checkmate5 5.1.0.dev1__py3-none-any.whl → 5.1.0.dev2__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (56) hide show
  1. checkmate/settings/defaults.py +0 -28
  2. {checkmate5-5.1.0.dev1.dist-info → checkmate5-5.1.0.dev2.dist-info}/METADATA +1 -1
  3. {checkmate5-5.1.0.dev1.dist-info → checkmate5-5.1.0.dev2.dist-info}/RECORD +7 -56
  4. checkmate/contrib/plugins/all/opengrep/__init__.py +0 -0
  5. checkmate/contrib/plugins/all/opengrep/analyzer.py +0 -150
  6. checkmate/contrib/plugins/all/opengrep/issues_data.py +0 -5
  7. checkmate/contrib/plugins/all/opengrep/opengrep_manylinux_x86 +0 -0
  8. checkmate/contrib/plugins/all/opengrep/setup.py +0 -13
  9. checkmate/contrib/plugins/cve/__init__.py +0 -0
  10. checkmate/contrib/plugins/cve/text4shell/__init__.py +0 -0
  11. checkmate/contrib/plugins/cve/text4shell/analyzer.py +0 -64
  12. checkmate/contrib/plugins/cve/text4shell/issues_data.py +0 -8
  13. checkmate/contrib/plugins/cve/text4shell/setup.py +0 -13
  14. checkmate/contrib/plugins/golang/__init__.py +0 -0
  15. checkmate/contrib/plugins/golang/gostaticcheck/__init__.py +0 -0
  16. checkmate/contrib/plugins/golang/gostaticcheck/analyzer.py +0 -94
  17. checkmate/contrib/plugins/golang/gostaticcheck/issues_data.py +0 -1246
  18. checkmate/contrib/plugins/golang/gostaticcheck/setup.py +0 -13
  19. checkmate/contrib/plugins/iac/__init__.py +0 -0
  20. checkmate/contrib/plugins/iac/kubescape/__init__.py +0 -0
  21. checkmate/contrib/plugins/iac/kubescape/analyzer.py +0 -115
  22. checkmate/contrib/plugins/iac/kubescape/issues_data.py +0 -636
  23. checkmate/contrib/plugins/iac/kubescape/setup.py +0 -14
  24. checkmate/contrib/plugins/iac/tfsec/__init__.py +0 -0
  25. checkmate/contrib/plugins/iac/tfsec/analyzer.py +0 -92
  26. checkmate/contrib/plugins/iac/tfsec/issues_data.py +0 -1917
  27. checkmate/contrib/plugins/iac/tfsec/setup.py +0 -13
  28. checkmate/contrib/plugins/java/__init__.py +0 -0
  29. checkmate/contrib/plugins/java/semgrepjava/__init__.py +0 -0
  30. checkmate/contrib/plugins/java/semgrepjava/analyzer.py +0 -96
  31. checkmate/contrib/plugins/java/semgrepjava/issues_data.py +0 -5
  32. checkmate/contrib/plugins/java/semgrepjava/setup.py +0 -13
  33. checkmate/contrib/plugins/javascript/__init__.py +0 -0
  34. checkmate/contrib/plugins/javascript/semgrepeslint/__init__.py +0 -0
  35. checkmate/contrib/plugins/javascript/semgrepeslint/analyzer.py +0 -95
  36. checkmate/contrib/plugins/javascript/semgrepeslint/issues_data.py +0 -6
  37. checkmate/contrib/plugins/javascript/semgrepeslint/setup.py +0 -13
  38. checkmate/contrib/plugins/perl/__init__.py +0 -0
  39. checkmate/contrib/plugins/perl/graudit/__init__.py +0 -0
  40. checkmate/contrib/plugins/perl/graudit/analyzer.py +0 -70
  41. checkmate/contrib/plugins/perl/graudit/issues_data.py +0 -8
  42. checkmate/contrib/plugins/perl/graudit/setup.py +0 -13
  43. checkmate/contrib/plugins/python/__init__.py +0 -0
  44. checkmate/contrib/plugins/python/bandit/__init__.py +0 -0
  45. checkmate/contrib/plugins/python/bandit/analyzer.py +0 -74
  46. checkmate/contrib/plugins/python/bandit/issues_data.py +0 -426
  47. checkmate/contrib/plugins/python/bandit/setup.py +0 -13
  48. checkmate/contrib/plugins/ruby/__init__.py +0 -0
  49. checkmate/contrib/plugins/ruby/brakeman/__init__.py +0 -0
  50. checkmate/contrib/plugins/ruby/brakeman/analyzer.py +0 -96
  51. checkmate/contrib/plugins/ruby/brakeman/issues_data.py +0 -518
  52. checkmate/contrib/plugins/ruby/brakeman/setup.py +0 -13
  53. {checkmate5-5.1.0.dev1.dist-info → checkmate5-5.1.0.dev2.dist-info}/WHEEL +0 -0
  54. {checkmate5-5.1.0.dev1.dist-info → checkmate5-5.1.0.dev2.dist-info}/entry_points.txt +0 -0
  55. {checkmate5-5.1.0.dev1.dist-info → checkmate5-5.1.0.dev2.dist-info}/licenses/LICENSE.txt +0 -0
  56. {checkmate5-5.1.0.dev1.dist-info → checkmate5-5.1.0.dev2.dist-info}/top_level.txt +0 -0
@@ -1,1917 +0,0 @@
1
- issues_data = {
2
- "AVD-KSV-0001": {
3
- "title": "kubernetes: Process can elevate its own privileges",
4
- "description": "%(issue.data)s",
5
- "severity": 3,
6
- "categories": []
7
- },
8
- "AVD-KSV-0024": {
9
- "title": "kubernetes: Access to host ports",
10
- "description": "%(issue.data)s",
11
- "severity": 3,
12
- "categories": []
13
- },
14
- "AVD-DS-0011": {
15
- "title": "dockerfile: COPY with more than two arguments not ending with slash",
16
- "description": "%(issue.data)s",
17
- "severity": 3,
18
- "categories": []
19
- },
20
- "AVD-DS-0017": {
21
- "title": "dockerfile: 'RUN <package-manager> update' instruction alone",
22
- "description": "%(issue.data)s",
23
- "severity": 3,
24
- "categories": []
25
- },
26
- "AVD-DS-0005": {
27
- "title": "dockerfile: ADD instead of COPY",
28
- "description": "%(issue.data)s",
29
- "severity": 3,
30
- "categories": []
31
- },
32
- "AVD-KSV-0010": {
33
- "title": "kubernetes: Access to host PID",
34
- "description": "%(issue.data)s",
35
- "severity": 3,
36
- "categories": []
37
- },
38
- "AVD-KSV-0104": {
39
- "title": "kubernetes: Seccomp profile unconfined",
40
- "description": "%(issue.data)s",
41
- "severity": 3,
42
- "categories": []
43
- },
44
- "AVD-DS-0024": {
45
- "title": "dockerfile: 'apt-get dist-upgrade' used",
46
- "description": "%(issue.data)s",
47
- "severity": 3,
48
- "categories": []
49
- },
50
- "AVD-KSV-0018": {
51
- "title": "kubernetes: Memory not limited",
52
- "description": "%(issue.data)s",
53
- "severity": 3,
54
- "categories": []
55
- },
56
- "AVD-KSV-0008": {
57
- "title": "kubernetes: Access to host IPC namespace",
58
- "description": "%(issue.data)s",
59
- "severity": 3,
60
- "categories": []
61
- },
62
- "AVD-DS-0016": {
63
- "title": "dockerfile: Multiple CMD instructions listed",
64
- "description": "%(issue.data)s",
65
- "severity": 3,
66
- "categories": []
67
- },
68
- "AVD-KSV-0102": {
69
- "title": "kubernetes: Tiller Is Deployed",
70
- "description": "%(issue.data)s",
71
- "severity": 3,
72
- "categories": []
73
- },
74
- "AVD-KSV-0037": {
75
- "title": "kubernetes: User Pods should not be placed in kube-system namespace",
76
- "description": "%(issue.data)s",
77
- "severity": 3,
78
- "categories": []
79
- },
80
- "AVD-KSV-0023": {
81
- "title": "kubernetes: hostPath volumes mounted",
82
- "description": "%(issue.data)s",
83
- "severity": 3,
84
- "categories": []
85
- },
86
- "AVD-KSV-0025": {
87
- "title": "kubernetes: SELinux custom options set",
88
- "description": "%(issue.data)s",
89
- "severity": 3,
90
- "categories": []
91
- },
92
- "AVD-DS-0022": {
93
- "title": "dockerfile: Deprecated MAINTAINER used",
94
- "description": "%(issue.data)s",
95
- "severity": 3,
96
- "categories": []
97
- },
98
- "AVD-DS-0006": {
99
- "title": "dockerfile: COPY '--from' referring to the current image",
100
- "description": "%(issue.data)s",
101
- "severity": 3,
102
- "categories": []
103
- },
104
- "AVD-DS-0012": {
105
- "title": "dockerfile: Duplicate aliases defined in different FROMs",
106
- "description": "%(issue.data)s",
107
- "severity": 3,
108
- "categories": []
109
- },
110
- "AVD-KSV-0028": {
111
- "title": "kubernetes: Non-ephemeral volume types used",
112
- "description": "%(issue.data)s",
113
- "severity": 3,
114
- "categories": []
115
- },
116
- "AVD-KSV-0022": {
117
- "title": "kubernetes: Non-default capabilities added",
118
- "description": "%(issue.data)s",
119
- "severity": 3,
120
- "categories": []
121
- },
122
- "AVD-KSV-0105": {
123
- "title": "kubernetes: Containers must not set runAsUser to 0",
124
- "description": "%(issue.data)s",
125
- "severity": 3,
126
- "categories": []
127
- },
128
- "AVD-DS-0002": {
129
- "title": "dockerfile: Image user should not be 'root'",
130
- "description": "%(issue.data)s",
131
- "severity": 3,
132
- "categories": []
133
- },
134
- "AVD-DS-0001": {
135
- "title": "dockerfile: ':latest' tag used",
136
- "description": "%(issue.data)s",
137
- "severity": 3,
138
- "categories": []
139
- },
140
- "AVD-KSV-0027": {
141
- "title": "kubernetes: Non-default /proc masks set",
142
- "description": "%(issue.data)s",
143
- "severity": 3,
144
- "categories": []
145
- },
146
- "AVD-DS-0014": {
147
- "title": "dockerfile: RUN using 'wget' and 'curl'",
148
- "description": "%(issue.data)s",
149
- "severity": 3,
150
- "categories": []
151
- },
152
- "AVD-DS-0019": {
153
- "title": "dockerfile: 'dnf clean all' missing",
154
- "description": "%(issue.data)s",
155
- "severity": 3,
156
- "categories": []
157
- },
158
- "AVD-DS-0023": {
159
- "title": "dockerfile: Multiple HEALTHCHECK defined",
160
- "description": "%(issue.data)s",
161
- "severity": 3,
162
- "categories": []
163
- },
164
- "AVD-KSV-0106": {
165
- "title": "kubernetes: Container capabilities must only include NET_BIND_SERVICE",
166
- "description": "%(issue.data)s",
167
- "severity": 3,
168
- "categories": []
169
- },
170
- "AVD-KSV-0014": {
171
- "title": "kubernetes: Root file system is not read-only",
172
- "description": "%(issue.data)s",
173
- "severity": 3,
174
- "categories": []
175
- },
176
- "AVD-KSV-0020": {
177
- "title": "kubernetes: Runs with low user ID",
178
- "description": "%(issue.data)s",
179
- "severity": 3,
180
- "categories": []
181
- },
182
- "AVD-KSV-0002": {
183
- "title": "kubernetes: Default AppArmor profile not set",
184
- "description": "%(issue.data)s",
185
- "severity": 3,
186
- "categories": []
187
- },
188
- "AVD-DS-0013": {
189
- "title": "dockerfile: 'RUN cd ...' to change directory",
190
- "description": "%(issue.data)s",
191
- "severity": 3,
192
- "categories": []
193
- },
194
- "AVD-DS-0008": {
195
- "title": "dockerfile: Exposed port out of range",
196
- "description": "%(issue.data)s",
197
- "severity": 3,
198
- "categories": []
199
- },
200
- "AVD-KSV-0009": {
201
- "title": "kubernetes: Access to host network",
202
- "description": "%(issue.data)s",
203
- "severity": 3,
204
- "categories": []
205
- },
206
- "AVD-KSV-0017": {
207
- "title": "kubernetes: Privileged container",
208
- "description": "%(issue.data)s",
209
- "severity": 3,
210
- "categories": []
211
- },
212
- "AVD-KSV-0038": {
213
- "title": "kubernetes: Selector usage in network policies",
214
- "description": "%(issue.data)s",
215
- "severity": 3,
216
- "categories": []
217
- },
218
- "AVD-KSV-0005": {
219
- "title": "kubernetes: SYS_ADMIN capability added",
220
- "description": "%(issue.data)s",
221
- "severity": 3,
222
- "categories": []
223
- },
224
- "AVD-KSV-0016": {
225
- "title": "kubernetes: Memory requests not specified",
226
- "description": "%(issue.data)s",
227
- "severity": 3,
228
- "categories": []
229
- },
230
- "AVD-KSV-0006": {
231
- "title": "kubernetes: hostPath volume mounted with docker.sock",
232
- "description": "%(issue.data)s",
233
- "severity": 3,
234
- "categories": []
235
- },
236
- "AVD-KSV-0021": {
237
- "title": "kubernetes: Runs with low group ID",
238
- "description": "%(issue.data)s",
239
- "severity": 3,
240
- "categories": []
241
- },
242
- "AVD-KSV-0036": {
243
- "title": "kubernetes: Protecting Pod service account tokens",
244
- "description": "%(issue.data)s",
245
- "severity": 3,
246
- "categories": []
247
- },
248
- "AVD-KSV-0013": {
249
- "title": "kubernetes: Image tag ':latest' used",
250
- "description": "%(issue.data)s",
251
- "severity": 3,
252
- "categories": []
253
- },
254
- "AVD-KSV-0011": {
255
- "title": "kubernetes: CPU not limited",
256
- "description": "%(issue.data)s",
257
- "severity": 3,
258
- "categories": []
259
- },
260
- "AVD-KSV-0026": {
261
- "title": "kubernetes: Unsafe sysctl options set",
262
- "description": "%(issue.data)s",
263
- "severity": 3,
264
- "categories": []
265
- },
266
- "AVD-KSV-0103": {
267
- "title": "kubernetes: HostProcess container defined",
268
- "description": "%(issue.data)s",
269
- "severity": 3,
270
- "categories": []
271
- },
272
- "AVD-DS-0009": {
273
- "title": "dockerfile: WORKDIR path not absolute",
274
- "description": "%(issue.data)s",
275
- "severity": 3,
276
- "categories": []
277
- },
278
- "AVD-DS-0010": {
279
- "title": "dockerfile: RUN using 'sudo'",
280
- "description": "%(issue.data)s",
281
- "severity": 3,
282
- "categories": []
283
- },
284
- "AVD-KSV-0030": {
285
- "title": "kubernetes: Default Seccomp profile not set",
286
- "description": "%(issue.data)s",
287
- "severity": 3,
288
- "categories": []
289
- },
290
- "AVD-DS-0004": {
291
- "title": "dockerfile: Port 22 exposed",
292
- "description": "%(issue.data)s",
293
- "severity": 3,
294
- "categories": []
295
- },
296
- "AVD-DS-0020": {
297
- "title": "dockerfile: 'zypper clean' missing",
298
- "description": "%(issue.data)s",
299
- "severity": 3,
300
- "categories": []
301
- },
302
- "AVD-KSV-0015": {
303
- "title": "kubernetes: CPU requests not specified",
304
- "description": "%(issue.data)s",
305
- "severity": 3,
306
- "categories": []
307
- },
308
- "AVD-DS-0015": {
309
- "title": "dockerfile: 'yum clean all' missing",
310
- "description": "%(issue.data)s",
311
- "severity": 3,
312
- "categories": []
313
- },
314
- "AVD-DS-0007": {
315
- "title": "dockerfile: Multiple ENTRYPOINT instructions listed",
316
- "description": "%(issue.data)s",
317
- "severity": 3,
318
- "categories": []
319
- },
320
- "AVD-DS-0021": {
321
- "title": "dockerfile: 'apt-get' missing '-y' to avoid manual input",
322
- "description": "%(issue.data)s",
323
- "severity": 3,
324
- "categories": []
325
- },
326
- "AVD-KSV-0012": {
327
- "title": "kubernetes: Runs as root user",
328
- "description": "%(issue.data)s",
329
- "severity": 3,
330
- "categories": []
331
- },
332
- "AVD-KSV-0003": {
333
- "title": "kubernetes: Default capabilities not dropped",
334
- "description": "%(issue.data)s",
335
- "severity": 3,
336
- "categories": []
337
- },
338
- "AVD-AWS-0001": {
339
- "title": "aws: API Gateway stages for V1 and V2 should have access logging enabled",
340
- "description": "%(issue.data)s",
341
- "severity": 3,
342
- "categories": []
343
- },
344
- "AVD-AWS-0002": {
345
- "title": "aws: API Gateway must have cache enabled",
346
- "description": "%(issue.data)s",
347
- "severity": 3,
348
- "categories": []
349
- },
350
- "AVD-AWS-0003": {
351
- "title": "aws: API Gateway must have X-Ray tracing enabled",
352
- "description": "%(issue.data)s",
353
- "severity": 3,
354
- "categories": []
355
- },
356
- "AVD-AWS-0004": {
357
- "title": "aws: No unauthorized access to API Gateway methods",
358
- "description": "%(issue.data)s",
359
- "severity": 3,
360
- "categories": []
361
- },
362
- "AVD-AWS-0005": {
363
- "title": "aws: API Gateway domain name uses outdated SSL/TLS protocols.",
364
- "description": "%(issue.data)s",
365
- "severity": 3,
366
- "categories": []
367
- },
368
- "AVD-AWS-0006": {
369
- "title": "aws: Athena databases and workgroup configurations are created unencrypted at rest by default, they should be encrypted",
370
- "description": "%(issue.data)s",
371
- "severity": 3,
372
- "categories": []
373
- },
374
- "AVD-AWS-0007": {
375
- "title": "aws: Athena workgroups should enforce configuration to prevent client disabling encryption",
376
- "description": "%(issue.data)s",
377
- "severity": 3,
378
- "categories": []
379
- },
380
- "AVD-AWS-0008": {
381
- "title": "aws: Launch configuration with unencrypted block device.",
382
- "description": "%(issue.data)s",
383
- "severity": 3,
384
- "categories": []
385
- },
386
- "AVD-AWS-0130": {
387
- "title": "aws: aws_instance should activate session tokens for Instance Metadata Service.",
388
- "description": "%(issue.data)s",
389
- "severity": 3,
390
- "categories": []
391
- },
392
- "AVD-AWS-0009": {
393
- "title": "aws: Launch configuration should not have a public IP address.",
394
- "description": "%(issue.data)s",
395
- "severity": 3,
396
- "categories": []
397
- },
398
- "AVD-AWS-0129": {
399
- "title": "aws: User data for EC2 instances must not contain sensitive AWS keys",
400
- "description": "%(issue.data)s",
401
- "severity": 3,
402
- "categories": []
403
- },
404
- "AVD-AWS-0122": {
405
- "title": "aws: Ensure all data stored in the launch configuration EBS is securely encrypted",
406
- "description": "%(issue.data)s",
407
- "severity": 3,
408
- "categories": []
409
- },
410
- "AVD-AWS-0010": {
411
- "title": "aws: Cloudfront distribution should have Access Logging configured",
412
- "description": "%(issue.data)s",
413
- "severity": 3,
414
- "categories": []
415
- },
416
- "AVD-AWS-0011": {
417
- "title": "aws: CloudFront distribution does not have a WAF in front.",
418
- "description": "%(issue.data)s",
419
- "severity": 3,
420
- "categories": []
421
- },
422
- "AVD-AWS-0012": {
423
- "title": "aws: CloudFront distribution allows unencrypted (HTTP) communications.",
424
- "description": "%(issue.data)s",
425
- "severity": 3,
426
- "categories": []
427
- },
428
- "AVD-AWS-0013": {
429
- "title": "aws: CloudFront distribution uses outdated SSL/TLS protocols.",
430
- "description": "%(issue.data)s",
431
- "severity": 3,
432
- "categories": []
433
- },
434
- "AVD-AWS-0014": {
435
- "title": "aws: Cloudtrail should be enabled in all regions regardless of where your AWS resources are generally homed",
436
- "description": "%(issue.data)s",
437
- "severity": 3,
438
- "categories": []
439
- },
440
- "AVD-AWS-0015": {
441
- "title": "aws: Cloudtrail should be encrypted at rest to secure access to sensitive trail data",
442
- "description": "%(issue.data)s",
443
- "severity": 3,
444
- "categories": []
445
- },
446
- "AVD-AWS-0016": {
447
- "title": "aws: Cloudtrail log validation should be enabled to prevent tampering of log data",
448
- "description": "%(issue.data)s",
449
- "severity": 3,
450
- "categories": []
451
- },
452
- "AVD-AWS-0017": {
453
- "title": "aws: CloudWatch log groups should be encrypted using CMK",
454
- "description": "%(issue.data)s",
455
- "severity": 3,
456
- "categories": []
457
- },
458
- "AVD-AWS-0018": {
459
- "title": "aws: CodeBuild Project artifacts encryption should not be disabled",
460
- "description": "%(issue.data)s",
461
- "severity": 3,
462
- "categories": []
463
- },
464
- "AVD-AWS-0019": {
465
- "title": "aws: Config configuration aggregator should be using all regions for source",
466
- "description": "%(issue.data)s",
467
- "severity": 3,
468
- "categories": []
469
- },
470
- "AVD-AWS-0020": {
471
- "title": "aws: DocumentDB logs export should be enabled",
472
- "description": "%(issue.data)s",
473
- "severity": 3,
474
- "categories": []
475
- },
476
- "AVD-AWS-0021": {
477
- "title": "aws: DocumentDB storage must be encrypted",
478
- "description": "%(issue.data)s",
479
- "severity": 3,
480
- "categories": []
481
- },
482
- "AVD-AWS-0022": {
483
- "title": "aws: DocumentDB encryption should use Customer Managed Keys",
484
- "description": "%(issue.data)s",
485
- "severity": 3,
486
- "categories": []
487
- },
488
- "AVD-AWS-0023": {
489
- "title": "aws: DAX Cluster and tables should always encrypt data at rest",
490
- "description": "%(issue.data)s",
491
- "severity": 3,
492
- "categories": []
493
- },
494
- "AVD-AWS-0024": {
495
- "title": "aws: Point in time recovery should be enabled to protect DynamoDB table",
496
- "description": "%(issue.data)s",
497
- "severity": 3,
498
- "categories": []
499
- },
500
- "AVD-AWS-0025": {
501
- "title": "aws: DynamoDB tables should use at rest encryption with a Customer Managed Key",
502
- "description": "%(issue.data)s",
503
- "severity": 3,
504
- "categories": []
505
- },
506
- "AVD-AWS-0026": {
507
- "title": "aws: EBS volumes must be encrypted",
508
- "description": "%(issue.data)s",
509
- "severity": 3,
510
- "categories": []
511
- },
512
- "AVD-AWS-0027": {
513
- "title": "aws: EBS volume encryption should use Customer Managed Keys",
514
- "description": "%(issue.data)s",
515
- "severity": 3,
516
- "categories": []
517
- },
518
- "AVD-AWS-0131": {
519
- "title": "aws: Instance with unencrypted block device.",
520
- "description": "%(issue.data)s",
521
- "severity": 3,
522
- "categories": []
523
- },
524
- "AVD-AWS-0028": {
525
- "title": "aws: aws_instance should activate session tokens for Instance Metadata Service.",
526
- "description": "%(issue.data)s",
527
- "severity": 3,
528
- "categories": []
529
- },
530
- "AVD-AWS-0029": {
531
- "title": "aws: User data for EC2 instances must not contain sensitive AWS keys",
532
- "description": "%(issue.data)s",
533
- "severity": 3,
534
- "categories": []
535
- },
536
- "AVD-AWS-0030": {
537
- "title": "aws: ECR repository has image scans disabled.",
538
- "description": "%(issue.data)s",
539
- "severity": 3,
540
- "categories": []
541
- },
542
- "AVD-AWS-0031": {
543
- "title": "aws: ECR images tags shouldn't be mutable.",
544
- "description": "%(issue.data)s",
545
- "severity": 3,
546
- "categories": []
547
- },
548
- "AVD-AWS-0032": {
549
- "title": "aws: ECR repository policy must block public access",
550
- "description": "%(issue.data)s",
551
- "severity": 3,
552
- "categories": []
553
- },
554
- "AVD-AWS-0033": {
555
- "title": "aws: ECR Repository should use customer managed keys to allow more control",
556
- "description": "%(issue.data)s",
557
- "severity": 3,
558
- "categories": []
559
- },
560
- "AVD-AWS-0034": {
561
- "title": "aws: ECS clusters should have container insights enabled",
562
- "description": "%(issue.data)s",
563
- "severity": 3,
564
- "categories": []
565
- },
566
- "AVD-AWS-0035": {
567
- "title": "aws: ECS Task Definitions with EFS volumes should use in-transit encryption",
568
- "description": "%(issue.data)s",
569
- "severity": 3,
570
- "categories": []
571
- },
572
- "AVD-AWS-0036": {
573
- "title": "aws: Task definition defines sensitive environment variable(s).",
574
- "description": "%(issue.data)s",
575
- "severity": 3,
576
- "categories": []
577
- },
578
- "AVD-AWS-0037": {
579
- "title": "aws: EFS Encryption has not been enabled",
580
- "description": "%(issue.data)s",
581
- "severity": 3,
582
- "categories": []
583
- },
584
- "AVD-AWS-0038": {
585
- "title": "aws: EKS Clusters should have cluster control plane logging turned on",
586
- "description": "%(issue.data)s",
587
- "severity": 3,
588
- "categories": []
589
- },
590
- "AVD-AWS-0039": {
591
- "title": "aws: EKS should have the encryption of secrets enabled",
592
- "description": "%(issue.data)s",
593
- "severity": 3,
594
- "categories": []
595
- },
596
- "AVD-AWS-0040": {
597
- "title": "aws: EKS Clusters should have the public access disabled",
598
- "description": "%(issue.data)s",
599
- "severity": 3,
600
- "categories": []
601
- },
602
- "AVD-AWS-0041": {
603
- "title": "aws: EKS cluster should not have open CIDR range for public access",
604
- "description": "%(issue.data)s",
605
- "severity": 3,
606
- "categories": []
607
- },
608
- "AVD-AWS-0049": {
609
- "title": "aws: Missing description for security group/security group rule.",
610
- "description": "%(issue.data)s",
611
- "severity": 3,
612
- "categories": []
613
- },
614
- "AVD-AWS-0045": {
615
- "title": "aws: Elasticache Replication Group stores unencrypted data at-rest.",
616
- "description": "%(issue.data)s",
617
- "severity": 3,
618
- "categories": []
619
- },
620
- "AVD-AWS-0050": {
621
- "title": "aws: Redis cluster should have backup retention turned on",
622
- "description": "%(issue.data)s",
623
- "severity": 3,
624
- "categories": []
625
- },
626
- "AVD-AWS-0051": {
627
- "title": "aws: Elasticache Replication Group uses unencrypted traffic.",
628
- "description": "%(issue.data)s",
629
- "severity": 3,
630
- "categories": []
631
- },
632
- "AVD-AWS-0048": {
633
- "title": "aws: Elasticsearch domain isn't encrypted at rest.",
634
- "description": "%(issue.data)s",
635
- "severity": 3,
636
- "categories": []
637
- },
638
- "AVD-AWS-0042": {
639
- "title": "aws: Domain logging should be enabled for Elastic Search domains",
640
- "description": "%(issue.data)s",
641
- "severity": 3,
642
- "categories": []
643
- },
644
- "AVD-AWS-0043": {
645
- "title": "aws: Elasticsearch domain uses plaintext traffic for node to node communication.",
646
- "description": "%(issue.data)s",
647
- "severity": 3,
648
- "categories": []
649
- },
650
- "AVD-AWS-0046": {
651
- "title": "aws: Elasticsearch doesn't enforce HTTPS traffic.",
652
- "description": "%(issue.data)s",
653
- "severity": 3,
654
- "categories": []
655
- },
656
- "AVD-AWS-0126": {
657
- "title": "aws: Elasticsearch domain endpoint is using outdated TLS policy.",
658
- "description": "%(issue.data)s",
659
- "severity": 3,
660
- "categories": []
661
- },
662
- "AVD-AWS-0053": {
663
- "title": "aws: Load balancer is exposed to the internet.",
664
- "description": "%(issue.data)s",
665
- "severity": 3,
666
- "categories": []
667
- },
668
- "AVD-AWS-0052": {
669
- "title": "aws: Load balancers should drop invalid headers",
670
- "description": "%(issue.data)s",
671
- "severity": 3,
672
- "categories": []
673
- },
674
- "AVD-AWS-0054": {
675
- "title": "aws: Use of plain HTTP.",
676
- "description": "%(issue.data)s",
677
- "severity": 3,
678
- "categories": []
679
- },
680
- "AVD-AWS-0047": {
681
- "title": "aws: An outdated SSL policy is in use by a load balancer.",
682
- "description": "%(issue.data)s",
683
- "severity": 3,
684
- "categories": []
685
- },
686
- "AVD-AWS-0137": {
687
- "title": "aws: Enable at-rest encryption for EMR clusters.",
688
- "description": "%(issue.data)s",
689
- "severity": 3,
690
- "categories": []
691
- },
692
- "AVD-AWS-0138": {
693
- "title": "aws: Enable in-transit encryption for EMR clusters.",
694
- "description": "%(issue.data)s",
695
- "severity": 3,
696
- "categories": []
697
- },
698
- "AVD-AWS-0139": {
699
- "title": "aws: Enable local-disk encryption for EMR clusters.",
700
- "description": "%(issue.data)s",
701
- "severity": 3,
702
- "categories": []
703
- },
704
- "AVD-AWS-0123": {
705
- "title": "aws: IAM Groups should have MFA enforcement activated.",
706
- "description": "%(issue.data)s",
707
- "severity": 3,
708
- "categories": []
709
- },
710
- "AVD-AWS-0056": {
711
- "title": "aws: IAM Password policy should prevent password reuse.",
712
- "description": "%(issue.data)s",
713
- "severity": 3,
714
- "categories": []
715
- },
716
- "AVD-AWS-0057": {
717
- "title": "aws: IAM policy should avoid use of wildcards and instead apply the principle of least privilege",
718
- "description": "%(issue.data)s",
719
- "severity": 3,
720
- "categories": []
721
- },
722
- "AVD-AWS-0058": {
723
- "title": "aws: IAM Password policy should have requirement for at least one lowercase character.",
724
- "description": "%(issue.data)s",
725
- "severity": 3,
726
- "categories": []
727
- },
728
- "AVD-AWS-0059": {
729
- "title": "aws: IAM Password policy should have requirement for at least one number in the password.",
730
- "description": "%(issue.data)s",
731
- "severity": 3,
732
- "categories": []
733
- },
734
- "AVD-AWS-0060": {
735
- "title": "aws: IAM Password policy should have requirement for at least one symbol in the password.",
736
- "description": "%(issue.data)s",
737
- "severity": 3,
738
- "categories": []
739
- },
740
- "AVD-AWS-0061": {
741
- "title": "aws: IAM Password policy should have requirement for at least one uppercase character.",
742
- "description": "%(issue.data)s",
743
- "severity": 3,
744
- "categories": []
745
- },
746
- "AVD-AWS-0062": {
747
- "title": "aws: IAM Password policy should have expiry less than or equal to 90 days.",
748
- "description": "%(issue.data)s",
749
- "severity": 3,
750
- "categories": []
751
- },
752
- "AVD-AWS-0063": {
753
- "title": "aws: IAM Password policy should have minimum password length of 14 or more characters.",
754
- "description": "%(issue.data)s",
755
- "severity": 3,
756
- "categories": []
757
- },
758
- "AVD-AWS-0064": {
759
- "title": "aws: Kinesis stream is unencrypted.",
760
- "description": "%(issue.data)s",
761
- "severity": 3,
762
- "categories": []
763
- },
764
- "AVD-AWS-0065": {
765
- "title": "aws: A KMS key is not configured to auto-rotate.",
766
- "description": "%(issue.data)s",
767
- "severity": 3,
768
- "categories": []
769
- },
770
- "AVD-AWS-0066": {
771
- "title": "aws: Lambda functions should have X-Ray tracing enabled",
772
- "description": "%(issue.data)s",
773
- "severity": 3,
774
- "categories": []
775
- },
776
- "AVD-AWS-0067": {
777
- "title": "aws: Ensure that lambda function permission has a source arn specified",
778
- "description": "%(issue.data)s",
779
- "severity": 3,
780
- "categories": []
781
- },
782
- "AVD-AWS-0070": {
783
- "title": "aws: MQ Broker should have audit logging enabled",
784
- "description": "%(issue.data)s",
785
- "severity": 3,
786
- "categories": []
787
- },
788
- "AVD-AWS-0071": {
789
- "title": "aws: MQ Broker should have general logging enabled",
790
- "description": "%(issue.data)s",
791
- "severity": 3,
792
- "categories": []
793
- },
794
- "AVD-AWS-0072": {
795
- "title": "aws: Ensure MQ Broker is not publicly exposed",
796
- "description": "%(issue.data)s",
797
- "severity": 3,
798
- "categories": []
799
- },
800
- "AVD-AWS-0073": {
801
- "title": "aws: A MSK cluster allows unencrypted data in transit.",
802
- "description": "%(issue.data)s",
803
- "severity": 3,
804
- "categories": []
805
- },
806
- "AVD-AWS-0074": {
807
- "title": "aws: Ensure MSK Cluster logging is enabled",
808
- "description": "%(issue.data)s",
809
- "severity": 3,
810
- "categories": []
811
- },
812
- "AVD-AWS-0075": {
813
- "title": "aws: Neptune logs export should be enabled",
814
- "description": "%(issue.data)s",
815
- "severity": 3,
816
- "categories": []
817
- },
818
- "AVD-AWS-0076": {
819
- "title": "aws: Neptune storage must be encrypted at rest",
820
- "description": "%(issue.data)s",
821
- "severity": 3,
822
- "categories": []
823
- },
824
- "AVD-AWS-0128": {
825
- "title": "aws: Neptune encryption should use Customer Managed Keys",
826
- "description": "%(issue.data)s",
827
- "severity": 3,
828
- "categories": []
829
- },
830
- "AVD-AWS-0133": {
831
- "title": "aws: Enable Performance Insights to detect potential problems",
832
- "description": "%(issue.data)s",
833
- "severity": 3,
834
- "categories": []
835
- },
836
- "AVD-AWS-0078": {
837
- "title": "aws: Encryption for RDS Performance Insights should be enabled.",
838
- "description": "%(issue.data)s",
839
- "severity": 3,
840
- "categories": []
841
- },
842
- "AVD-AWS-0079": {
843
- "title": "aws: There is no encryption specified or encryption is disabled on the RDS Cluster.",
844
- "description": "%(issue.data)s",
845
- "severity": 3,
846
- "categories": []
847
- },
848
- "AVD-AWS-0080": {
849
- "title": "aws: RDS encryption has not been enabled at a DB Instance level.",
850
- "description": "%(issue.data)s",
851
- "severity": 3,
852
- "categories": []
853
- },
854
- "AVD-AWS-0081": {
855
- "title": "aws: AWS Classic resource usage.",
856
- "description": "%(issue.data)s",
857
- "severity": 3,
858
- "categories": []
859
- },
860
- "AVD-AWS-0082": {
861
- "title": "aws: A database resource is marked as publicly accessible.",
862
- "description": "%(issue.data)s",
863
- "severity": 3,
864
- "categories": []
865
- },
866
- "AVD-AWS-0077": {
867
- "title": "aws: RDS Cluster and RDS instance should have backup retention longer than default 1 day",
868
- "description": "%(issue.data)s",
869
- "severity": 3,
870
- "categories": []
871
- },
872
- "AVD-AWS-0083": {
873
- "title": "aws: Missing description for security group/security group rule.",
874
- "description": "%(issue.data)s",
875
- "severity": 3,
876
- "categories": []
877
- },
878
- "AVD-AWS-0084": {
879
- "title": "aws: Redshift clusters should use at rest encryption",
880
- "description": "%(issue.data)s",
881
- "severity": 3,
882
- "categories": []
883
- },
884
- "AVD-AWS-0085": {
885
- "title": "aws: AWS Classic resource usage.",
886
- "description": "%(issue.data)s",
887
- "severity": 3,
888
- "categories": []
889
- },
890
- "AVD-AWS-0127": {
891
- "title": "aws: Redshift cluster should be deployed into a specific VPC",
892
- "description": "%(issue.data)s",
893
- "severity": 3,
894
- "categories": []
895
- },
896
- "AVD-AWS-0086": {
897
- "title": "aws: S3 Access block should block public ACL",
898
- "description": "%(issue.data)s",
899
- "severity": 3,
900
- "categories": []
901
- },
902
- "AVD-AWS-0087": {
903
- "title": "aws: S3 Access block should block public policy",
904
- "description": "%(issue.data)s",
905
- "severity": 3,
906
- "categories": []
907
- },
908
- "AVD-AWS-0088": {
909
- "title": "aws: Unencrypted S3 bucket.",
910
- "description": "%(issue.data)s",
911
- "severity": 3,
912
- "categories": []
913
- },
914
- "AVD-AWS-0089": {
915
- "title": "aws: S3 Bucket does not have logging enabled.",
916
- "description": "%(issue.data)s",
917
- "severity": 3,
918
- "categories": []
919
- },
920
- "AVD-AWS-0090": {
921
- "title": "aws: S3 Data should be versioned",
922
- "description": "%(issue.data)s",
923
- "severity": 3,
924
- "categories": []
925
- },
926
- "AVD-AWS-0132": {
927
- "title": "aws: S3 encryption should use Customer Managed Keys",
928
- "description": "%(issue.data)s",
929
- "severity": 3,
930
- "categories": []
931
- },
932
- "AVD-AWS-0091": {
933
- "title": "aws: S3 Access Block should Ignore Public Acl",
934
- "description": "%(issue.data)s",
935
- "severity": 3,
936
- "categories": []
937
- },
938
- "AVD-AWS-0092": {
939
- "title": "aws: S3 Buckets not publicly accessible through ACL.",
940
- "description": "%(issue.data)s",
941
- "severity": 3,
942
- "categories": []
943
- },
944
- "AVD-AWS-0093": {
945
- "title": "aws: S3 Access block should restrict public bucket to limit access",
946
- "description": "%(issue.data)s",
947
- "severity": 3,
948
- "categories": []
949
- },
950
- "AVD-AWS-0094": {
951
- "title": "aws: S3 buckets should each define an aws_s3_bucket_public_access_block",
952
- "description": "%(issue.data)s",
953
- "severity": 3,
954
- "categories": []
955
- },
956
- "AVD-AWS-0112": {
957
- "title": "aws: SAM API domain name uses outdated SSL/TLS protocols.",
958
- "description": "%(issue.data)s",
959
- "severity": 3,
960
- "categories": []
961
- },
962
- "AVD-AWS-0113": {
963
- "title": "aws: SAM API stages for V1 and V2 should have access logging enabled",
964
- "description": "%(issue.data)s",
965
- "severity": 3,
966
- "categories": []
967
- },
968
- "AVD-AWS-0110": {
969
- "title": "aws: SAM API must have data cache enabled",
970
- "description": "%(issue.data)s",
971
- "severity": 3,
972
- "categories": []
973
- },
974
- "AVD-AWS-0111": {
975
- "title": "aws: SAM API must have X-Ray tracing enabled",
976
- "description": "%(issue.data)s",
977
- "severity": 3,
978
- "categories": []
979
- },
980
- "AVD-AWS-0125": {
981
- "title": "aws: SAM Function must have X-Ray tracing enabled",
982
- "description": "%(issue.data)s",
983
- "severity": 3,
984
- "categories": []
985
- },
986
- "AVD-AWS-0116": {
987
- "title": "aws: SAM HTTP API stages for V1 and V2 should have access logging enabled",
988
- "description": "%(issue.data)s",
989
- "severity": 3,
990
- "categories": []
991
- },
992
- "AVD-AWS-0119": {
993
- "title": "aws: SAM State machine must have logging enabled",
994
- "description": "%(issue.data)s",
995
- "severity": 3,
996
- "categories": []
997
- },
998
- "AVD-AWS-0117": {
999
- "title": "aws: SAM State machine must have X-Ray tracing enabled",
1000
- "description": "%(issue.data)s",
1001
- "severity": 3,
1002
- "categories": []
1003
- },
1004
- "AVD-AWS-0121": {
1005
- "title": "aws: SAM Simple table must have server side encryption enabled.",
1006
- "description": "%(issue.data)s",
1007
- "severity": 3,
1008
- "categories": []
1009
- },
1010
- "AVD-AWS-0114": {
1011
- "title": "aws: Function policies should avoid use of wildcards and instead apply the principle of least privilege",
1012
- "description": "%(issue.data)s",
1013
- "severity": 3,
1014
- "categories": []
1015
- },
1016
- "AVD-AWS-0120": {
1017
- "title": "aws: State machine policies should avoid use of wildcards and instead apply the principle of least privilege",
1018
- "description": "%(issue.data)s",
1019
- "severity": 3,
1020
- "categories": []
1021
- },
1022
- "AVD-AWS-0095": {
1023
- "title": "aws: Unencrypted SNS topic.",
1024
- "description": "%(issue.data)s",
1025
- "severity": 3,
1026
- "categories": []
1027
- },
1028
- "AVD-AWS-0136": {
1029
- "title": "aws: SNS topic not encrypted with CMK.",
1030
- "description": "%(issue.data)s",
1031
- "severity": 3,
1032
- "categories": []
1033
- },
1034
- "AVD-AWS-0096": {
1035
- "title": "aws: Unencrypted SQS queue.",
1036
- "description": "%(issue.data)s",
1037
- "severity": 3,
1038
- "categories": []
1039
- },
1040
- "AVD-AWS-0097": {
1041
- "title": "aws: AWS SQS policy document has wildcard action statement.",
1042
- "description": "%(issue.data)s",
1043
- "severity": 3,
1044
- "categories": []
1045
- },
1046
- "AVD-AWS-0135": {
1047
- "title": "aws: SQS queue should be encrypted with a CMK.",
1048
- "description": "%(issue.data)s",
1049
- "severity": 3,
1050
- "categories": []
1051
- },
1052
- "AVD-AWS-0134": {
1053
- "title": "aws: Secrets should not be exfiltrated using Terraform HTTP data blocks",
1054
- "description": "%(issue.data)s",
1055
- "severity": 3,
1056
- "categories": []
1057
- },
1058
- "AVD-AWS-0098": {
1059
- "title": "aws: Secrets Manager should use customer managed keys",
1060
- "description": "%(issue.data)s",
1061
- "severity": 3,
1062
- "categories": []
1063
- },
1064
- "AVD-AWS-0099": {
1065
- "title": "aws: Missing description for security group.",
1066
- "description": "%(issue.data)s",
1067
- "severity": 3,
1068
- "categories": []
1069
- },
1070
- "AVD-AWS-0124": {
1071
- "title": "aws: Missing description for security group rule.",
1072
- "description": "%(issue.data)s",
1073
- "severity": 3,
1074
- "categories": []
1075
- },
1076
- "AVD-AWS-0101": {
1077
- "title": "aws: AWS best practice to not use the default VPC for workflows",
1078
- "description": "%(issue.data)s",
1079
- "severity": 3,
1080
- "categories": []
1081
- },
1082
- "AVD-AWS-0102": {
1083
- "title": "aws: An ingress Network ACL rule allows ALL ports.",
1084
- "description": "%(issue.data)s",
1085
- "severity": 3,
1086
- "categories": []
1087
- },
1088
- "AVD-AWS-0104": {
1089
- "title": "aws: An egress security group rule allows traffic to /0.",
1090
- "description": "%(issue.data)s",
1091
- "severity": 3,
1092
- "categories": []
1093
- },
1094
- "AVD-AWS-0105": {
1095
- "title": "aws: An ingress Network ACL rule allows specific ports from /0.",
1096
- "description": "%(issue.data)s",
1097
- "severity": 3,
1098
- "categories": []
1099
- },
1100
- "AVD-AWS-0107": {
1101
- "title": "aws: An ingress security group rule allows traffic from /0.",
1102
- "description": "%(issue.data)s",
1103
- "severity": 3,
1104
- "categories": []
1105
- },
1106
- "AVD-AWS-0109": {
1107
- "title": "aws: Root and user volumes on Workspaces should be encrypted",
1108
- "description": "%(issue.data)s",
1109
- "severity": 3,
1110
- "categories": []
1111
- },
1112
- "AVD-AZU-0002": {
1113
- "title": "azure: Web App has registration with AD enabled",
1114
- "description": "%(issue.data)s",
1115
- "severity": 3,
1116
- "categories": []
1117
- },
1118
- "AVD-AZU-0003": {
1119
- "title": "azure: App Service authentication is activated",
1120
- "description": "%(issue.data)s",
1121
- "severity": 3,
1122
- "categories": []
1123
- },
1124
- "AVD-AZU-0005": {
1125
- "title": "azure: Web App uses the latest HTTP version",
1126
- "description": "%(issue.data)s",
1127
- "severity": 3,
1128
- "categories": []
1129
- },
1130
- "AVD-AZU-0004": {
1131
- "title": "azure: Ensure the Function App can only be accessed via HTTPS. The default is false.",
1132
- "description": "%(issue.data)s",
1133
- "severity": 3,
1134
- "categories": []
1135
- },
1136
- "AVD-AZU-0001": {
1137
- "title": "azure: Web App accepts incoming client certificate",
1138
- "description": "%(issue.data)s",
1139
- "severity": 3,
1140
- "categories": []
1141
- },
1142
- "AVD-AZU-0006": {
1143
- "title": "azure: Web App uses latest TLS version",
1144
- "description": "%(issue.data)s",
1145
- "severity": 3,
1146
- "categories": []
1147
- },
1148
- "AVD-AZU-0030": {
1149
- "title": "azure: Roles limited to the required actions",
1150
- "description": "%(issue.data)s",
1151
- "severity": 3,
1152
- "categories": []
1153
- },
1154
- "AVD-AZU-0039": {
1155
- "title": "azure: Password authentication should be disabled on Azure virtual machines",
1156
- "description": "%(issue.data)s",
1157
- "severity": 3,
1158
- "categories": []
1159
- },
1160
- "AVD-AZU-0038": {
1161
- "title": "azure: Enable disk encryption on managed disk",
1162
- "description": "%(issue.data)s",
1163
- "severity": 3,
1164
- "categories": []
1165
- },
1166
- "AVD-AZU-0037": {
1167
- "title": "azure: Ensure that no sensitive credentials are exposed in VM custom_data",
1168
- "description": "%(issue.data)s",
1169
- "severity": 3,
1170
- "categories": []
1171
- },
1172
- "AVD-AZU-0043": {
1173
- "title": "azure: Ensure AKS cluster has Network Policy configured",
1174
- "description": "%(issue.data)s",
1175
- "severity": 3,
1176
- "categories": []
1177
- },
1178
- "AVD-AZU-0041": {
1179
- "title": "azure: Ensure AKS has an API Server Authorized IP Ranges enabled",
1180
- "description": "%(issue.data)s",
1181
- "severity": 3,
1182
- "categories": []
1183
- },
1184
- "AVD-AZU-0040": {
1185
- "title": "azure: Ensure AKS logging to Azure Monitoring is Configured",
1186
- "description": "%(issue.data)s",
1187
- "severity": 3,
1188
- "categories": []
1189
- },
1190
- "AVD-AZU-0042": {
1191
- "title": "azure: Ensure RBAC is enabled on AKS clusters",
1192
- "description": "%(issue.data)s",
1193
- "severity": 3,
1194
- "categories": []
1195
- },
1196
- "AVD-AZU-0028": {
1197
- "title": "azure: No threat detections are set",
1198
- "description": "%(issue.data)s",
1199
- "severity": 3,
1200
- "categories": []
1201
- },
1202
- "AVD-AZU-0027": {
1203
- "title": "azure: Auditing should be enabled on Azure SQL Databases",
1204
- "description": "%(issue.data)s",
1205
- "severity": 3,
1206
- "categories": []
1207
- },
1208
- "AVD-AZU-0020": {
1209
- "title": "azure: SSL should be enforced on database connections where applicable",
1210
- "description": "%(issue.data)s",
1211
- "severity": 3,
1212
- "categories": []
1213
- },
1214
- "AVD-AZU-0022": {
1215
- "title": "azure: Ensure databases are not publicly accessible",
1216
- "description": "%(issue.data)s",
1217
- "severity": 3,
1218
- "categories": []
1219
- },
1220
- "AVD-AZU-0029": {
1221
- "title": "azure: Ensure database firewalls do not permit public access",
1222
- "description": "%(issue.data)s",
1223
- "severity": 3,
1224
- "categories": []
1225
- },
1226
- "AVD-AZU-0021": {
1227
- "title": "azure: Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server",
1228
- "description": "%(issue.data)s",
1229
- "severity": 3,
1230
- "categories": []
1231
- },
1232
- "AVD-AZU-0024": {
1233
- "title": "azure: Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server",
1234
- "description": "%(issue.data)s",
1235
- "severity": 3,
1236
- "categories": []
1237
- },
1238
- "AVD-AZU-0019": {
1239
- "title": "azure: Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server",
1240
- "description": "%(issue.data)s",
1241
- "severity": 3,
1242
- "categories": []
1243
- },
1244
- "AVD-AZU-0025": {
1245
- "title": "azure: Database auditing rentention period should be longer than 90 days",
1246
- "description": "%(issue.data)s",
1247
- "severity": 3,
1248
- "categories": []
1249
- },
1250
- "AVD-AZU-0026": {
1251
- "title": "azure: Databases should have the minimum TLS set for connections",
1252
- "description": "%(issue.data)s",
1253
- "severity": 3,
1254
- "categories": []
1255
- },
1256
- "AVD-AZU-0018": {
1257
- "title": "azure: At least one email address is set for threat alerts",
1258
- "description": "%(issue.data)s",
1259
- "severity": 3,
1260
- "categories": []
1261
- },
1262
- "AVD-AZU-0023": {
1263
- "title": "azure: Security threat alerts go to subcription owners and co-administrators",
1264
- "description": "%(issue.data)s",
1265
- "severity": 3,
1266
- "categories": []
1267
- },
1268
- "AVD-AZU-0035": {
1269
- "title": "azure: Data Factory should have public access disabled, the default is enabled.",
1270
- "description": "%(issue.data)s",
1271
- "severity": 3,
1272
- "categories": []
1273
- },
1274
- "AVD-AZU-0036": {
1275
- "title": "azure: Unencrypted data lake storage.",
1276
- "description": "%(issue.data)s",
1277
- "severity": 3,
1278
- "categories": []
1279
- },
1280
- "AVD-AZU-0015": {
1281
- "title": "azure: Key vault Secret should have a content type set",
1282
- "description": "%(issue.data)s",
1283
- "severity": 3,
1284
- "categories": []
1285
- },
1286
- "AVD-AZU-0014": {
1287
- "title": "azure: Ensure that the expiration date is set on all keys",
1288
- "description": "%(issue.data)s",
1289
- "severity": 3,
1290
- "categories": []
1291
- },
1292
- "AVD-AZU-0017": {
1293
- "title": "azure: Key Vault Secret should have an expiration date set",
1294
- "description": "%(issue.data)s",
1295
- "severity": 3,
1296
- "categories": []
1297
- },
1298
- "AVD-AZU-0016": {
1299
- "title": "azure: Key vault should have purge protection enabled",
1300
- "description": "%(issue.data)s",
1301
- "severity": 3,
1302
- "categories": []
1303
- },
1304
- "AVD-AZU-0013": {
1305
- "title": "azure: Key vault should have the network acl block specified",
1306
- "description": "%(issue.data)s",
1307
- "severity": 3,
1308
- "categories": []
1309
- },
1310
- "AVD-AZU-0031": {
1311
- "title": "azure: Ensure the activity retention log is set to at least a year",
1312
- "description": "%(issue.data)s",
1313
- "severity": 3,
1314
- "categories": []
1315
- },
1316
- "AVD-AZU-0033": {
1317
- "title": "azure: Ensure log profile captures all activities",
1318
- "description": "%(issue.data)s",
1319
- "severity": 3,
1320
- "categories": []
1321
- },
1322
- "AVD-AZU-0032": {
1323
- "title": "azure: Ensure activitys are captured for all locations",
1324
- "description": "%(issue.data)s",
1325
- "severity": 3,
1326
- "categories": []
1327
- },
1328
- "AVD-AZU-0048": {
1329
- "title": "azure: RDP access should not be accessible from the Internet, should be blocked on port 3389",
1330
- "description": "%(issue.data)s",
1331
- "severity": 3,
1332
- "categories": []
1333
- },
1334
- "AVD-AZU-0051": {
1335
- "title": "azure: An outbound network security rule allows traffic to /0.",
1336
- "description": "%(issue.data)s",
1337
- "severity": 3,
1338
- "categories": []
1339
- },
1340
- "AVD-AZU-0047": {
1341
- "title": "azure: An inbound network security rule allows traffic from /0.",
1342
- "description": "%(issue.data)s",
1343
- "severity": 3,
1344
- "categories": []
1345
- },
1346
- "AVD-AZU-0049": {
1347
- "title": "azure: Retention policy for flow logs should be enabled and set to greater than 90 days",
1348
- "description": "%(issue.data)s",
1349
- "severity": 3,
1350
- "categories": []
1351
- },
1352
- "AVD-AZU-0050": {
1353
- "title": "azure: SSH access should not be accessible from the Internet, should be blocked on port 22",
1354
- "description": "%(issue.data)s",
1355
- "severity": 3,
1356
- "categories": []
1357
- },
1358
- "AVD-AZU-0044": {
1359
- "title": "azure: Send notification emails for high severity alerts",
1360
- "description": "%(issue.data)s",
1361
- "severity": 3,
1362
- "categories": []
1363
- },
1364
- "AVD-AZU-0045": {
1365
- "title": "azure: Enable the standard security center subscription tier",
1366
- "description": "%(issue.data)s",
1367
- "severity": 3,
1368
- "categories": []
1369
- },
1370
- "AVD-AZU-0046": {
1371
- "title": "azure: The required contact details should be set for security center",
1372
- "description": "%(issue.data)s",
1373
- "severity": 3,
1374
- "categories": []
1375
- },
1376
- "AVD-AZU-0010": {
1377
- "title": "azure: Trusted Microsoft Services should have bypass access to Storage accounts",
1378
- "description": "%(issue.data)s",
1379
- "severity": 3,
1380
- "categories": []
1381
- },
1382
- "AVD-AZU-0012": {
1383
- "title": "azure: The default action on Storage account network rules should be set to deny",
1384
- "description": "%(issue.data)s",
1385
- "severity": 3,
1386
- "categories": []
1387
- },
1388
- "AVD-AZU-0008": {
1389
- "title": "azure: Storage accounts should be configured to only accept transfers that are over secure connections",
1390
- "description": "%(issue.data)s",
1391
- "severity": 3,
1392
- "categories": []
1393
- },
1394
- "AVD-AZU-0007": {
1395
- "title": "azure: Storage containers in blob storage mode should not have public access",
1396
- "description": "%(issue.data)s",
1397
- "severity": 3,
1398
- "categories": []
1399
- },
1400
- "AVD-AZU-0009": {
1401
- "title": "azure: When using Queue Services for a storage account, logging should be enabled.",
1402
- "description": "%(issue.data)s",
1403
- "severity": 3,
1404
- "categories": []
1405
- },
1406
- "AVD-AZU-0011": {
1407
- "title": "azure: The minimum TLS version for Storage Accounts should be TLS1_2",
1408
- "description": "%(issue.data)s",
1409
- "severity": 3,
1410
- "categories": []
1411
- },
1412
- "AVD-AZU-0034": {
1413
- "title": "azure: Synapse Workspace should have managed virtual network enabled, the default is disabled.",
1414
- "description": "%(issue.data)s",
1415
- "severity": 3,
1416
- "categories": []
1417
- },
1418
- "AVD-CLDSTK-0001": {
1419
- "title": "cloudstack: No sensitive data stored in user_data",
1420
- "description": "%(issue.data)s",
1421
- "severity": 3,
1422
- "categories": []
1423
- },
1424
- "AVD-DIG-0008": {
1425
- "title": "digitalocean: Kubernetes clusters should be auto-upgraded to ensure that they always contain the latest security patches.",
1426
- "description": "%(issue.data)s",
1427
- "severity": 3,
1428
- "categories": []
1429
- },
1430
- "AVD-DIG-0002": {
1431
- "title": "digitalocean: The load balancer forwarding rule is using an insecure protocol as an entrypoint",
1432
- "description": "%(issue.data)s",
1433
- "severity": 3,
1434
- "categories": []
1435
- },
1436
- "AVD-DIG-0005": {
1437
- "title": "digitalocean: The Kubernetes cluster does not enable surge upgrades",
1438
- "description": "%(issue.data)s",
1439
- "severity": 3,
1440
- "categories": []
1441
- },
1442
- "AVD-DIG-0003": {
1443
- "title": "digitalocean: The firewall has an outbound rule with open access",
1444
- "description": "%(issue.data)s",
1445
- "severity": 3,
1446
- "categories": []
1447
- },
1448
- "AVD-DIG-0001": {
1449
- "title": "digitalocean: The firewall has an inbound rule with open access",
1450
- "description": "%(issue.data)s",
1451
- "severity": 3,
1452
- "categories": []
1453
- },
1454
- "AVD-DIG-0004": {
1455
- "title": "digitalocean: SSH Keys are the preferred way to connect to your droplet, no keys are supplied",
1456
- "description": "%(issue.data)s",
1457
- "severity": 3,
1458
- "categories": []
1459
- },
1460
- "AVD-DIG-0006": {
1461
- "title": "digitalocean: Spaces bucket or bucket object has public read acl set",
1462
- "description": "%(issue.data)s",
1463
- "severity": 3,
1464
- "categories": []
1465
- },
1466
- "AVD-DIG-0009": {
1467
- "title": "digitalocean: Force destroy is enabled on Spaces bucket which is dangerous",
1468
- "description": "%(issue.data)s",
1469
- "severity": 3,
1470
- "categories": []
1471
- },
1472
- "AVD-DIG-0007": {
1473
- "title": "digitalocean: Spaces buckets should have versioning enabled",
1474
- "description": "%(issue.data)s",
1475
- "severity": 3,
1476
- "categories": []
1477
- },
1478
- "AVD-GIT-0002": {
1479
- "title": "github: Ensure plaintext value is not used for GitHub Action Environment Secret.",
1480
- "description": "%(issue.data)s",
1481
- "severity": 3,
1482
- "categories": []
1483
- },
1484
- "AVD-GIT-0003": {
1485
- "title": "github: GitHub repository has vulnerability alerts disabled.",
1486
- "description": "%(issue.data)s",
1487
- "severity": 3,
1488
- "categories": []
1489
- },
1490
- "AVD-GIT-0001": {
1491
- "title": "github: Github repository shouldn't be public.",
1492
- "description": "%(issue.data)s",
1493
- "severity": 3,
1494
- "categories": []
1495
- },
1496
- "AVD-GCP-0046": {
1497
- "title": "google: BigQuery datasets should only be accessible within the organisation",
1498
- "description": "%(issue.data)s",
1499
- "severity": 3,
1500
- "categories": []
1501
- },
1502
- "AVD-GCP-0034": {
1503
- "title": "google: Disks should be encrypted with customer managed encryption keys",
1504
- "description": "%(issue.data)s",
1505
- "severity": 3,
1506
- "categories": []
1507
- },
1508
- "AVD-GCP-0037": {
1509
- "title": "google: The encryption key used to encrypt a compute disk has been specified in plaintext.",
1510
- "description": "%(issue.data)s",
1511
- "severity": 3,
1512
- "categories": []
1513
- },
1514
- "AVD-GCP-0045": {
1515
- "title": "google: Instances should have Shielded VM integrity monitoring enabled",
1516
- "description": "%(issue.data)s",
1517
- "severity": 3,
1518
- "categories": []
1519
- },
1520
- "AVD-GCP-0041": {
1521
- "title": "google: Instances should have Shielded VM VTPM enabled",
1522
- "description": "%(issue.data)s",
1523
- "severity": 3,
1524
- "categories": []
1525
- },
1526
- "AVD-GCP-0029": {
1527
- "title": "google: VPC flow logs should be enabled for all subnetworks",
1528
- "description": "%(issue.data)s",
1529
- "severity": 3,
1530
- "categories": []
1531
- },
1532
- "AVD-GCP-0044": {
1533
- "title": "google: Instances should not use the default service account",
1534
- "description": "%(issue.data)s",
1535
- "severity": 3,
1536
- "categories": []
1537
- },
1538
- "AVD-GCP-0043": {
1539
- "title": "google: Instances should not have IP forwarding enabled",
1540
- "description": "%(issue.data)s",
1541
- "severity": 3,
1542
- "categories": []
1543
- },
1544
- "AVD-GCP-0036": {
1545
- "title": "google: Instances should not override the project setting for OS Login",
1546
- "description": "%(issue.data)s",
1547
- "severity": 3,
1548
- "categories": []
1549
- },
1550
- "AVD-GCP-0030": {
1551
- "title": "google: Disable project-wide SSH keys for all instances",
1552
- "description": "%(issue.data)s",
1553
- "severity": 3,
1554
- "categories": []
1555
- },
1556
- "AVD-GCP-0035": {
1557
- "title": "google: An outbound firewall rule allows traffic to /0.",
1558
- "description": "%(issue.data)s",
1559
- "severity": 3,
1560
- "categories": []
1561
- },
1562
- "AVD-GCP-0027": {
1563
- "title": "google: An inbound firewall rule allows traffic from /0.",
1564
- "description": "%(issue.data)s",
1565
- "severity": 3,
1566
- "categories": []
1567
- },
1568
- "AVD-GCP-0031": {
1569
- "title": "google: Instances should not have public IP addresses",
1570
- "description": "%(issue.data)s",
1571
- "severity": 3,
1572
- "categories": []
1573
- },
1574
- "AVD-GCP-0032": {
1575
- "title": "google: Disable serial port connectivity for all instances",
1576
- "description": "%(issue.data)s",
1577
- "severity": 3,
1578
- "categories": []
1579
- },
1580
- "AVD-GCP-0042": {
1581
- "title": "google: OS Login should be enabled at project level",
1582
- "description": "%(issue.data)s",
1583
- "severity": 3,
1584
- "categories": []
1585
- },
1586
- "AVD-GCP-0039": {
1587
- "title": "google: SSL policies should enforce secure versions of TLS",
1588
- "description": "%(issue.data)s",
1589
- "severity": 3,
1590
- "categories": []
1591
- },
1592
- "AVD-GCP-0033": {
1593
- "title": "google: VM disks should be encrypted with Customer Supplied Encryption Keys",
1594
- "description": "%(issue.data)s",
1595
- "severity": 3,
1596
- "categories": []
1597
- },
1598
- "AVD-GCP-0013": {
1599
- "title": "google: Cloud DNS should use DNSSEC",
1600
- "description": "%(issue.data)s",
1601
- "severity": 3,
1602
- "categories": []
1603
- },
1604
- "AVD-GCP-0012": {
1605
- "title": "google: Zone signing should not use RSA SHA1",
1606
- "description": "%(issue.data)s",
1607
- "severity": 3,
1608
- "categories": []
1609
- },
1610
- "AVD-GCP-0063": {
1611
- "title": "google: Kubernetes should have 'Automatic repair' enabled",
1612
- "description": "%(issue.data)s",
1613
- "severity": 3,
1614
- "categories": []
1615
- },
1616
- "AVD-GCP-0058": {
1617
- "title": "google: Kubernetes should have 'Automatic upgrade' enabled",
1618
- "description": "%(issue.data)s",
1619
- "severity": 3,
1620
- "categories": []
1621
- },
1622
- "AVD-GCP-0049": {
1623
- "title": "google: Clusters should have IP aliasing enabled",
1624
- "description": "%(issue.data)s",
1625
- "severity": 3,
1626
- "categories": []
1627
- },
1628
- "AVD-GCP-0061": {
1629
- "title": "google: Master authorized networks should be configured on GKE clusters",
1630
- "description": "%(issue.data)s",
1631
- "severity": 3,
1632
- "categories": []
1633
- },
1634
- "AVD-GCP-0056": {
1635
- "title": "google: Network Policy should be enabled on GKE clusters",
1636
- "description": "%(issue.data)s",
1637
- "severity": 3,
1638
- "categories": []
1639
- },
1640
- "AVD-GCP-0059": {
1641
- "title": "google: Clusters should be set to private",
1642
- "description": "%(issue.data)s",
1643
- "severity": 3,
1644
- "categories": []
1645
- },
1646
- "AVD-GCP-0060": {
1647
- "title": "google: Stackdriver Logging should be enabled",
1648
- "description": "%(issue.data)s",
1649
- "severity": 3,
1650
- "categories": []
1651
- },
1652
- "AVD-GCP-0052": {
1653
- "title": "google: Stackdriver Monitoring should be enabled",
1654
- "description": "%(issue.data)s",
1655
- "severity": 3,
1656
- "categories": []
1657
- },
1658
- "AVD-GCP-0047": {
1659
- "title": "google: Pod security policy enforcement not defined.",
1660
- "description": "%(issue.data)s",
1661
- "severity": 3,
1662
- "categories": []
1663
- },
1664
- "AVD-GCP-0048": {
1665
- "title": "google: Legacy metadata endpoints enabled.",
1666
- "description": "%(issue.data)s",
1667
- "severity": 3,
1668
- "categories": []
1669
- },
1670
- "AVD-GCP-0064": {
1671
- "title": "google: Legacy client authentication methods utilized.",
1672
- "description": "%(issue.data)s",
1673
- "severity": 3,
1674
- "categories": []
1675
- },
1676
- "AVD-GCP-0053": {
1677
- "title": "google: GKE Control Plane should not be publicly accessible",
1678
- "description": "%(issue.data)s",
1679
- "severity": 3,
1680
- "categories": []
1681
- },
1682
- "AVD-GCP-0057": {
1683
- "title": "google: Node metadata value disables metadata concealment.",
1684
- "description": "%(issue.data)s",
1685
- "severity": 3,
1686
- "categories": []
1687
- },
1688
- "AVD-GCP-0054": {
1689
- "title": "google: Ensure Container-Optimized OS (cos) is used for Kubernetes Engine Clusters Node image",
1690
- "description": "%(issue.data)s",
1691
- "severity": 3,
1692
- "categories": []
1693
- },
1694
- "AVD-GCP-0055": {
1695
- "title": "google: Shielded GKE nodes not enabled.",
1696
- "description": "%(issue.data)s",
1697
- "severity": 3,
1698
- "categories": []
1699
- },
1700
- "AVD-GCP-0051": {
1701
- "title": "google: Clusters should be configured with Labels",
1702
- "description": "%(issue.data)s",
1703
- "severity": 3,
1704
- "categories": []
1705
- },
1706
- "AVD-GCP-0062": {
1707
- "title": "google: Legacy ABAC permissions are enabled.",
1708
- "description": "%(issue.data)s",
1709
- "severity": 3,
1710
- "categories": []
1711
- },
1712
- "AVD-GCP-0050": {
1713
- "title": "google: Checks for service account defined for GKE nodes",
1714
- "description": "%(issue.data)s",
1715
- "severity": 3,
1716
- "categories": []
1717
- },
1718
- "AVD-GCP-0010": {
1719
- "title": "google: Default network should not be created at project level",
1720
- "description": "%(issue.data)s",
1721
- "severity": 3,
1722
- "categories": []
1723
- },
1724
- "AVD-GCP-0004": {
1725
- "title": "google: Roles should not be assigned to default service accounts",
1726
- "description": "%(issue.data)s",
1727
- "severity": 3,
1728
- "categories": []
1729
- },
1730
- "AVD-GCP-0005": {
1731
- "title": "google: Users should not be granted service account access at the folder level",
1732
- "description": "%(issue.data)s",
1733
- "severity": 3,
1734
- "categories": []
1735
- },
1736
- "AVD-GCP-0008": {
1737
- "title": "google: Roles should not be assigned to default service accounts",
1738
- "description": "%(issue.data)s",
1739
- "severity": 3,
1740
- "categories": []
1741
- },
1742
- "AVD-GCP-0009": {
1743
- "title": "google: Users should not be granted service account access at the organization level",
1744
- "description": "%(issue.data)s",
1745
- "severity": 3,
1746
- "categories": []
1747
- },
1748
- "AVD-GCP-0007": {
1749
- "title": "google: Service accounts should not have roles assigned with excessive privileges",
1750
- "description": "%(issue.data)s",
1751
- "severity": 3,
1752
- "categories": []
1753
- },
1754
- "AVD-GCP-0006": {
1755
- "title": "google: Roles should not be assigned to default service accounts",
1756
- "description": "%(issue.data)s",
1757
- "severity": 3,
1758
- "categories": []
1759
- },
1760
- "AVD-GCP-0011": {
1761
- "title": "google: Users should not be granted service account access at the project level",
1762
- "description": "%(issue.data)s",
1763
- "severity": 3,
1764
- "categories": []
1765
- },
1766
- "AVD-GCP-0003": {
1767
- "title": "google: IAM granted directly to user.",
1768
- "description": "%(issue.data)s",
1769
- "severity": 3,
1770
- "categories": []
1771
- },
1772
- "AVD-GCP-0065": {
1773
- "title": "google: KMS keys should be rotated at least every 90 days",
1774
- "description": "%(issue.data)s",
1775
- "severity": 3,
1776
- "categories": []
1777
- },
1778
- "AVD-GCP-0024": {
1779
- "title": "google: Enable automated backups to recover from data-loss",
1780
- "description": "%(issue.data)s",
1781
- "severity": 3,
1782
- "categories": []
1783
- },
1784
- "AVD-GCP-0014": {
1785
- "title": "google: Temporary file logging should be enabled for all temporary files.",
1786
- "description": "%(issue.data)s",
1787
- "severity": 3,
1788
- "categories": []
1789
- },
1790
- "AVD-GCP-0015": {
1791
- "title": "google: SSL connections to a SQL database instance should be enforced.",
1792
- "description": "%(issue.data)s",
1793
- "severity": 3,
1794
- "categories": []
1795
- },
1796
- "AVD-GCP-0026": {
1797
- "title": "google: Disable local_infile setting in MySQL",
1798
- "description": "%(issue.data)s",
1799
- "severity": 3,
1800
- "categories": []
1801
- },
1802
- "AVD-GCP-0023": {
1803
- "title": "google: Contained database authentication should be disabled",
1804
- "description": "%(issue.data)s",
1805
- "severity": 3,
1806
- "categories": []
1807
- },
1808
- "AVD-GCP-0019": {
1809
- "title": "google: Cross-database ownership chaining should be disabled",
1810
- "description": "%(issue.data)s",
1811
- "severity": 3,
1812
- "categories": []
1813
- },
1814
- "AVD-GCP-0017": {
1815
- "title": "google: Ensure that Cloud SQL Database Instances are not publicly exposed",
1816
- "description": "%(issue.data)s",
1817
- "severity": 3,
1818
- "categories": []
1819
- },
1820
- "AVD-GCP-0025": {
1821
- "title": "google: Ensure that logging of checkpoints is enabled.",
1822
- "description": "%(issue.data)s",
1823
- "severity": 3,
1824
- "categories": []
1825
- },
1826
- "AVD-GCP-0016": {
1827
- "title": "google: Ensure that logging of connections is enabled.",
1828
- "description": "%(issue.data)s",
1829
- "severity": 3,
1830
- "categories": []
1831
- },
1832
- "AVD-GCP-0022": {
1833
- "title": "google: Ensure that logging of disconnections is enabled.",
1834
- "description": "%(issue.data)s",
1835
- "severity": 3,
1836
- "categories": []
1837
- },
1838
- "AVD-GCP-0018": {
1839
- "title": "google: Ensure that Postgres errors are logged",
1840
- "description": "%(issue.data)s",
1841
- "severity": 3,
1842
- "categories": []
1843
- },
1844
- "AVD-GCP-0020": {
1845
- "title": "google: Ensure that logging of lock waits is enabled.",
1846
- "description": "%(issue.data)s",
1847
- "severity": 3,
1848
- "categories": []
1849
- },
1850
- "AVD-GCP-0021": {
1851
- "title": "google: Ensure that logging of long statements is disabled.",
1852
- "description": "%(issue.data)s",
1853
- "severity": 3,
1854
- "categories": []
1855
- },
1856
- "AVD-GCP-0002": {
1857
- "title": "google: Ensure that Cloud Storage buckets have uniform bucket-level access enabled",
1858
- "description": "%(issue.data)s",
1859
- "severity": 3,
1860
- "categories": []
1861
- },
1862
- "AVD-GCP-0001": {
1863
- "title": "google: Ensure that Cloud Storage bucket is not anonymously or publicly accessible.",
1864
- "description": "%(issue.data)s",
1865
- "severity": 3,
1866
- "categories": []
1867
- },
1868
- "AVD-KUBE-0002": {
1869
- "title": "kubernetes: Public egress should not be allowed via network policies",
1870
- "description": "%(issue.data)s",
1871
- "severity": 3,
1872
- "categories": []
1873
- },
1874
- "AVD-KUBE-0001": {
1875
- "title": "kubernetes: Public ingress should not be allowed via network policies",
1876
- "description": "%(issue.data)s",
1877
- "severity": 3,
1878
- "categories": []
1879
- },
1880
- "AVD-OPNSTK-0001": {
1881
- "title": "openstack: No plaintext password for compute instance",
1882
- "description": "%(issue.data)s",
1883
- "severity": 3,
1884
- "categories": []
1885
- },
1886
- "AVD-OPNSTK-0002": {
1887
- "title": "openstack: A firewall rule allows traffic from/to the public internet",
1888
- "description": "%(issue.data)s",
1889
- "severity": 3,
1890
- "categories": []
1891
- },
1892
- "AVD-OPNSTK-0005": {
1893
- "title": "openstack: Missing description for security group.",
1894
- "description": "%(issue.data)s",
1895
- "severity": 3,
1896
- "categories": []
1897
- },
1898
- "AVD-OPNSTK-0004": {
1899
- "title": "openstack: A security group rule allows egress traffic to multiple public addresses",
1900
- "description": "%(issue.data)s",
1901
- "severity": 3,
1902
- "categories": []
1903
- },
1904
- "AVD-OPNSTK-0003": {
1905
- "title": "openstack: A security group rule allows ingress traffic from multiple public addresses",
1906
- "description": "%(issue.data)s",
1907
- "severity": 3,
1908
- "categories": []
1909
- },
1910
- "AVD-OCI-0001": {
1911
- "title": "oracle: Compute instance requests an IP reservation from a public pool",
1912
- "description": "%(issue.data)s",
1913
- "severity": 3,
1914
- "categories": []
1915
- }
1916
-
1917
- }