High severity CSPM issues (47)
Severity Non-Compliance Region Resource Issue Remediation Read more Action
IAM & Admin High global sylvan-surf-339107 Project contains resources over the 90% limit: 'Static addresses' has 8 of 8 resources, 'Target HTTPS proxies' has 9 of 10 resources, 'Target HTTP proxies' has 10 of 10 resources, 'Firewalls' has 92 of 100 resources, 'In-use addresses' has 8 of 8 resources... Request an increase of resource quotas via GCP support, to make sure the number of available resources is within the per-account limits. More info
Network Services High PCI DSS 4.2 HIPAA (Encryption) global my-loadbalancer2 Load balancer uses no valid SSL/TLS certificate. To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, ensure that your load balancers are configured to use valid SSL/TLS certificates. More info
Kubernetes Engine High global cluster-1 Kubernetes cluster has Container-Optimized OS disabled for node pool: node-pool2. To bring up your Docker containers on Google Cloud Platform quickly, efficiently, and securely, use Container-Optimized OS for all Kubernetes cluster nodes. More info
Kubernetes Engine High PCI DSS 3.5 HIPAA (Encryption) global cluster-1 No Customer-Managed Keys (CMK) encryption found for Kubernetes cluster node pools: node-pool4, node-pool3, default-pool. To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your Kubernetes cluster node pools are encrypted using CMK. More info
Kubernetes Engine High global cluster-1 Kubernetes cluster has basic authentication enabled. To make sure no static passwords are used to authenticate, disable basic authentication on all clusters. More info
Kubernetes Engine High global cluster-1 Kubernetes cluster has network policy disabled. For a more secure environment with only specified connections allowed between cluster pods, ensure all Kubernetes clusters have network policy enabled. More info
Kubernetes Engine High PCI DSS 3.5 HIPAA (Encryption) global cluster-1 Kubernetes cluster nodes are not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your Kubernetes cluster nodes are encrypted using CMK. More info
Kubernetes Engine High global cluster-1 Kubernetes cluster with default service account does not use minimal access scope. Ensure that all Kubernetes clusters created with default service account are created with minimal access scopes. More info
Kubernetes Engine High global cluster-1 Kubernetes cluster has pod security policy config disabled. To enable control of the security sensitive aspects of the pod configuration, ensure all Kubernetes clusters have pod security policy config enabled. More info
Compute Engine High CIS 4.3 us-west4 instance-1 VM instance does not block project-wide SSH keys. To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. More info
Compute Engine High PCI DSS 4.2.1 us-west4 instance-1 VM instance has no Two-Factor Authentication (2FA) enabled for OS Login. To fulfill PCI compliance requirements for additional security features for any required service, ensure that VM instances have OS login feature enabled and configured with 2FA. More info
Compute Engine High PCI DSS 3.5 HIPAA (Encryption) us-west4 instance-1 VM instance has no persistent disks encrypted with Customer-Managed Keys (CMKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, ensure that the persistent disks attached to your VM instances are encrypted with CMKs. More info
Compute Engine High CIS 4.3 us-west4 instance-2 VM instance does not block project-wide SSH keys. To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. More info
Compute Engine High PCI DSS 4.2.1 us-west4 instance-2 VM instance has no Two-Factor Authentication (2FA) enabled for OS Login. To fulfill PCI compliance requirements for additional security features for any required service, ensure that VM instances have OS login feature enabled and configured with 2FA. More info
Compute Engine High PCI DSS 3.5 HIPAA (Encryption) us-west4 instance-2 VM instance has no persistent disks encrypted with Customer-Managed Keys (CMKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, ensure that the persistent disks attached to your VM instances are encrypted with CMKs. More info
Compute Engine High CIS 4.3 us-central1 instance-group-1-ptb0 VM instance does not block project-wide SSH keys. To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. More info
Compute Engine High us-central1 instance-group-1-ptb0 VM instance maintenance behavior is not set to "Migrate". To prevent your production applications from experiencing disruptions during maintenance events, ensure VM instances have "On Host Maintenance" configuration set to "Migrate". More info
Compute Engine High us-central1 instance-group-1-ptb0 VM instance is preemptible. To prevent your instances from being terminated in case Compute Engine requires using their resources for other tasks, ensure VM instances are not preemptible. More info
Compute Engine High PCI DSS 4.2.1 us-central1 gke-cluster-1-default-pool-fc104738-2sxd VM instance has no Two-Factor Authentication (2FA) enabled for OS Login. To fulfill PCI compliance requirements for additional security features for any required service, ensure that VM instances have OS login feature enabled and configured with 2FA. More info
Compute Engine High PCI DSS 3.5 HIPAA (Encryption) us-central1 gke-cluster-1-default-pool-fc104738-2sxd VM instance has no persistent disks encrypted with Customer-Managed Keys (CMKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, ensure that the persistent disks attached to your VM instances are encrypted with CMKs. More info
Compute Engine High CIS 4.3 us-central1 gke-cluster-1-default-pool-fc104738-427b VM instance does not block project-wide SSH keys. To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. More info
Compute Engine High PCI DSS 4.2.1 us-central1 gke-cluster-1-default-pool-fc104738-427b VM instance has no Two-Factor Authentication (2FA) enabled for OS Login. To fulfill PCI compliance requirements for additional security features for any required service, ensure that VM instances have OS login feature enabled and configured with 2FA. More info
Compute Engine High PCI DSS 3.5 HIPAA (Encryption) us-central1 gke-cluster-1-default-pool-fc104738-427b VM instance has no persistent disks encrypted with Customer-Managed Keys (CMKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, ensure that the persistent disks attached to your VM instances are encrypted with CMKs. More info
Compute Engine High CIS 4.3 us-central1 gke-cluster-1-default-pool-fc104738-dlsn VM instance does not block project-wide SSH keys. To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. More info
Compute Engine High PCI DSS 4.2.1 us-central1 gke-cluster-1-default-pool-fc104738-dlsn VM instance has no Two-Factor Authentication (2FA) enabled for OS Login. To fulfill PCI compliance requirements for additional security features for any required service, ensure that VM instances have OS login feature enabled and configured with 2FA. More info
Compute Engine High PCI DSS 3.5 HIPAA (Encryption) us-central1 gke-cluster-1-default-pool-fc104738-dlsn VM instance has no persistent disks encrypted with Customer-Managed Keys (CMKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, ensure that the persistent disks attached to your VM instances are encrypted with CMKs. More info
Compute Engine High CIS 4.3 us-central1 mysql-5-7-secured-by-sg-1-vm VM instance does not block project-wide SSH keys. To maintain the principle of least privilege and prevent potential privilege escalation, ensure VM instances are not configured to allow project-wide SSH keys and use instance-level SSH keys instead. More info
Compute Engine High PCI DSS 4.2.1 us-central1 mysql-5-7-secured-by-sg-1-vm VM instance has no Two-Factor Authentication (2FA) enabled for OS Login. To fulfill PCI compliance requirements for additional security features for any required service, ensure that VM instances have OS login feature enabled and configured with 2FA. More info
Compute Engine High PCI DSS 3.5 HIPAA (Encryption) us-central1 mysql-5-7-secured-by-sg-1-vm VM instance has no persistent disks encrypted with Customer-Managed Keys (CMKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, ensure that the persistent disks attached to your VM instances are encrypted with CMKs. More info
VPC Network High CIS 3.7 global default-allow-rdp VPC firewall rules allow unrestricted inbound/ingress access on TCP port 3389 (RDP). To reduce the attack surface for the VM instances associated with the firewall rules, ensure that your VPC network firewall rules do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 3389 (RDP). More info
VPC Network High CIS 3.6 global default-allow-ssh VPC firewall rules allow unrestricted inbound/ingress access on TCP port 22 (SSH). To reduce the attack surface for the VM instances associated with the firewall rules, ensure that your VPC network firewall rules do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 22 (SSH). More info
VPC Network High CIS 3.6 global vpc-network-test-allow-ssh VPC firewall rules allow unrestricted inbound/ingress access on TCP port 22 (SSH). To reduce the attack surface for the VM instances associated with the firewall rules, ensure that your VPC network firewall rules do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 22 (SSH). More info
VPC Network High global vpc-network-open-custom VPC firewall rules allow unrestricted inbound/ingress access on TCP port 1433 (SQL Server). To reduce the attack surface for the VM instances associated with the firewall rules, ensure that your VPC network firewall rules do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 1433 (SQL Server). More info
Dataflow High PCI DSS 3.5 HIPAA (Encryption) global my-dataflow-job Dataflow job is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your Dataflow jobs are encrypted using CMK. More info
SQL High PCI DSS 3.5 HIPAA (Encryption) global my-sql-instance SQL database instance is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your SQL database instances are encrypted using CMK. More info
SQL High PCI DSS 3.5 HIPAA (Encryption) global my-sql-instance3 SQL database instance is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your SQL database instances are encrypted using CMK. More info
SQL High PCI DSS 3.5 HIPAA (Encryption) global my-sql-instance4 SQL database instance is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your SQL database instances are encrypted using CMK. More info
Cloud Storage High PCI DSS 3.5 HIPAA (Encryption) global gcf-sources-853160546542-us-central1 Storage bucket is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your storage buckets are encrypted using CMK. More info
Cloud Storage High PCI DSS 3.5 HIPAA (Encryption) global prevasio-test-bucket Storage bucket is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your storage buckets are encrypted using CMK. More info
Cloud Storage High PCI DSS 3.5 HIPAA (Encryption) global staging.sylvan-surf-339107.appspot.com Storage bucket is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your storage buckets are encrypted using CMK. More info
Cloud Storage High PCI DSS 3.5 HIPAA (Encryption) global sylvan-surf-339107.appspot.com Storage bucket is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your storage buckets are encrypted using CMK. More info
Pub/Sub High PCI DSS 3.5 HIPAA (Encryption) global my-topic Pub/Sub topic is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your Pub/Sub topics are encrypted using CMK. More info
Pub/Sub High PCI DSS 3.5 HIPAA (Encryption) global my-topic2 Pub/Sub topic is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your Pub/Sub topics are encrypted using CMK. More info
Pub/Sub High PCI DSS 3.5 HIPAA (Encryption) global my-topic3 Pub/Sub topic is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your Pub/Sub topics are encrypted using CMK. More info
BigQuery High CIS 7.3 PCI DSS 3.5 HIPAA (Encryption) global sylvan-surf-339107:my_dataset BigQuery dataset is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your BigQuery datasets are encrypted using CMK. More info
BigQuery High CIS 7.1 global sylvan-surf-339107:my_dataset2 BigQuery dataset has Writer access granted to allUsers, Reader access granted to allAuthenticatedUsers. To prevent access from anonymous and/or public users, make sure the allUsers and allAuthenticatedUsers are removed from IAM policy for all datasets. More info
BigQuery High CIS 7.3 PCI DSS 3.5 HIPAA (Encryption) global sylvan-surf-339107:my_dataset2 BigQuery dataset is not encrypted using Customer-Managed Keys (CMK). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, make sure your BigQuery datasets are encrypted using CMK. More info
High severity private container images (0)
Repository Image name Image tag Region Image size Pushed at Latest Vulnerabilities Alerts Action
High severity public container images (0)
Repository Image name Image tag Region Image size Pushed at Latest Vulnerabilities Alerts Action