,Information Input Validation
46
+ 170, Improper Null Termination,SI-10,4,Information Input Validation
47
+ 176, Improper Handling of Unicode Encoding,,4,
48
+ 185, Incorrect Regular Expression,,4,
49
+ 189, Numeric Errors,SA-11,4,Developer Security Testing and Evaluation
50
+ 190, Integer Overflow or Wraparound,SI-10,4,Information Input Validation
51
+ 195, Signed to Unsigned Conversion Error,,4,
52
+ 200, Information Exposure,SC-8,4,Transmission Confidentiality and Integrity
53
+ 209, Information Exposure Through an Error Message,,4,
54
+ 215, Information Exposure Through Debug Information,SI-11,4,Error Handling
55
+ 226, Sensitive Information Uncleared Before Release,SC-4,4,Information in Shared Resources
56
+ 235, Improper Handling of Extra Parameters,SI-10,4,Information Input Validation
57
+ 242, Use of Inherently Dangerous Function,,4,
58
+ 243, Creation of chroot Jail Without Changing Working Directory,AC-3,4,Access Enforcement
59
+ 244, Improper Cleaning of Heap Memory,SC-4,4,Information in Shared Resources
60
+ 245, J2EE Bad Practices: Direct Management of Connections,,4,
61
+ 246, J2EE Bad Practices: Direct Use of Sockets,,4,
62
+ 248, Uncaught Exception,,4,
63
+ 250, Execution with Unnecessary Privileges,AC-6,4,Least Privilege: Privilege Levels for Code Execution
64
+ 251, Often Misused: String Management,,4,
65
+ 252, Unchecked Return Value,,4,
66
+ 256, Plaintext Storage of a Password,SC-28,4,Protection of Information at Rest
67
+ 257, Storing Passwords in a Recoverable Format,IA-5,4,Authenticator Management
68
+ 258, Empty Password in Configuration File,SC-28,4,Protection of Information at Rest
69
+ 259, Use of Hard-coded Password,,4,
70
+ 260, Password in Configuration File,SC-28,4,Protection of Information at Rest
71
+ 261, Weak Cryptography for Passwords,SC-13,4,Cryptographic Protection
72
+ 262, Not Using Password Aging,IA-5,4,Authenticator Management
73
+ 263, Password Aging with Long Expiration,IA-5,4,Authenticator Management
74
+ 265, Privilege / Sandbox Issues,AC-6,4,Least Privilege
75
+ 269, Improper Privilege Management,AC-4,4,Information Flow Enforcement
76
+ 272, Least Privilege Violation,AC-6,4,Least Privilege: Privilege Levels for Code Execution -8
77
+ 275, Permission Issues,AC-3,4,Access Enforcement
78
+ 284, Improper Access Control,AC-3,4,Access Enforcement
79
+ 285, Improper Authorization,AC-3,4,Access Enforcement
80
+ 288, Authentication Bypass Using an Alternate Path or Channel,IA-8,4,Identification and Authentication (Non-Organizational Users)
81
+ 297, Improper Validation of Certificate with Host Mismatch,SC-8,4,Transmission Confidentiality and Integrity
82
+ 302, Authentication Bypass by Assumed-Immutable Data,SC-23,4,Session Authenticity
83
+ 305, Authentication Bypass by Primary Weakness,IA-8,4,Identification and Authentication (Non-Organizational Users)
84
+ 306, Missing Authentication for Critical Function,AC-3,4,Access Enforcement
85
+ 307, Improper Restriction of Excessive Authentication Attempts,AC-7,4,Unsuccessful Logon Attempts
86
+ 310, Cryptographic Issues,SC-13,4,Cryptographic Protection
87
+ 311, Missing Encryption of Sensitive Data,SC-8,4,Transmission Confidentiality and Integrity
88
+ 321, Use of Hard-coded Cryptographic Key,SC-12,4,Cryptographic Key Establishment and Management
89
+ 325, Missing Required Cryptographic Step,SC-13,4,Cryptographic Protection
90
+ 326, Inadequate Encryption Strength,SC-12,4,Cryptographic Key Establishment and Management
91
+ 327, Use of a Broken or Risky Cryptographic Algorithm,SC-13,4,Cryptographic Protection
92
+ 328, Reversible One-Way Hash,SC-13,4,Cryptographic Protection
93
+ 329, Not Using a Random IV with CBC Mode,SC-12,4,Cryptographic Key Establishment and Management
94
+ 330, Use of Insufficiently Random Values,SC-13,4,Cryptographic Protection
95
+ 331, Insufficient Entropy,SC-13,4,Cryptographic Protection
96
+ 335, PRNG Seed Error,SC-13,4,Cryptographic Protection
97
+ 336, Same Seed in PRNG,SC-13,4,Cryptographic Protection
98
+ 338, Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG),SC-13,4,Cryptographic Protection
99
+ 345, Insufficient Verification of Data Authenticity,SC-8,4,Transmission Confidentiality and Integrity
100
+ 350, Reliance on Reverse DNS Resolution for a Security-Critical Function,SI-10,4,Information Input Validation
101
+ 352, Cross-Site Request Forgery (CSRF),AC-3,4,Access Enforcement
102
+ 358, Improperly Implemented Security Check for Standard,AC-3,4,Access Enforcement
103
+ 359, Exposure of Private Information ('Privacy Violation'),SC-28,4,Protection of Information at Rest
104
+ 362, Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'),SC-4,4,Information in Shared Resources
105
+ 364, Signal Handler Race Condition,,4,
106
+ 369, Divide by Zero,,4,
107
+ 377, Insecure Temporary File,SC-4,4,Information in Shared Resources (P1)
108
+ 382, J2EE Bad Practices: Use of System.exit(),,4,
109
+ 383, J2EE Bad Practices: Direct Use of Threads,,4,
110
+ 384, Session Fixation,SC-23,4,Session Authenticity
111
+ 388, Error Handling,SI-11,4,Error Handling
112
+ 391, Unchecked Error Condition,SI-11,4,Error Handling
113
+ 395, Use of NullPointerException Catch to Detect NULL Pointer Dereference,SI-11,4,Error Handling
114
+ 396, Declaration of Catch for Generic Exception,SI-11,4,Error Handling
115
+ 397, Declaration of Throws for Generic Exception,SI-11,4,Error Handling
116
+ 398, Indicator of Poor Code Quality,,4,
117
+ 400, Uncontrolled Resource Consumption ('Resource Exhaustion'),SI-10,4,Information Input Validation
118
+ 401, Improper Release of Memory Before Removing Last Reference,,4,
119
+ 404, Improper Resource Shutdown or Release,,4,
120
+ 415, Double Free,,4,
121
+ 416, Use after Free,SC-4,4,Information in Shared Resources
122
+ 434, Unrestricted Upload of File with Dangerous Type,AC-6,4,Least Privilege: Privilege Levels for Code Execution
123
+ 444, Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling'),SI-10,4,Information Input Validation
124
+ 457, Use of Uninitialized Variable,,4,
125
+ 466, Return of Pointer Value Outside of Expected Range,,4,
126
+ 470, Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection'),SI-10,4,Information Input Validation
127
+ 471, Modification of Assumed-Immutable DATA (MAID),AC-3,4,Access Enforcement
128
+ 474, Use of Function with Inconsistent Implementations,,4,
129
+ 475, Undefined Behavior for Input to API,,4,
130
+ 476, NULL Pointer Dereference,SI-10,4,Information Input Validation
131
+ 477, Use of Obsolete Functions,,4,
132
+ 478, Missing Default Case in Switch Statement,,4,
133
+ 492, Use of Inner Class Containing Sensitive Data,AC-3,4,Access Enforcement
134
+ 493, Critical Public Variable Without Final Modifier,SI-11,4,Error Handling
135
+ 494, Download of Code Without Integrity Check,SI-10,4,Information Input Validation
136
+ 495, Private Array-Typed Field Returned From A Public Method,AC-3,4,Access Enforcement
137
+ 497, Exposure of System Data to an Unauthorized Control Sphere,SI-11,4,Error Handling
138
+ 501, Trust Boundary Violation,SI-10,4,Information Input Validation
139
+ 502, Deserialization of Untrusted Data,SI-10,4,Information Input Validation
140
+ 521, Weak Password Requirements,IA-5,4,Authenticator Management : -1 Password-based Authentication
141
+ 522, Insufficiently Protected Credentials,SC-8,4,Transmission Confidentiality and Integrity
142
+ 539, Information Exposure Through Persistent Cookies,SC-23,4,Session Authenticity
143
+ 546, Suspicious Comment,,4,
144
+ 557, Concurrency Issues,,4,
145
+ 560, Use of umask() with chmod-style Argument,,4,
146
+ 561, Dead Code,,4,
147
+ 562, Return of Stack Variable Address,,4,
148
+ 563, Assigntment to Variable without Use,,4,
149
+ 564, SQL Injection: Hibernate,SI-10,4,Information Input Validation
150
+ 566, Authorization Bypass Through User-Controlled SQL Primary Key,AC-3,4,Access Enforcement
151
+ 568, finalize() Method without super.finalize(),,4,
152
+ 574, EJB Bad Practices: Use of Synchronization Primitives,,4,
153
+ 575, EJB Bad Practices: Use of AWT Swing,,4,
154
+ 576, EJB Bad Practices: Use of java I/O,,4,
155
+ 577, EJB Bad Practices: Use of Sockets,,4,
156
+ 578, EJB Bad Practices: Use of Class Loader,,4,
157
+ 579, J2EE Bad Practices: Non-serializable Object Stored in Session,,4,
158
+ 580, clone() Method Without super.clone(),,4,
159
+ 581, Object Model Violation: Just One of Equals and Hashcode Defined,,4,
160
+ 582, Array Declared Public,AC-3,4,Access Enforcement
161
+ 583, finalize() Method Declared Public,AC-3,4,Access Enforcement
162
+ 584, Return Inside Finally Block,SI-11,4,Error Handling
163
+ 586, Explicit Call to Finalize(),,4,
164
+ 590, Free of Memory not on the Heap,,4,
165
+ 591, Sensitive Data Storage in Improperly Locked Memory,SC-4,4,Information in Shared Resources
166
+ 601, URL Redirection to Untrusted Site ('Open Redirect'),SI-10,4,Information Input Validation
167
+ 607, Public Static Final Field References Mutable Object,,4,
168
+ 609, Double-Checked Locking,,4,
169
+ 611, Improper Restriction of XML External Entity Reference ('XXE'),SI-10,4,Information Input Validation
170
+ 613, Insufficient Session Expiration,AC-12,4,Session Termination
171
+ 614, Sensitive Cookie in HTTPS Session Without 'Secure' Attribute,SC-8,4,Transmission Confidentiality and Integrity
172
+ 615, Information Exposure Through Comments,AC-3,4,Access Enforcement : -5 Security-Relevant Information
173
+ 639, Authorization Bypass Through User-Controlled Key,AC-3,4,Access Enforcement
174
+ 642, External Control of Critical State Data,,4,
175
+ 643, Improper Neutralization of Data within XPath Expressions ('XPath Injection'),SI-10,4,Information Input Validation
176
+ 651, Information Exposure Through WSDL File,,4,
177
+ 652, Improper Neutralization of Data within XQuery Expressions ('XQuery Injection'),SI-10,4,Information Input Validation
178
+ 662, Improper Synchonization,,4,
179
+ 667, Improper Locking,,4,
180
+ 676, Use of Potentially Dangerous Function,,4,
181
+ 690, Unchecked Return Value to NULL Pointer Dereference,,4,
182
+ 691, Insufficient Control Flow Management,SI-11,4,Error Handling
183
+ 693, Protection Mechanism Failure,IA-5,4,Authenticator Management
184
+ 694, Use of Multiple Resources with Duplicate Identifier,,4,
185
+ 732, Incorrect Permission Assignment for Critical Resource,AC-3,4,Access Enforcement
186
+ 733, Compiler Optimization Removal or Modification of Security-critical Code,,4,
187
+ 759, Use of a One-Way Hash without a Salt,SC-13,4,Cryptographic Protection
188
+ 760, Use of a One-Way Hash with a Predictable Salt,SC-13,4,Cryptographic Protection
189
+ 776, Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion'),,4,
190
+ 780, Use of RSA Algorithm without OAEP,SC-13,4,Cryptographic Protection
191
+ 785, Use of Path Manipulation Function without Maximum-sized Buffer,SI-10,4,Information Input Validation
192
+ 787, Out-of-bounds Write,SI-10,4,Information Input Validation
193
+ 798, Use of Hard-coded Credentials,,4,
194
+ 805, Buffer Access with Incorrect Length Value,SI-10,4,Information Input Validation
195
+ 807, Reliance on Untrusted Inputs in a Security Decision,SC-23,4,Session Authenticity
196
+ 820, Missing Synchronization,,4,
197
+ 821, Incorrect Synchronization,,4,
198
+ 829, Inclusion of Functionality from Untrusted Control Sphere,,4,
199
+ 862, Missing Authorization,AC-3,4,Access Enforcement
200
+ 863, Incorrect Authorization,AC-3,4,Access Enforcement
201
+ 915, Improperly Controlled Modification of Dynamically-Determined Object Attributes,SI-10,4,Information Input Validation
202
+ 916, Use of Password Hash With Insufficient Computational Effort,SC-13,4,Cryptographic Protection
203
+ 918, Server-Side Request Forgery (SSRF),SI-10,4,Information Input Validation
@@ -0,0 +1,108 @@
1
+ pluginFamily,pluginID,NIST-ID,Rev
2
+ AIX Local Security Checks,*,SI-2|RA-5,4
3
+ Amazon Linux Local Security Checks,*,SI-2|RA-5,4
4
+ CentOS Local Security Checks,*,SI-2|RA-5,4
5
+ Debian Local Security Checks,*,SI-2|RA-5,4
6
+ F5 Networks Local Security Checks,*,SI-2|RA-5,4
7
+ Fedora Local Security Checks,*,SI-2|RA-5,4
8
+ FreeBSD Local Security Checks,*,SI-2|RA-5,4
9
+ Gentoo Local Security Checks,*,SI-2|RA-5,4
10
+ HP-UX Local Security Checks,*,SI-2|RA-5,4
11
+ Huawei Local Security Checks,*,SI-2|RA-5,4
12
+ Junos Local Security Checks,*,SI-2|RA-5,4
13
+ MacOS X Local Security Checks,*,SI-2|RA-5,4
14
+ Mandriva Local Security Checks,*,SI-2|RA-5,4
15
+ NewStart CGSL Local Security Checks,*,SI-2|RA-5,4
16
+ Oracle Linux Local Security Checks,*,SI-2|RA-5,4
17
+ OracleVM Local Security Checks,*,SI-2|RA-5,4
18
+ Palo Alto Local Security Checks,*,SI-2|RA-5,4
19
+ PhotonOS Local Security Checks,*,SI-2|RA-5,4
20
+ Red Hat Local Security Checks,*,SI-2|RA-5,4
21
+ Scientific Linux Local Security Checks,*,SI-2|RA-5,4
22
+ Slackware Local Security Checks,*,SI-2|RA-5,4
23
+ Solaris Local Security Checks,*,SI-2|RA-5,4
24
+ SuSE Local Security Checks,*,SI-2|RA-5,4
25
+ Ubuntu Local Security Checks,*,SI-2|RA-5,4
26
+ VMware ESX Local Security Checks,*,SI-2|RA-5,4
27
+ Virtuozzo Local Security Checks,*,SI-2|RA-5,4
28
+ Backdoors,,,
29
+ Brute force attacks,,,
30
+ CGI abuses,,,
31
+ CGI abuses : XSS,,,
32
+ CISCO,,,
33
+ DNS,,,
34
+ Databases,,,
35
+ Default Unix Accounts,,,
36
+ Denial of Service,,,
37
+ FTP,,,
38
+ Firewalls,56310,SC-7,4
39
+ Gain a shell remotely,,,
40
+ General,133964,AC-3(4),4
41
+ General,117530,UM-1,4
42
+ General,110483,CM-7,4
43
+ General,95928,AC-2,4
44
+ General,90191,CM-8,4
45
+ General,86420,CM-8,4
46
+ General,70544,AC-17(2)|SC-13,4
47
+ General,66334,SI-2|RA-5,4
48
+ General,64582,CM-8,4
49
+ General,57582,SC-12,4
50
+ General,57041,AC-17(2)|SC-13,4
51
+ General,56984,AC-17(2)|SC-13,4
52
+ General,56468,CM-8,4
53
+ General,55472,CM-8,4
54
+ General,54615,CM-8,4
55
+ General,51192,SC-12,4
56
+ General,45590,CM-8,4
57
+ General,45432,CM-8,4
58
+ General,45410,SC-12,4
59
+ General,39520,SI-2|RA-5,4
60
+ General,35351,CM-8,4
61
+ General,34098,CM-8,4
62
+ General,33276,CM-8,4
63
+ General,25220,SC-8,4
64
+ General,25203,CM-8,4
65
+ General,25202,CM-8,4
66
+ General,22869,CM-8,4
67
+ General,21643,AC-17(2)|SC-13,4
68
+ General,12053,CM-8,4
69
+ General,11936,CM-8,4
70
+ General,10881,AC-17(2)|SC-13,4
71
+ General,10863,SC-12,4
72
+ General,10287,CM-8,4
73
+ General,10114,CM-6,4
74
+ Misc.,118237,CM-8,4
75
+ Misc.,97993,CM-8,4
76
+ Misc.,90707,CM-8,4
77
+ Misc.,84821,AC-17(2)|SC-13,4
78
+ Misc.,83875,AC-17(2)|SC-13,4
79
+ Misc.,70657,AC-17(2)|SC-13,4
80
+ Misc.,58651,AC-17,4
81
+ Mobile Devices,,,
82
+ Netware,,,
83
+ Peer-To-Peer File Sharing,,,
84
+ Policy Compliance,,,
85
+ Port scanners,14272,CM-8,4
86
+ RPC,53335,CM-8,4
87
+ RPC,10223,CM-8,4
88
+ SCADA,,,
89
+ SMTP problems,,,
90
+ SNMP,,,
91
+ Service detection,121010,AC-17(2)|SC-13,4
92
+ Service detection,104743,AC-17(2)|SC-13,4
93
+ Service detection,25221,CM-8,4
94
+ Service detection,22964,CM-8,4
95
+ Service detection,11111,CM-8,4
96
+ Service detection,10884,AU-8(1),4
97
+ Service detection,10267,AC-17(2),4
98
+ Settings,117887,UM-1,4
99
+ Settings,110095,UM-1,4
100
+ Settings,19506,UM-1,4
101
+ Web Servers,85805,SC-8|SC-13,4
102
+ Web Servers,84502,AC-17(2)|SC-13,4
103
+ Web Servers,43111,CM-8,4
104
+ Web Servers,24260,CM-8,4
105
+ Web Servers,10107,CM-8,4
106
+ Windows,,,
107
+ Windows : Microsoft Bulletins,,,
108
+ Windows : User management,,,