The Center for Internet Security (CIS) is a nonprofit that publishes a benchmark — a set of security configuration best practices for Google Cloud Computing Platform.
To read more about CIS GCP Foundations Benchmark, please visit CIS Google Cloud Computing Platform home page .
CIS GCP v1.5.0 non-compliance issues (97)
Severity | Non-Compliance | Region | Resource | Issue | Remediation | Read more | Action | |
---|---|---|---|---|---|---|---|---|
IAM & Admin | Medium | CIS 1.1 | global | Service accounts | Non-corporate login credentials are in use: prevasio@gmail.com, peter@hotmail.com. | To follow cloud security best practices, make sure only corporate login credentials are used to access Google Cloud Platform (GCP) resources. | More info | |
IAM & Admin | Medium | CIS 1.11 | global | Service accounts | User account prevasio@gmail.com has KMS admin role and a CryptoKey role at the same time. | Ensure that separation of duties is enforced for all service account roles. | More info | |
IAM & Admin | Medium | CIS 1.11 | global | service-853160546542@gcp-sa-firestore.iam.gserviceaccount.com | Service account has KMS admin role and a CryptoKey role at the same time. | Ensure that separation of duties is enforced for all service account roles. | More info | |
IAM & Admin | Medium | CIS 1.11 | global | service-853160546542@gcp-sa-firestore.iam.gserviceaccount.com | User account has both Service Account User and Service Account Admin roles attached. | Ensure that separation of duties is enforced for all service account roles. | More info | |
IAM & Admin | Low | CIS 1.6 | global | service-853160546542@gcp-sa-firestore.iam.gserviceaccount.com | User account has a Service Account Token Creator role. | For best security practices, ensure that no IAM users have Service Account Token Creator role | More info | |
IAM & Admin | Low | CIS 1.7 PCI DSS (Networking) HIPAA (Networking) | global | d7cdf0e28512f79b6b5ac175bea7285a266e984b | User-managed key has not been rotated in 224 days. | Ensure that the user-managed keys associated with your service accounts are rotated every 90 days or less. | More info | |
IAM & Admin | Medium | CIS 1.4 | global | d7cdf0e28512f79b6b5ac175bea7285a266e984b | Service account key is not managed and rotated by Google. | Check the restrictions to the accessibility of the service account keys, and make sure they are managed and rotated by Google. | More info | |
Network Services | Medium | global | my-dns-zone | Managed zone uses RSASHA1 algorithm for zone signing. | To prevent DNS hijacking or man in the middle attacks, ensure that your DNS managed zones have DNSSEC security feature enabled and are not using the RSASHA1 algorithm for zone signing. | More info | ||
Compute Engine | High | CIS 4.3 | us-west4 | instance-1 | VM instance does not block project-wide SSH keys. | To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. | More info | |
Compute Engine | Low | CIS 4.9 PCI DSS 4.2.1 | us-west4 | instance-1 | VM instance has public access enabled. | In order to minimize exposure to the Internet, ensure your VM instances are not configured to have external IP addresses. | More info | |
Compute Engine | High | CIS 4.3 | us-west4 | instance-2 | VM instance does not block project-wide SSH keys. | To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. | More info | |
Compute Engine | Low | CIS 4.9 PCI DSS 4.2.1 | us-west4 | instance-2 | VM instance has public access enabled. | In order to minimize exposure to the Internet, ensure your VM instances are not configured to have external IP addresses. | More info | |
Compute Engine | Medium | CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) | us-west4 | instance-1 | Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). | To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. | More info | |
Compute Engine | Medium | CIS 4.5 | us-central1 | instance-group-1-ptb0 | VM instance has serial port access enabled. | Due to security and compliance regulations, ensure the serial port access is disabled for all your VM instances. | More info | |
Compute Engine | High | CIS 4.3 | us-central1 | instance-group-1-ptb0 | VM instance does not block project-wide SSH keys. | To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. | More info | |
Compute Engine | Medium | CIS 4.6 PCI DSS 4.2.1 | us-central1 | instance-group-1-ptb0 | VM instance has IP forwarding enabled. | For security and compliance reasons, as instances with IP Forwarding enabled act as routers/packet forwarders, delete the VM instances with IP forwarding enabled and redeploy them with IP forwarding disabled. | More info | |
Compute Engine | Medium | CIS 4.8 | us-central1 | instance-group-1-ptb0 | VM instance has Shielded VM security feature disabled. | For protection against rootkits and bootkits, ensure that your VM instances are configured to use Shielded VM security feature. | More info | |
Compute Engine | High | CIS 4.3 | us-central1 | gke-cluster-1-default-pool-fc104738-427b | VM instance does not block project-wide SSH keys. | To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. | More info | |
Compute Engine | High | CIS 4.3 | us-central1 | gke-cluster-1-default-pool-fc104738-dlsn | VM instance does not block project-wide SSH keys. | To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. | More info | |
Compute Engine | High | CIS 4.3 | us-central1 | mysql-5-7-secured-by-sg-1-vm | VM instance does not block project-wide SSH keys. | To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. | More info | |
Compute Engine | Low | CIS 4.9 PCI DSS 4.2.1 | us-central1 | mysql-5-7-secured-by-sg-1-vm | VM instance has public access enabled. | In order to minimize exposure to the Internet, ensure your VM instances are not configured to have external IP addresses. | More info | |
Compute Engine | Medium | CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) | us-central1 | disk-1 | Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). | To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. | More info | |
Compute Engine | Medium | CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) | us-central1 | gke-cluster-1-default-pool-fc104738-2sxd | Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). | To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. | More info | |
Compute Engine | Medium | CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) | us-central1 | gke-cluster-1-default-pool-fc104738-427b | Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). | To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. | More info | |
Compute Engine | Medium | CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) | us-central1 | gke-cluster-1-default-pool-fc104738-dlsn | Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). | To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. | More info | |
Compute Engine | Medium | CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) | us-central1 | mysql-5-7-secured-by-sg-1-vm | Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). | To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. | More info | |
Compute Engine | Medium | CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) | us-central1 | mysql-5-7-secured-by-sg-1-vm-disk1 | Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). | To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. | More info | |
Key Management | Critical | CIS 1.10 PCI DSS 3.7.4 HIPAA (Encryption) | global | my-keyring3-name | KMS cryptographic key has no rotation period set. | To fulfill HIPAA and PCI DSS key rotation requirements, ensure all cryptographic keys are set to rotate periodically. | More info | |
Cloud Storage | Medium | CIS 2.3 | global | gcf-sources-853160546542-us-central1 | Storage bucket has no retention policy. | For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. | More info | |
Cloud Storage | Medium | CIS 2.3 | global | prevasio-test-bucket | Storage bucket has no retention policy. | For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. | More info | |
Cloud Storage | Medium | CIS 2.3 | global | staging.sylvan-surf-339107.appspot.com | Storage bucket has no retention policy. | For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. | More info | |
Cloud Storage | Medium | CIS 5.2 | global | staging.sylvan-surf-339107.appspot.com | Storage bucket does not have uniform bucket-level access enabled. | To ensure uniform access to all the objects within a storage bucket. ensure that uniform bucket-level access is enabled for all your storage buckets. | More info | |
Cloud Storage | Medium | CIS 2.3 | global | sylvan-surf-339107.appspot.com | Storage bucket has no retention policy. | For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. | More info | |
Cloud Storage | Medium | CIS 5.2 | global | sylvan-surf-339107.appspot.com | Storage bucket does not have uniform bucket-level access enabled. | To ensure uniform access to all the objects within a storage bucket. ensure that uniform bucket-level access is enabled for all your storage buckets. | More info | |
Cloud Storage | Medium | CIS 5.1 | global | us.artifacts.sylvan-surf-339107.appspot.com | Storage bucket has anonymous and/or public access. | To prevent access from anonymous and/or public users, make sure the allUsers and allAuthenticatedUsers are removed from IAM policy for all storage bucket. | More info | |
Cloud Storage | Medium | CIS 2.3 | global | us.artifacts.sylvan-surf-339107.appspot.com | Storage bucket retention has expired 50 days ago. | For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. | More info | |
Cloud Storage | Medium | CIS 5.2 | global | us.artifacts.sylvan-surf-339107.appspot.com | Storage bucket does not have uniform bucket-level access enabled. | To ensure uniform access to all the objects within a storage bucket. ensure that uniform bucket-level access is enabled for all your storage buckets. | More info | |
SQL | Medium | CIS 6.1.1 | global | my-sql-instance | SQL database instance can be accessed by the root user from any host. | To ensure secure access, limit root access to SQL instances to allowed IPs only. | More info | |
SQL | Medium | CIS 6.7 | global | my-sql-instance | SQL database instance does not have an automated backup enabled. | Ensure that automated backups are enabled for all SQL database instances. | More info | |
SQL | Medium | CIS 6.4 PCI DSS 4.2 HIPAA (Encryption) | global | my-sql-instance | SQL database instance has SSL/TLS disabled. | To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enforce all incoming connections to your SQL database instances to use SSL/TLS only. | More info | |
SQL | Medium | CIS 6.1.3 | global | my-sql-instance | MySQL database instance has "local_infile" flag enabled. | To follow best practices on data security, ensure all your MySQL database instances have the "local_infile" flag disabled. | More info | |
SQL | Medium | CIS 6.6 | global | my-sql-instance | SQL database instance has public IPs. | To reduce the application's attack surface, ensure your SQL database instances are configured to use private IP addresses instead of public IPs. | More info | |
SQL | Medium | CIS 6.7 | global | my-sql-instance3 | SQL database instance does not have an automated backup enabled. | Ensure that automated backups are enabled for all SQL database instances. | More info | |
SQL | Medium | CIS 6.4 PCI DSS 4.2 HIPAA (Encryption) | global | my-sql-instance3 | SQL database instance has SSL/TLS disabled. | To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enforce all incoming connections to your SQL database instances to use SSL/TLS only. | More info | |
SQL | Medium | CIS 6.2.2 | global | my-sql-instance3 | PostgreSQL database instance has "log_connections" flag disabled. | To ensure each attempted connection to the database instance to be logged, ensure all your PostgreSQL database instances have the "log_connections" flag enabled. | More info | |
SQL | Medium | CIS 6.2.3 | global | my-sql-instance3 | PostgreSQL database instance has "log_disconnections" flag disabled. | To ensure the database logs the end of each session, ensure all your PostgreSQL database instances have the "log_disconnections" flag enabled. | More info | |
SQL | Medium | CIS 6.2.8 | global | my-sql-instance3 | PostgreSQL database instance has "log_min_duration_statement" flag enabled. | To avoid logging statements with sensitive information, ensure all your PostgreSQL database instances have the "log_min_duration_statement" flag set to -1 (i.e. disabled). | More info | |
SQL | Medium | CIS 6.2.7 | global | my-sql-instance3 | PostgreSQL database instance does not have "log_min_error_statement" flag set to Error. | As the best practice setting, ensure all your PostgreSQL database instances have the "log_min_error_statement" flag (the minimum message severity level considered an error statement) to be set to Error (or stricter). | More info | |
SQL | Medium | CIS 6.6 | global | my-sql-instance3 | SQL database instance has public IPs. | To reduce the application's attack surface, ensure your SQL database instances are configured to use private IP addresses instead of public IPs. | More info | |
SQL | Medium | CIS 6.7 | global | my-sql-instance4 | SQL database instance does not have an automated backup enabled. | Ensure that automated backups are enabled for all SQL database instances. | More info | |
SQL | Medium | CIS 6.4 PCI DSS 4.2 HIPAA (Encryption) | global | my-sql-instance4 | SQL database instance has SSL/TLS disabled. | To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enforce all incoming connections to your SQL database instances to use SSL/TLS only. | More info | |
SQL | Medium | CIS 6.3.7 | global | my-sql-instance4 | SQL server database instance has "contained database authentication" flag enabled. | To prevent any databases on the server from being contained, ensure the "contained database authentication" SQL Server engine flag is set to Off. | More info | |
SQL | Medium | CIS 6.3.2 | global | my-sql-instance4 | SQL server database instance has "cross db ownership chaining" flag enabled. | Unless all of the databases hosted by the SQL Server need to participate in cross-database ownership chaining, ensure the "cross db ownership chaining" SQL Server engine flag is disabled. | More info | |
SQL | Medium | CIS 6.6 | global | my-sql-instance4 | SQL database instance has public IPs. | To reduce the application's attack surface, ensure your SQL database instances are configured to use private IP addresses instead of public IPs. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | us-east1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | us-east4 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | us-west1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | us-west2 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | us-west3 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | us-west4 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | us-central1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | northamerica-northeast1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | northamerica-northeast2 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | southamerica-east1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | southamerica-west1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | europe-west1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | europe-west2 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | europe-west3 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | europe-west4 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | europe-west6 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | europe-north1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | europe-central2 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | asia-south1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | asia-south2 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | asia-southeast1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | asia-southeast2 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | asia-east1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | asia-east2 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | asia-northeast1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | asia-northeast2 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | asia-northeast3 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | australia-southeast1 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.8 PCI DSS 10.2 HIPAA (Audit) | australia-southeast2 | default | VPC subnet has VPC flow logs disabled. | To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. | More info | |
VPC Network | Medium | CIS 3.1 | global | default | Default VPC network is in use by 7 compute VM instances. | To follow best security practices and networking requirements, make sure your projects are not using the default Virtual Private Cloud (VPC) network. | More info | |
VPC Network | Low | CIS 2.12 | global | default | VPC network does not have DNS logging enabled. | To follow best security practices and networking requirements, make sure your VPC Networks use DNS Server Policy with logging enabled. | More info | |
VPC Network | Low | CIS 2.12 | global | vpc-network-test | VPC network does not have DNS logging enabled. | To follow best security practices and networking requirements, make sure your VPC Networks use DNS Server Policy with logging enabled. | More info | |
VPC Network | High | CIS 3.7 | global | default-allow-rdp | VPC firewall rules allow unrestricted inbound/ingress access on TCP port 3389 (RDP). | To reduce the attack surface for the VM instances associated with the firewall rules, ensure that your VPC network firewall rules do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 3389 (RDP). | More info | |
VPC Network | High | CIS 3.6 | global | default-allow-ssh | VPC firewall rules allow unrestricted inbound/ingress access on TCP port 22 (SSH). | To reduce the attack surface for the VM instances associated with the firewall rules, ensure that your VPC network firewall rules do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 22 (SSH). | More info | |
VPC Network | Critical | CIS 3.6 CIS 3.7 | global | gke-cluster-1-9c94fdab-vms | VPC firewall rules define all ports open to the public. | To protect VM instances against DoS or brute-force attacks, ensure that your VPC network firewall rules don't have all ports open to the public. | More info | |
VPC Network | Critical | CIS 3.6 CIS 3.7 | global | gke-cluster-1-9c94fdab-vms | VPC firewall rules define all ports open to the public. | To protect VM instances against DoS or brute-force attacks, ensure that your VPC network firewall rules don't have all ports open to the public. | More info | |
VPC Network | High | CIS 3.6 | global | vpc-network-test-allow-ssh | VPC firewall rules allow unrestricted inbound/ingress access on TCP port 22 (SSH). | To reduce the attack surface for the VM instances associated with the firewall rules, ensure that your VPC network firewall rules do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 22 (SSH). | More info | |
VPC Network | Critical | CIS 3.6 CIS 3.7 | global | vpc-network-open | VPC firewall rules define all ports open to the public. | To protect VM instances against DoS or brute-force attacks, ensure that your VPC network firewall rules don't have all ports open to the public. | More info | |
VPC Network | Critical | CIS 3.6 CIS 3.7 | global | vpc-network-open | VPC firewall rules define all ports open to the public. | To protect VM instances against DoS or brute-force attacks, ensure that your VPC network firewall rules don't have all ports open to the public. | More info | |
Logging | Low | CIS 2.2 | global | my-test-7 | Log bucket "prevasio-test-bucket" versioning is disabled. | Ensure the log sink is configured properly; in case of using a storage bucket, make sure it has a destination and an empty filter. | More info | |
BigQuery | High | CIS 7.3 PCI DSS 3.5 HIPAA (Encryption) | global | sylvan-surf-339107:my_dataset | BigQuery dataset is not encrypted using Customer-Managed Keys (CMK). | To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your BigQuery datasets are encrypted using CMK. | More info | |
BigQuery | High | CIS 7.1 | global | sylvan-surf-339107:my_dataset2 | BigQuery dataset has Writer access granted to allUsers, Reader access granted to allAuthenticatedUsers. | To prevent access from anonymous and/or public users, make sure the allUsers and allAuthenticatedUsers are removed from IAM policy for all datasets. | More info | |
BigQuery | High | CIS 7.3 PCI DSS 3.5 HIPAA (Encryption) | global | sylvan-surf-339107:my_dataset2 | BigQuery dataset is not encrypted using Customer-Managed Keys (CMK). | To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your BigQuery datasets are encrypted using CMK. | More info |