Medium severity CSPM issues (114)
Severity Non-Compliance Region Resource Issue Remediation Read more Action
Kubernetes / Registries Medium westus2 test-cluster Kubernetes Service Cluster has Role-Based Access Control (RBAC) disabled. To achieve fine-grained control over Kubernetes cluster resources, ensure that RBAC is enabled for all Kubernetes Service Clusters. More info
Cosmos DB Medium CIS 4.5.1 westus prevasio-cosmos-db-account Cosmos DB Account allows public access. To add an additional layer of security to the account resources, update the firewall and the virtual network configuration for your Cosmos DB Accounts. More info
Cosmos DB Medium westus prevasio-cosmos-db-account Cosmos DB Account does not have Automatic Failover enabled. To enable resource replication and fault tolerance at the account level, make sure your Cosmos DB Accounts have the Automatic Failover feature enabled. More info
Cosmos DB Medium westus3 prevasio-cosmo-db-account2 Cosmos DB Account does not have Automatic Failover enabled. To enable resource replication and fault tolerance at the account level, make sure your Cosmos DB Accounts have the Automatic Failover feature enabled. More info
PostgreSQL Medium eastus2 prevasio-postgresql-server PostgreSQL Server uses no Active Directory administrator. To centrally manage identity and access to your PostgreSQL database servers, ensure that PostgreSQL Servers use an Active Directory administrator. More info
PostgreSQL Medium eastus2 prevasio-postgresql-server PostgreSQL Server has no "connection_throttling" server parameter specified. To enable temporary connection throttling per IP address for too many invalid login failures, ensure "connection_throttling" parameter is enabled for all PostgreSQL Database Servers. More info
PostgreSQL Medium eastus2 prevasio-postgresql-server PostgreSQL Server has no "log_checkpoints" server parameter specified. To allow checkpoints and restart points to be logged in the PostgreSQL server log, ensure "log_checkpoints" parameter is enabled for all PostgreSQL Database Servers. More info
PostgreSQL Medium eastus2 prevasio-postgresql-server PostgreSQL Server has no "log_connections" server parameter specified. To allow each attempted connection to the database server to be logged, ensure "log_connections" parameter is enabled for all PostgreSQL Database Servers. More info
PostgreSQL Medium eastus2 prevasio-postgresql-server PostgreSQL Server has no "log_disconnections" server parameter specified. To allow the logging of session termination, ensure "log_disconnections" parameter is enabled for all PostgreSQL Database Servers. More info
PostgreSQL Medium eastus2 prevasio-postgresql-server PostgreSQL Server has no "log_duration" server parameter specified. To allow recording the duration of each completed PostgreSQL statement, ensure "log_duration" parameter is enabled for all PostgreSQL Database Servers. More info
Cache for Redis Medium PCI DSS (Old Protocols) HIPAA (Encryption) westus2 prevasio2 Redis Cache has TLS version 1.0, which is lower than the desired TLS version 1.2. To comply with the industry standards, ensure Redis Cache uses TLS 1.2 or higher for all TLS connections. More info
Cache for Redis Medium PCI DSS (Old Protocols) HIPAA (Encryption) westus2 prevasio Redis Cache allows all TLS versions. To comply with the industry standards, ensure Redis Cache uses TLS 1.2 or higher for all TLS connections. More info
Monitor Medium PCI DSS 10.2 HIPAA (Audit) global default Log Profile has a retention period of 0 days. To fulfill HIPAA and PCI requirements on retaining logs for a minimum of 365 days, ensure that the Log Profile created for your activity log has a retention period set either to 0 (retain data forever) or 365 days or more. More info
Compute Medium eastus test-vm Virtual Machine has Accelerated Networking feature disabled. To provide low latency and high throughput for the network interfaces (NICs) attached to the VMs, ensure that Accelerated Networking feature is enabled for your VMs. More info
Compute Medium eastus test-vm Virtual Machine does not have a system-assigned managed identity enabled. To allow secure VMs authenticate to any service that supports Azure AD authentication, without having credentials in your code, ensure that your VMs have system-assigned managed identities enabled. More info
Compute Medium CIS 2.5 eastus test-vm Virtual Machine does not have Automatic Update configured. To fulfill PCI DSS requirements on having the latest updates and patches installed, ensure that your VMs have Automatic Update enabled. More info
Compute Medium eastus test-vm Virtual Machine does not have Availability Set enabled. To keep the VM available during planned or unplanned maintenance events, make sure the VMs is created with Availability Set enabled. More info
Compute Medium eastus test-vm Virtual Machine has Guest-Level Diagnostics disabled. For more insight into the state of your VMs, ensure that Guest-Level Diagnostics is enabled for all your VMs. More info
Compute Medium eastus test-vm Virtual Machine has Performance Diagnostics disabled. To help mitigate VM performance issues, ensure that Performance Diagnostics is enabled for all your VMs. More info
Compute Medium eastus test-vm Virtual Machine uses no Azure Active Directory (AAD) credentials for secure SSH/RDP access. To simplify the access permission management by enforcing policies that allow or deny access to your VMs from one central location, ensure that your VMs have AAD based SSH Login extension installed. More info
Compute Medium eastus test-scale-set Virtual Machine Scale Set has Automatic Repairs feature disabled. To have unhealthy VM instances automatically deleted and the new ones created with the latest instance model settings, ensure that your VM scale sets have Health Monitoring and Automatic Repairs features enabled. More info
Compute Medium eastus test-scale-set Virtual Machine Scale Set has neither Rolling nor Automatic upgrade policy. To ease update management by safely and automatically upgrading the OS disk for all instances in the scale set, ensure that your VM scale sets have either Rolling or Automatic upgrade policy enabled. More info
Compute Medium eastus test-scale-set Virtual Machine Scale Set has autoscale notifications disabled. To get notified about the status of autoscale actions, ensure that your VM scale sets have email or webhook-based alert notifications enabled. More info
Compute Medium eastus test-scale-set Virtual Machine Scale Set does not have a Load Balancer. To distribute incoming traffic among healthy VM instances running within the scale set, ensure that your VM scale sets have integrated Load Balancers. More info
Compute Medium CIS 7.1 westus2 test-vm2 Virtual Machine is not configured to use Azure managed Disk Volume. For reliable, efficient and simplified disk management, ensure that your VMs are configured to use managed Disk Volumes. More info
Compute Medium westus2 test-vm2 Virtual Machine has no VM agent enabled. To let Defender for Cloud collect data from your VMs to monitor for security vulnerabilities and threats, ensure that your VMs have VM agent enabled. More info
Compute Medium westus2 test-vm2 Virtual Machine does not have boot diagnostics enabled. To capture server serial console output and the OS screenshots required for diagnosing and troubleshooting VM startup issues, make sure the VMs have boot diagnostics enabled. More info
Compute Medium westus2 test-vm2 Virtual Machine has Guest-Level Diagnostics disabled. For more insight into the state of your VMs, ensure that Guest-Level Diagnostics is enabled for all your VMs. More info
Compute Medium westus2 test-vm2 Virtual Machine has Performance Diagnostics disabled. To help mitigate VM performance issues, ensure that Performance Diagnostics is enabled for all your VMs. More info
Compute Medium westus2 test-vm2 Virtual Machine uses no Azure Active Directory (AAD) credentials for secure SSH/RDP access. To simplify the access permission management by enforcing policies that allow or deny access to your VMs from one central location, ensure that your VMs have AAD based SSH Login extension installed. More info
Compute Medium HIPAA (Backup) westus2 test-vm2 Virtual Machine does not have backups enabled. To follow data security best practices and compliance requirements, make sure the VMs have backups enabled. More info
Compute Medium westus2 test-vm3 Virtual Machine does not have a system-assigned managed identity enabled. To allow secure VMs authenticate to any service that supports Azure AD authentication, without having credentials in your code, ensure that your VMs have system-assigned managed identities enabled. More info
Compute Medium westus2 test-vm3 Virtual Machine is classic. As the use of Azure Cloud Services (classic) is deprecated, ensure that your VMs are migrated to Azure Resource Manager. More info
Compute Medium westus2 test-vm3 Virtual Machine does not have Availability Set enabled. To keep the VM available during planned or unplanned maintenance events, make sure the VMs is created with Availability Set enabled. More info
Compute Medium westus2 test-vm3 Virtual Machine has Guest-Level Diagnostics disabled. For more insight into the state of your VMs, ensure that Guest-Level Diagnostics is enabled for all your VMs. More info
Compute Medium westus2 test-vm3 Virtual Machine has Performance Diagnostics disabled. To help mitigate VM performance issues, ensure that Performance Diagnostics is enabled for all your VMs. More info
Compute Medium westus2 aks-agentpool-17955050-vmss Virtual Machine Scale Set has health monitoring disabled. To have reports on the application health from inside the VM scale set instances, ensure that your VM scale sets have health monitoring enabled. More info
Compute Medium westus2 aks-agentpool-17955050-vmss Virtual Machine Scale Set uses no Azure Active Directory (AAD) credentials for secure SSH/RDP access. To simplify the access permission management by enforcing policies that allow or deny access to your VM scale sets from one central location, ensure that your VM scale sets have AAD based login extension installed. More info
Compute Medium westus2 aks-agentpool-17955050-vmss Virtual Machine Scale Set has Automatic Repairs feature disabled. To have unhealthy VM instances automatically deleted and the new ones created with the latest instance model settings, ensure that your VM scale sets have Health Monitoring and Automatic Repairs features enabled. More info
Compute Medium westus2 aks-agentpool-17955050-vmss Virtual Machine Scale Set has Termination Notifications feature disabled. To receive instance termination notifications through the Azure Metadata service, ensure that your VM scale sets have Termination Notifications feature enabled. More info
Compute Medium westus2 aks-agentpool-17955050-vmss Virtual Machine Scale Set has autoscale disabled. To have a highly available scale set, ensure that your VM scale sets have autoscale enabled. More info
Compute Medium westus2 empty-scale-set Virtual Machine Scale Set has health monitoring disabled. To have reports on the application health from inside the VM scale set instances, ensure that your VM scale sets have health monitoring enabled. More info
Compute Medium westus2 empty-scale-set Virtual Machine Scale Set uses no Azure Active Directory (AAD) credentials for secure SSH/RDP access. To simplify the access permission management by enforcing policies that allow or deny access to your VM scale sets from one central location, ensure that your VM scale sets have AAD based login extension installed. More info
Compute Medium westus2 empty-scale-set Virtual Machine Scale Set has Automatic Repairs feature disabled. To have unhealthy VM instances automatically deleted and the new ones created with the latest instance model settings, ensure that your VM scale sets have Health Monitoring and Automatic Repairs features enabled. More info
Compute Medium westus2 empty-scale-set Virtual Machine Scale Set has neither Rolling nor Automatic upgrade policy. To ease update management by safely and automatically upgrading the OS disk for all instances in the scale set, ensure that your VM scale sets have either Rolling or Automatic upgrade policy enabled. More info
Compute Medium westus2 empty-scale-set Virtual Machine Scale Set has Termination Notifications feature disabled. To receive instance termination notifications through the Azure Metadata service, ensure that your VM scale sets have Termination Notifications feature enabled. More info
Compute Medium westus2 empty-scale-set Virtual Machine Scale Set has autoscale disabled. To have a highly available scale set, ensure that your VM scale sets have autoscale enabled. More info
Compute Medium westus2 empty-scale-set Virtual Machine Scale Set does not have a Load Balancer. To distribute incoming traffic among healthy VM instances running within the scale set, ensure that your VM scale sets have integrated Load Balancers. More info
Compute Medium westus2 test-scale-set2 Virtual Machine Scale Set uses no Azure Active Directory (AAD) credentials for secure SSH/RDP access. To simplify the access permission management by enforcing policies that allow or deny access to your VM scale sets from one central location, ensure that your VM scale sets have AAD based login extension installed. More info
Compute Medium westus2 test-scale-set2 Virtual Machine Scale Set has Termination Notifications feature disabled. To receive instance termination notifications through the Azure Metadata service, ensure that your VM scale sets have Termination Notifications feature enabled. More info
Compute Medium westus2 test-scale-set2 Virtual Machine Scale Set does not have a Load Balancer. To distribute incoming traffic among healthy VM instances running within the scale set, ensure that your VM scale sets have integrated Load Balancers. More info
Compute Medium CIS 7.2 PCI DSS 3.5 HIPAA (Encryption) westus2 data-disk Disk Volume is not encrypted. To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, ensure that all VM disks are encrypted. More info
Compute Medium westus2 data-disk Disk Volume is not attached to a VM. To eliminate unnecessary costs and meet compliance requirements regarding unused resources, ensure that there are no unattached VM Disk Volumes. More info
Compute Medium westus2 data-disk Disk Volume is not attached to a VM. To eliminate unnecessary costs and meet compliance requirements regarding unused resources, ensure that there are no unattached VM Disk Volumes. More info
Compute Medium CIS 7.2 westus2 test-vm2_disk1_bcf51a4e96ba4accb5b16c34beb0fd23 Disk Volume does not use customer-managed keys. To have a more granular control over your VM data encryption/decryption process, ensure that VM disks are created using customer-managed keys (also known as Bring Your Own Keys - BYOKs). More info
Web Medium eastus prevasio-web-app App Service has Always On feature disabled. To prevent your websites/web applications from being idled out due to inactivity and to keep them loaded even when there's no traffic, ensure that your App Services have Always On feature enabled. More info
Web Medium CIS 9.1 PCI DSS 10.2 HIPAA (Audit) eastus prevasio-web-app App Service has Authentication feature disabled. To add an extra layer of security to the authentication process, ensure that your App Services have Authentication feature enabled. More info
Web Medium CIS 9.3 PCI DSS (Old Protocols) eastus prevasio-web-app App Service has TLS version 1.1, which is lower than the desired TLS version 1.2. To comply with the industry standards, ensure TLS 1.2 or higher is used for all TLS connections to App Services. More info
Web Medium CIS 9.4 eastus prevasio-web-app App Service is not configured to use an SSL certificate to authenticate incoming client requests. To configure the App Services to use an SSL certificate for incoming requests, enable "Incoming client certificates" configuration setting. More info
Web Medium CIS 9.2 PCI DSS 4.2 HIPAA (Encryption) eastus prevasio-web-app App Service is not enforcing HTTPS-only traffic. To redirect all non-secure HTTP requests to HTTPS so that the traffic between the web application servers and the application clients cannot be decrypted, enforce HTTPS-only traffic for your App Services. More info
SQL Medium HIPAA (Backup) eastus master SQL Database is not restorable. To fulfill HIPAA requirements on backups of all user data and inventory to secure its future availability, ensure that SQL Database instances can be restored to a recent point. More info
SQL Medium CIS 4.1.1 PCI DSS 10.2 HIPAA (Audit) eastus my-sql-db SQL Database has Database Auditing disabled. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that SQL Database Auditing is enabled. More info
SQL Medium HIPAA (Backup) eastus my-sql-db SQL Database is configured to retain backups for 5 days, while the recommended limit is 7 days. To fulfill HIPAA requirements on backups of all user data and inventory to secure its future availability, ensure that SQL Databases have a sufficient Point in Time Restore (PITR) backup retention period configured. More info
SQL Medium CIS 4.4.2 PCI DSS (Old Protocols) HIPAA (Encryption) eastus prevasio-sql-server SQL Server has TLS version 1.1, which is lower than the desired TLS version 1.2. To comply with the industry standards, ensure TLS 1.2 or higher is used for all TLS connections to SQL Servers. More info
SQL Medium CIS 4.1.6 PCI DSS 10.2 HIPAA (Audit) eastus prevasio-sql-server SQL Server Auditing retention is 10 days, while the recommended limit is 90 days. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that SQL Servers have a sufficient log data retention period, i.e. 90 days or more. More info
SQL Medium eastus prevasio-sql-server SQL Server has no automatic tuning configured for indexes createIndex, dropIndex, forceLastGoodPlan. To monitor database queries and improve database workload performance, ensure that SQL Servers have automatic tuning enabled. More info
SQL Medium CIS 4.1.1 PCI DSS 10.2 HIPAA (Audit) westus master SQL Database has Database Auditing disabled. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that SQL Database Auditing is enabled. More info
SQL Medium HIPAA (Backup) westus master SQL Database is not restorable. To fulfill HIPAA requirements on backups of all user data and inventory to secure its future availability, ensure that SQL Database instances can be restored to a recent point. More info
SQL Medium westus prevasio-sql-server2 SQL Server has no auto-failover groups configured. To enable database replication and automatic failover, ensure that SQL Servers are using auto-failover groups. More info
SQL Medium CIS 4.4.2 PCI DSS (Old Protocols) HIPAA (Encryption) westus prevasio-sql-server2 SQL Server has TLS version set to EnforcementDisabled, while the desired TLS version is 1.2. To comply with the industry standards, ensure TLS 1.2 or higher is used for all TLS connections to SQL Servers. More info
SQL Medium westus prevasio-sql-server2 SQL Server has Advanced Data Security disabled. To provide a set of advanced SQL security capabilities for your SQL Database Servers, ensure that Advanced Data Security is enabled within your SQL Server configuration settings. More info
SQL Medium westus prevasio-sql-server2 SQL Server has no Email Account Admins enabled. To send monitored data for unusual activity, vulnerabilities, and threats to the account admins and subscription owners, ensure that advanced data security for SQL Servers has Email Account Admins enabled. More info
SQL Medium CIS 4.1.1 PCI DSS 10.2 HIPAA (Audit) westus prevasio-sql-server2 SQL Server has Database Auditing disabled. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that SQL Server Auditing is enabled. More info
SQL Medium PCI DSS 10.2 HIPAA (Audit) westus prevasio-sql-server2 SQL Server has Audit Action and Groups disabled. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure SQL Server Audit Action and Groups is configured to at least include SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP, FAILED_DATABASE_AUTHENTICATION_GROUP and BATCH_COMPLETED_GROUP. More info
SQL Medium CIS 4.1.4 westus prevasio-sql-server2 SQL Server uses no Active Directory administrator. To centrally manage identity and access to your SQL Database Servers, ensure that SQL Servers use an Active Directory administrator. More info
SQL Medium CIS 4.1.3 westus prevasio-sql-server2 SQL Server has TDE (Transparent data encryption) that uses Microsoft managed key instead of BYOK (Bring Your Own Key). For greater control, transparency and increasing security by having full control of the encryption keys, ensure your SQL Server data at rest is protected with a key from your own Azure key vault. More info
Networking Medium CIS 6.5 PCI DSS 10.2 HIPAA (Audit) eastus basicNsgtest-scale-set_group-vnet-nic01 Network Security Group (NSG) has flow log retention set to 31 days, while the recommended limit is 90 days. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that NSGs have a sufficient flow log retention period, i.e. 90 days or more. More info
Networking Medium CIS 6.6 eastus Network Network Watcher is not enabled in the region "East US". To locate, diagnose, and gain insights into Azure networks, enable the Network Watcher service in the region "East US". More info
Networking Medium PCI DSS 4.2 HIPAA (Encryption) eastus my-load-balancer Network Load Balancer has no HTTPS configured, while other ports are open. To fulfill HIPAA requirements for all data to be transmitted over secure channels, ensure that each Load Balancer is configured to only accept HTTPS connections. More info
Networking Medium eastus my-load-balancer Network Load Balancer has no backend instances or addresses. To avoid the management overhead and costs, delete old Load Balancers that no longer have any backend resources attached. More info
Networking Medium PCI DSS 4.2 HIPAA (Encryption) global CDN Profile endpoint allows insecure HTTP origin. To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enable HTTPS and disable HTTP for each custom origin endpoint for each CDN Profile. More info
Networking Medium PCI DSS 4.2 HIPAA (Encryption) global CDN Profile endpoint allows insecure HTTP origin. To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enable HTTPS and disable HTTP for each custom origin endpoint for each CDN Profile. More info
Storage Medium CIS 3.8 PCI DSS (Networking) HIPAA (Networking) centralus prevasioteststorageacc Storage Account is configured to allow access to traffic from all networks (including Internet traffic). To fulfill PCI requirements on segmenting networks using firewalls and HIPAA access controls that require data access to be restricted to known sources, configure your Storage Account to deny access to traffic from all networks by default. More info
Storage Medium CIS 3.11 centralus prevasioteststorageacc Storage Account Blob has Soft Delete data retention period configured to 7 days, while the recommended minimum is 31 days or more. To handle your data restoration process in the event of a failure more efficiently, ensure that your Storage Blob objects have a sufficient Soft Delete data retention period, i.e. greater than 30 days. More info
Storage Medium CIS 3.12 eastus prevasiostorageaccount Storage Account uses Microsoft managed key instead of BYOK (Bring Your Own Key). For greater control, transparency and increasing security by having full control of the encryption keys, ensure your Storage Account data at rest is protected with a key from your own Azure Key Vault. More info
Storage Medium CIS 3.9 eastus prevasiostorageaccount Storage Account is configured not to allow trusted Azure services to access itself. To allow trusted cloud services to access your Storage Account with the enabled firewall rules, add an exception so that the trusted Azure services can bypass your network rules and still access your Storage Account. More info
Storage Medium CIS 3.15 PCI DSS (Old Protocols) eastus prevasiostorageaccount Storage Account has TLS version 1.0, which is lower than the desired TLS version 1.2. To comply with the industry standards, ensure your Storage Account uses TLS 1.2 or higher for all TLS connections. More info
Storage Medium CIS 3.1 PCI DSS 4.2 HIPAA (Encryption) eastus prevasiostorageaccount Storage Account allows insecure HTTP origin. To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, ensures HTTPS-only traffic is allowed to Storage Account endpoints. More info
Storage Medium CIS 3.11 eastus prevasiostorageaccount Storage Account Blob has Soft Delete data retention period configured to 3 days, while the recommended minimum is 31 days or more. To handle your data restoration process in the event of a failure more efficiently, ensure that your Storage Blob objects have a sufficient Soft Delete data retention period, i.e. greater than 30 days. More info
Storage Medium CIS 3.12 eastus sqlvan5orkhoarubfu Storage Account uses Microsoft managed key instead of BYOK (Bring Your Own Key). For greater control, transparency and increasing security by having full control of the encryption keys, ensure your Storage Account data at rest is protected with a key from your own Azure Key Vault. More info
Storage Medium CIS 3.8 PCI DSS (Networking) HIPAA (Networking) eastus sqlvan5orkhoarubfu Storage Account is configured to allow access to traffic from all networks (including Internet traffic). To fulfill PCI requirements on segmenting networks using firewalls and HIPAA access controls that require data access to be restricted to known sources, configure your Storage Account to deny access to traffic from all networks by default. More info
Storage Medium CIS 3.11 eastus sqlvan5orkhoarubfu Storage Account Blob has no Soft Delete data retention period configured. To handle your data restoration process in the event of a failure more efficiently, ensure that your Storage Blob objects have a sufficient Soft Delete data retention period, i.e. greater than 30 days. More info
Storage Medium HIPAA (Networking) global insights-logs-networksecuritygroupflowevent Storage Blob Container is not immutable. To fulfill HIPAA requirements on strict integrity of the stored data and its protection against corruption or malicious destruction, ensure that all Blob Containers that store critical data have an immutable blob storage policy attached. More info
Storage Medium HIPAA (Networking) global insights-operational-logs Storage Blob Container is not immutable. To fulfill HIPAA requirements on strict integrity of the stored data and its protection against corruption or malicious destruction, ensure that all Blob Containers that store critical data have an immutable blob storage policy attached. More info
Storage Medium HIPAA (Networking) global $web Storage Blob Container is not immutable. To fulfill HIPAA requirements on strict integrity of the stored data and its protection against corruption or malicious destruction, ensure that all Blob Containers that store critical data have an immutable blob storage policy attached. More info
Storage Medium HIPAA (Networking) global insights-operational-logs Storage Blob Container is not immutable. To fulfill HIPAA requirements on strict integrity of the stored data and its protection against corruption or malicious destruction, ensure that all Blob Containers that store critical data have an immutable blob storage policy attached. More info
Storage Medium CIS 3.7 PCI DSS (Networking) HIPAA (Networking) global test-storage-container Storage Blob Container allows public access. To fulfill HIPAA and PCI DSS requirements on strict access controls to all data, ensure that all Blob Containers have anonymous public access disabled. More info
Security Medium PCI DSS 4.2 HIPAA (Encryption) eastus prevasio-key-vault-2 Key Vault has Soft Delete retention period set to 7 days, while the recommended limit is 90 days. To fulfill HIPAA requirements on protecting all encryption mechanisms against loss of modification, ensure that Key Vaults have a recommended Soft Delete retention period, i.e. 90 days. More info
Security Medium eastus prevasio-key-vault-2 Key Vault does not grant vault access to trusted Microsoft services. To allow trusted Azure cloud services to work as intended and be able to access your vault resources, enable "Allow trusted Microsoft services to bypass this firewall" exception in your Key Vault network firewall configuration. More info
Security Medium eastus prevasio-key-vault-2 Key Vault allows access to traffic from all networks, including the public Internet. To add a layer of security by limiting access to trusted networks and/or IP addresses, change the Key Vault firewall default action from "Allow" to "Deny" and configure the appropriate access. More info
Security Medium CIS 2.3.1 westeurope test-domain.com Security Contact is not configured to send security alerts to administrators. To notify subscription owners/administrators about detected vulnerabilities and other security issues, ensure that security alerts are configured to be sent to subscription owners/administrators. More info
Security Medium CIS 2.3.3 westeurope test-domain.com Security Contact is not configured to receive high severity alert notifications. To notify the Security Contact about potential security issues, ensure that high severity alert notificationss are properly configured. More info
Security Medium CIS 2.2 CIS 2.2.1 global Security Automatic Provisioning of the Monitoring Agent is not enabled. To collect security data and events from your cloud compute resources in order to help you prevent, detect, and respond effectively to security issues, ensure that automatic provisioning of the monitoring agent is enabled in your Microsoft Azure account. More info
Management & Governance Medium global myAssignment Policy Assignment for Azure Security Benchmark initiative contains disabled policy "System updates should be installed on your machines". To be notified about the security and critical updates, enable the "systemUpdatesMonitoringEffect" parameter of the Policy Assignment. More info
Management & Governance Medium global myAssignment Policy Assignment for Azure Security Benchmark initiative contains disabled policy "Vulnerabilities in security configuration on your machines should be remediated". To allow Defender for Cloud determine if your Virtual Machines are vulnerable to attacks, enable the "systemConfigurationsMonitoringEffect" parameter of the Policy Assignment. More info
Management & Governance Medium global myAssignment Policy Assignment for Azure Security Benchmark initiative contains disabled policy "Monitor missing Endpoint Protection in Azure Security Center". To allow Defender for Cloud identify and remove malware from your Virtual Machines, enable the "endpointProtectionMonitoringEffect" parameter of the Policy Assignment. More info
Management & Governance Medium global myAssignment2 Policy Assignment for Azure Security Benchmark initiative contains disabled policy "System updates should be installed on your machines". To be notified about the security and critical updates, enable the "systemUpdatesMonitoringEffect" parameter of the Policy Assignment. More info
Management & Governance Medium global myAssignment2 Policy Assignment for Azure Security Benchmark initiative contains disabled policy "Vulnerabilities in security configuration on your machines should be remediated". To allow Defender for Cloud determine if your Virtual Machines are vulnerable to attacks, enable the "systemConfigurationsMonitoringEffect" parameter of the Policy Assignment. More info
Management & Governance Medium global myAssignment2 Policy Assignment for Azure Security Benchmark initiative contains disabled policy "Monitor missing Endpoint Protection in Azure Security Center". To allow Defender for Cloud identify and remove malware from your Virtual Machines, enable the "endpointProtectionMonitoringEffect" parameter of the Policy Assignment. More info
Management & Governance Medium global SecurityCenterBuiltIn Policy Assignment for Azure Security Benchmark initiative contains disabled policy "System updates should be installed on your machines". To be notified about the security and critical updates, enable the "systemUpdatesMonitoringEffect" parameter of the Policy Assignment. More info
Management & Governance Medium global SqlServers Standard pricing is not enabled for the service "SqlServers". To enable enhanced security features, such as regulatory compliance reports or threat protection, enable Microsoft Defender for Cloud for all resources in your subscription. More info
Management & Governance Medium global SqlServerVirtualMachines Standard pricing is not enabled for the service "SqlServerVirtualMachines". To enable enhanced security features, such as regulatory compliance reports or threat protection, enable Microsoft Defender for Cloud for all resources in your subscription. More info
Management & Governance Medium global OpenSourceRelationalDatabases Standard pricing is not enabled for the service "OpenSourceRelationalDatabases". To enable enhanced security features, such as regulatory compliance reports or threat protection, enable Microsoft Defender for Cloud for all resources in your subscription. More info
Management & Governance Medium global CosmosDbs Standard pricing is not enabled for the service "CosmosDbs". To enable enhanced security features, such as regulatory compliance reports or threat protection, enable Microsoft Defender for Cloud for all resources in your subscription. More info
Medium severity private container images (0)
Repository Image tag Region Image size Pushed at Latest Vulnerabilities Alerts Action
Medium severity public container images (0)
Repository Image tag Region Image size Pushed at Latest Vulnerabilities Alerts Action