Medium severity CSPM issues (179)
Severity Non-Compliance Region Resource Issue Remediation Read more Action
Spanner Medium us-east1 my-spanner-instance2 Spanner instance has a node count 21 set above the limit of 20. Make sure your Spanner instances have the number of nodes below the limit. More info
IAM & Admin Medium northamerica-northeast1 my-schedule Snapshot schedule is configured not to take application-consistent snapshots. To enable capturing pending writes that are in transit from memory to disk, make sure all disk snapshot schedules are application-consistent. More info
IAM & Admin Medium CIS 1.1 global Service accounts Non-corporate login credentials are in use: prevasio@gmail.com, peter@hotmail.com. To follow cloud security best practices, make sure only corporate login credentials are used to access Google Cloud Platform (GCP) resources. More info
IAM & Admin Medium CIS 1.11 global Service accounts User account prevasio@gmail.com has KMS admin role and a CryptoKey role at the same time. Ensure that separation of duties is enforced for all service account roles. More info
IAM & Admin Medium CIS 1.11 global service-853160546542@gcp-sa-firestore.iam.gserviceaccount.com Service account has KMS admin role and a CryptoKey role at the same time. Ensure that separation of duties is enforced for all service account roles. More info
IAM & Admin Medium CIS 1.11 global service-853160546542@gcp-sa-firestore.iam.gserviceaccount.com User account has both Service Account User and Service Account Admin roles attached. Ensure that separation of duties is enforced for all service account roles. More info
IAM & Admin Medium CIS 1.4 global d7cdf0e28512f79b6b5ac175bea7285a266e984b Service account key is not managed and rotated by Google. Check the restrictions to the accessibility of the service account keys, and make sure they are managed and rotated by Google. More info
IAM & Admin Medium global sylvan-surf-339107 Project contains resources over the 75% limit: 'Snapshots' has 750 of 1000 resources, 'Networks' has 4 of 5 resources, 'URL maps' has 8 of 10 resources. Request an increase of resource quotas via GCP support, to make sure the number of available resources is within the per-account limits. More info
IAM & Admin Medium global prevasio.click 'Define Allowed External IPs for VM Instances' constraint is not enforced at the organization level. To minimize your instances' exposure to the Internet, ensure 'Define Allowed External IPs for VM Instances' constraint is enforced to allow you to define the VM instances that are allowed to use external IP addresses. More info
IAM & Admin Medium global prevasio.click 'Disable Automatic IAM Grants for Default Service Accounts' is not enforced at the organization level. To improve access security, ensure 'Disable Automatic IAM Grants for Default Service Accounts' is enforced. More info
IAM & Admin Medium global prevasio.click 'Detailed Audit Logging Mode' is not enforced at the organization level. To fulfill compliance requirements such as SEC Rule 17a-4(f), CFTC Rule 1.31(c)-(d), and FINRA Rule 4511(c), ensure 'Detailed Audit Logging Mode' is enforced. More info
IAM & Admin Medium global prevasio.click 'Disable Automatic IAM Grants for Default Service Accounts' is not enforced at the organization level. To improve access security, ensure 'Disable Automatic IAM Grants for Default Service Accounts' is enforced. More info
IAM & Admin Medium global prevasio.click 'Disable Guest Attributes of Compute Engine Metadata' is not enforced at the organization level. For security reasons, ensure 'Disable Guest Attributes of Compute Engine Metadata' is enforced. More info
IAM & Admin Medium global prevasio.click 'Disable Workload Identity Cluster Creation' is not enforced at the organization level. To tightly control service account access in your organization, ensure 'Disable Workload Identity Cluster Creation' is enforced. More info
IAM & Admin Medium global prevasio.click 'Disable Service Account Key Creation' is not enforced at the organization level. To minimize the risk of mishandling user-managed keys, ensure 'Disable Service Account Key Creation' is enforced. More info
IAM & Admin Medium global prevasio.click 'Disable Service Account Key Upload' is not enforced at the organization level. To minimize the risk of mishandling user-managed keys, ensure 'Disable Service Account Key Upload' is enforced. More info
IAM & Admin Medium global prevasio.click 'Disable VM serial port access' is not enforced at the organization level. Due to security and compliance regulations, ensure 'Disable VM serial port access' is enforced. More info
IAM & Admin Medium global prevasio.click 'Restrict VM IP Forwarding' is not enforced at the organization level. To improve security and achieve regulatory compliance by explicitly defining the resource name of the VM instances allowed to use IP forwarding, ensure 'Restrict VM IP Forwarding' is enforced. More info
IAM & Admin Medium global prevasio.click 'Resource Location Restriction' is not enforced at the organization level. To achieve regulatory compliance by explicitly defining the locations allowed to deploy Google Cloud resources for your organization, ensure 'Resource Location Restriction' is enforced. More info
IAM & Admin Medium global prevasio.click 'Require OS Login' is not enforced at the organization level. To have centralized and automated SSH key pair management, ensure 'Require OS Login' is enforced. More info
IAM & Admin Medium global prevasio.click 'Restrict Authorized Networks on Cloud SQL instances' is not enforced at the organization level. To deny IAM members to add authorized networks in order to provide access to your security-critical SQL database instances, ensure 'Restrict Authorized Networks on Cloud SQL instances' is enforced. More info
IAM & Admin Medium global prevasio.click 'Restrict Load Balancer Creation for Types' is not enforced at the organization level. To allow only compliant load balancer types to be used to create Google Cloud load balancers for the GCP projects and folders within your organization, ensure 'Restrict Load Balancer Creation for Types' is enforced. More info
IAM & Admin Medium global prevasio.click 'Restrict Shared VPC Subnetworks' is not enforced at the organization level. To allow only a set of shared VPC subnetworks that eligible Google Cloud resources can use, ensure 'Restrict Shared VPC Subnetworks' is enforced. More info
IAM & Admin Medium global prevasio.click 'Restrict VPC Peering' is not enforced at the organization level. To allow only a set of VPC networks that are allowed to be peered with the networks created for your project, folder, or organization, ensure 'Restrict VPC Peering' is enforced. More info
IAM & Admin Medium global prevasio.click 'Restrict VPN Peer IPs' is not enforced at the organization level. To allow only a set of trusted IPv4 addresses can be configured as VPN peer IPs within your Google Cloud organization, ensure 'Restrict VPN Peer IPs' is enforced. More info
IAM & Admin Medium global prevasio.click 'Skip Default Network Creation' is not enforced at the organization level. To follow security best practices and meet networking requirements, ensure 'Skip Default Network Creation' is enforced. More info
IAM & Admin Medium global prevasio.click 'Define Trusted Image Project' is not enforced at the organization level. To allow only a set of images from trusted GCP projects to be used for boot disks for new VM instances, ensure 'Define Trusted Image Project' is enforced. More info
IAM & Admin Medium global prevasio.click 'Enforce uniform bucket-level access' is not enforced at the organization level. To enforce uniform bucket-level access for all Google Cloud Storage buckets available in your organization, ensure 'Enforce uniform bucket-level access' is enforced. More info
Network Services Medium global my-loadbalancer-service Backend service has Cloud CDN disabled. To increase speed and reliability as well as lowers server costs, ensure that Cloud CDN is enabled on all load balancers. More info
Network Services Medium global my-dns-zone Managed zone uses RSASHA1 algorithm for zone signing. To prevent DNS hijacking or man in the middle attacks, ensure that your DNS managed zones have DNSSEC security feature enabled and are not using the RSASHA1 algorithm for zone signing. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster has auto-repair disabled for the node pools: node-pool4, node-pool3. To enable auto-repair for the nodes that fail health checks, ensure auto-repair is enabled for all node pools in your Kubernetes Engine clusters. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster has auto-upgrade disabled for the node pool: default-pool. To ensure the latest security patches are installed and each node stays current with the latest version of the master branch, enable auto-upgrade for all node pools in your Kubernetes Engine clusters. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster has integrity monitoring disabled for node pools: node-pool4, node-pool3. To automatically monitor the integrity of your cluster nodes, ensure that integrity monitoring is enabled for your Kubernetes cluster nodes. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster has Secure Boot security feature disabled for the node pools: node-pool2, default-pool. To protect your cluster nodes against malware and rootkits, ensure that Secure Boot security feature is enabled for all your Kubernetes cluster nodes. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster has legacy authorization enabled. As legacy authorizer grants broad, statically defined permissions, ensure legacy authorization is disabled on all Kubernetes clusters. More info
Kubernetes Engine Medium PCI DSS 10.2 HIPAA (Audit) global cluster-1 Kubernetes cluster has logging disabled. To fulfill HIPAA compliance requirements for logging of all activity, ensure all Kubernetes clusters have logging enabled. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster has master authorized networks disabled. To allow IP addresses in the specified CIDR ranges to access your cluster control plane endpoint using HTTPS, enable master authorized networks on all Kubernetes clusters. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster has private cluster disabled. To isolate workloads from the public Internet, ensure all Kubernetes clusters have private cluster enabled. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster does not have private endpoint enabled. To route all traffic between the Kubernetes worker and control plane nodes over a private VPC endpoint rather than across the public internet, ensure all Kubernetes clusters have private endpoint enabled. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster does not have Shielded Nodes feature enabled. To limit the ability of an attacker to impersonate a node in your cluster even if the attacker is able to extract the node credentials, ensure all Kubernetes clusters have Shielded Nodes feature enabled. More info
Kubernetes Engine Medium global cluster-1 Kubernetes cluster has web dashboard enabled. As web dashboard is backed by a highly privileged service account, ensure web dashboard is disabled on all Kubernetes clusters. More info
Compute Engine Medium us-west4 instance-2 VM instance has Automatic Restart disabled. To allow Compute Engine restart the instance if it crashes or is stopped, Ensure automatic restart is enabled for all VM instances. More info
Compute Engine Medium CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) us-west4 instance-1 Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. More info
Compute Engine Medium us-west4 instance-1 Disk has no snapshot schedule configured. To periodically backup data from your persistent disks, ensure that Compute disks have scheduled snapshots configured. More info
Compute Engine Medium us-west4 instance-1 Disk has regional disk replication disabled. For high availability in case of a zonal outage, ensure that Compute disks have regional disk replication feature enabled. More info
Compute Engine Medium us-west4 instance-2 Disk has no snapshot schedule configured. To periodically backup data from your persistent disks, ensure that Compute disks have scheduled snapshots configured. More info
Compute Engine Medium us-west4 instance-2 Disk has regional disk replication disabled. For high availability in case of a zonal outage, ensure that Compute disks have regional disk replication feature enabled. More info
Compute Engine Medium CIS 4.5 us-central1 instance-group-1-ptb0 VM instance has serial port access enabled. Due to security and compliance regulations, ensure the serial port access is disabled for all your VM instances. More info
Compute Engine Medium CIS 4.6 PCI DSS 4.2.1 us-central1 instance-group-1-ptb0 VM instance has IP forwarding enabled. For security and compliance reasons, as instances with IP Forwarding enabled act as routers/packet forwarders, delete the VM instances with IP forwarding enabled and redeploy them with IP forwarding disabled. More info
Compute Engine Medium CIS 4.8 us-central1 instance-group-1-ptb0 VM instance has Shielded VM security feature disabled. For protection against rootkits and bootkits, ensure that your VM instances are configured to use Shielded VM security feature. More info
Compute Engine Medium CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) us-central1 disk-1 Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. More info
Compute Engine Medium us-central1 disk-1 Disk is not in use. To avoid unnecessary billing, ensure there are no unused Compute disks. More info
Compute Engine Medium us-central1 instance-group-1-ptb0 Disk has no snapshot schedule configured. To periodically backup data from your persistent disks, ensure that Compute disks have scheduled snapshots configured. More info
Compute Engine Medium us-central1 instance-group-1-ptb0 Disk has regional disk replication disabled. For high availability in case of a zonal outage, ensure that Compute disks have regional disk replication feature enabled. More info
Compute Engine Medium CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) us-central1 gke-cluster-1-default-pool-fc104738-2sxd Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. More info
Compute Engine Medium us-central1 gke-cluster-1-default-pool-fc104738-2sxd Disk has no snapshot schedule configured. To periodically backup data from your persistent disks, ensure that Compute disks have scheduled snapshots configured. More info
Compute Engine Medium us-central1 gke-cluster-1-default-pool-fc104738-2sxd Disk has regional disk replication disabled. For high availability in case of a zonal outage, ensure that Compute disks have regional disk replication feature enabled. More info
Compute Engine Medium CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) us-central1 gke-cluster-1-default-pool-fc104738-427b Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. More info
Compute Engine Medium us-central1 gke-cluster-1-default-pool-fc104738-427b Disk has no snapshot schedule configured. To periodically backup data from your persistent disks, ensure that Compute disks have scheduled snapshots configured. More info
Compute Engine Medium us-central1 gke-cluster-1-default-pool-fc104738-427b Disk has regional disk replication disabled. For high availability in case of a zonal outage, ensure that Compute disks have regional disk replication feature enabled. More info
Compute Engine Medium CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) us-central1 gke-cluster-1-default-pool-fc104738-dlsn Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. More info
Compute Engine Medium us-central1 gke-cluster-1-default-pool-fc104738-dlsn Disk has no snapshot schedule configured. To periodically backup data from your persistent disks, ensure that Compute disks have scheduled snapshots configured. More info
Compute Engine Medium us-central1 gke-cluster-1-default-pool-fc104738-dlsn Disk has regional disk replication disabled. For high availability in case of a zonal outage, ensure that Compute disks have regional disk replication feature enabled. More info
Compute Engine Medium CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) us-central1 mysql-5-7-secured-by-sg-1-vm Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. More info
Compute Engine Medium us-central1 mysql-5-7-secured-by-sg-1-vm Disk has no snapshot schedule configured. To periodically backup data from your persistent disks, ensure that Compute disks have scheduled snapshots configured. More info
Compute Engine Medium us-central1 mysql-5-7-secured-by-sg-1-vm Disk has regional disk replication disabled. For high availability in case of a zonal outage, ensure that Compute disks have regional disk replication feature enabled. More info
Compute Engine Medium CIS 4.7 PCI DSS 3.5 HIPAA (Encryption) us-central1 mysql-5-7-secured-by-sg-1-vm-disk1 Disk is not encrypted with Customer-Supplied Encryption Keys (CSEKs). To fulfill HIPAA and PCI DSS compliance requirements for encryption of data at rest, re-deploy a new Compute disk with CSEKs enabled, then delete the old non-encrypted disk. More info
Compute Engine Medium us-central1 mysql-5-7-secured-by-sg-1-vm-disk1 Disk has no snapshot schedule configured. To periodically backup data from your persistent disks, ensure that Compute disks have scheduled snapshots configured. More info
Compute Engine Medium us-central1 mysql-5-7-secured-by-sg-1-vm-disk1 Disk has regional disk replication disabled. For high availability in case of a zonal outage, ensure that Compute disks have regional disk replication feature enabled. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) us-east1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium us-east1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) us-east4 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium us-east4 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) us-west1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium us-west1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) us-west2 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium us-west2 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) us-west3 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium us-west3 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) us-west4 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium us-west4 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) us-central1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) northamerica-northeast1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium northamerica-northeast1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) northamerica-northeast2 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium northamerica-northeast2 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) southamerica-east1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium southamerica-east1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) southamerica-west1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium southamerica-west1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) europe-west1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium europe-west1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) europe-west2 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium europe-west2 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) europe-west3 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium europe-west3 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) europe-west4 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium europe-west4 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) europe-west6 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium europe-west6 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) europe-north1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium europe-north1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) europe-central2 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium europe-central2 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) asia-south1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium asia-south1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) asia-south2 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium asia-south2 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) asia-southeast1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium asia-southeast1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) asia-southeast2 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium asia-southeast2 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) asia-east1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium asia-east1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) asia-east2 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium asia-east2 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) asia-northeast1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium asia-northeast1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) asia-northeast2 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium asia-northeast2 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) asia-northeast3 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium asia-northeast3 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) australia-southeast1 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium australia-southeast1 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium australia-southeast1 vpc-subnetwork-test VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.8 PCI DSS 10.2 HIPAA (Audit) australia-southeast2 default VPC subnet has VPC flow logs disabled. To fulfill HIPAA and PCI DSS compliance requirements for logging of all network access to environments containing sensitive data, ensure that VPC Flow Logs is enabled for every subnet created within your VPC network. More info
VPC Network Medium australia-southeast2 default VPC subnet does not have Private Google Access enabled. To createe a more secure network that allows VM instances on a subnet to reach Google APIs and services without an IP address, ensure Private Google Access is enabled for all subnets. More info
VPC Network Medium CIS 3.1 global default Default VPC network is in use by 7 compute VM instances. To follow best security practices and networking requirements, make sure your projects are not using the default Virtual Private Cloud (VPC) network. More info
VPC Network Medium global default VPC network has firewall metadata logging enabled. To reduce the size of the log files and optimize cloud storage costs, ensure that VPC firewall logging is not configured to include logging metadata. More info
SQL Medium CIS 6.1.1 global my-sql-instance SQL database instance can be accessed by the root user from any host. To ensure secure access, limit root access to SQL instances to allowed IPs only. More info
SQL Medium global my-sql-instance SQL database instance is publicly accessible from all IP addresses. To fulfill HIPAA and PCI DSS requirements on strict access and integrity controls, ensure that all SQL instances are configured to accept connections from trusted networks and IP addresses only. More info
SQL Medium HIPAA (Backup) global my-sql-instance SQL database instance has no backup run, and so it can not be restored to a recent point. To fulfill HIPAA requirements on restoring compromised services, ensure that all SQL instances are configured to have automated (scheduled) backups and can be restored to a recent point. More info
SQL Medium CIS 6.7 global my-sql-instance SQL database instance does not have an automated backup enabled. Ensure that automated backups are enabled for all SQL database instances. More info
SQL Medium global my-sql-instance SQL database instance does not have multi-AZ enabled. Ensure that all SQL instances are created with a secondary AZ to ensure proper failover. More info
SQL Medium CIS 6.4 PCI DSS 4.2 HIPAA (Encryption) global my-sql-instance SQL database instance has SSL/TLS disabled. To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enforce all incoming connections to your SQL database instances to use SSL/TLS only. More info
SQL Medium CIS 6.1.3 global my-sql-instance MySQL database instance has "local_infile" flag enabled. To follow best practices on data security, ensure all your MySQL database instances have the "local_infile" flag disabled. More info
SQL Medium global my-sql-instance MySQL database instance has "slow_query_log" flag disabled. To simplify the task of finding inefficient or time-consuming SQL queries, ensure all your MySQL database instances have the "slow_query_log" flag enabled. More info
SQL Medium CIS 6.6 global my-sql-instance SQL database instance has public IPs. To reduce the application's attack surface, ensure your SQL database instances are configured to use private IP addresses instead of public IPs. More info
SQL Medium global my-sql-instance3 SQL database instance is publicly accessible from all IP addresses. To fulfill HIPAA and PCI DSS requirements on strict access and integrity controls, ensure that all SQL instances are configured to accept connections from trusted networks and IP addresses only. More info
SQL Medium HIPAA (Backup) global my-sql-instance3 SQL database instance has no backup run, and so it can not be restored to a recent point. To fulfill HIPAA requirements on restoring compromised services, ensure that all SQL instances are configured to have automated (scheduled) backups and can be restored to a recent point. More info
SQL Medium CIS 6.7 global my-sql-instance3 SQL database instance does not have an automated backup enabled. Ensure that automated backups are enabled for all SQL database instances. More info
SQL Medium global my-sql-instance3 SQL database instance does not have multi-AZ enabled. Ensure that all SQL instances are created with a secondary AZ to ensure proper failover. More info
SQL Medium CIS 6.4 PCI DSS 4.2 HIPAA (Encryption) global my-sql-instance3 SQL database instance has SSL/TLS disabled. To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enforce all incoming connections to your SQL database instances to use SSL/TLS only. More info
SQL Medium global my-sql-instance3 PostgreSQL database instance has "log_checkpoints" flag disabled. To allow checkpoints and restart points to be logged, ensure all your PostgreSQL database instances have the "log_checkpoints" flag enabled. More info
SQL Medium CIS 6.2.2 global my-sql-instance3 PostgreSQL database instance has "log_connections" flag disabled. To ensure each attempted connection to the database instance to be logged, ensure all your PostgreSQL database instances have the "log_connections" flag enabled. More info
SQL Medium CIS 6.2.3 global my-sql-instance3 PostgreSQL database instance has "log_disconnections" flag disabled. To ensure the database logs the end of each session, ensure all your PostgreSQL database instances have the "log_disconnections" flag enabled. More info
SQL Medium global my-sql-instance3 PostgreSQL database instance has "log_lock_waits" flag disabled. To diagnose poor performance due to locking delays and identify underlying security and performance issues, ensure all your PostgreSQL database instances have the "log_lock_waits" flag enabled. More info
SQL Medium CIS 6.2.8 global my-sql-instance3 PostgreSQL database instance has "log_min_duration_statement" flag enabled. To avoid logging statements with sensitive information, ensure all your PostgreSQL database instances have the "log_min_duration_statement" flag set to -1 (i.e. disabled). More info
SQL Medium CIS 6.2.7 global my-sql-instance3 PostgreSQL database instance does not have "log_min_error_statement" flag set to Error. As the best practice setting, ensure all your PostgreSQL database instances have the "log_min_error_statement" flag (the minimum message severity level considered an error statement) to be set to Error (or stricter). More info
SQL Medium global my-sql-instance3 PostgreSQL database instance has "log_temp_files" flag disabled. To diagnose potential performance issues that can be created by poor programming practices, ensure all your PostgreSQL database instances have the "log_temp_files" flag set to 0 (enabled). More info
SQL Medium CIS 6.6 global my-sql-instance3 SQL database instance has public IPs. To reduce the application's attack surface, ensure your SQL database instances are configured to use private IP addresses instead of public IPs. More info
SQL Medium global my-sql-instance4 SQL database instance is publicly accessible from all IP addresses. To fulfill HIPAA and PCI DSS requirements on strict access and integrity controls, ensure that all SQL instances are configured to accept connections from trusted networks and IP addresses only. More info
SQL Medium HIPAA (Backup) global my-sql-instance4 SQL database instance has no backup run, and so it can not be restored to a recent point. To fulfill HIPAA requirements on restoring compromised services, ensure that all SQL instances are configured to have automated (scheduled) backups and can be restored to a recent point. More info
SQL Medium CIS 6.7 global my-sql-instance4 SQL database instance does not have an automated backup enabled. Ensure that automated backups are enabled for all SQL database instances. More info
SQL Medium global my-sql-instance4 SQL database instance does not have multi-AZ enabled. Ensure that all SQL instances are created with a secondary AZ to ensure proper failover. More info
SQL Medium CIS 6.4 PCI DSS 4.2 HIPAA (Encryption) global my-sql-instance4 SQL database instance has SSL/TLS disabled. To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enforce all incoming connections to your SQL database instances to use SSL/TLS only. More info
SQL Medium CIS 6.3.7 global my-sql-instance4 SQL server database instance has "contained database authentication" flag enabled. To prevent any databases on the server from being contained, ensure the "contained database authentication" SQL Server engine flag is set to Off. More info
SQL Medium CIS 6.3.2 global my-sql-instance4 SQL server database instance has "cross db ownership chaining" flag enabled. Unless all of the databases hosted by the SQL Server need to participate in cross-database ownership chaining, ensure the "cross db ownership chaining" SQL Server engine flag is disabled. More info
SQL Medium CIS 6.6 global my-sql-instance4 SQL database instance has public IPs. To reduce the application's attack surface, ensure your SQL database instances are configured to use private IP addresses instead of public IPs. More info
Cloud Storage Medium global gcf-sources-853160546542-us-central1 Storage bucket does not use lifecycle management rules to manage objects during their lifetime. To optimize your data for storage costs, make sure your storage buckets are using lifecycle management rules to manage objects during their lifetime. More info
Cloud Storage Medium PCI DSS 10.2 HIPAA (Audit) global gcf-sources-853160546542-us-central1 Storage bucket has no logging enabled. To fulfill HIPAA requirements for logging of all activity including access and actions taken, enable logging for your storage buckets by using "gsutil logging set on" command More info
Cloud Storage Medium CIS 2.3 global gcf-sources-853160546542-us-central1 Storage bucket has no retention policy. For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. More info
Cloud Storage Medium global gcf-sources-853160546542-us-central1 Storage bucket does not have object versioning enabled. To protect your object data from being overwritten or accidentally deleted, ensure that object versioning is enabled for all your storage buckets. More info
Cloud Storage Medium global prevasio-test-bucket Storage bucket does not use lifecycle management rules to manage objects during their lifetime. To optimize your data for storage costs, make sure your storage buckets are using lifecycle management rules to manage objects during their lifetime. More info
Cloud Storage Medium PCI DSS 10.2 HIPAA (Audit) global prevasio-test-bucket Storage bucket has no logging enabled. To fulfill HIPAA requirements for logging of all activity including access and actions taken, enable logging for your storage buckets by using "gsutil logging set on" command More info
Cloud Storage Medium CIS 2.3 global prevasio-test-bucket Storage bucket has no retention policy. For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. More info
Cloud Storage Medium global prevasio-test-bucket Storage bucket does not have object versioning enabled. To protect your object data from being overwritten or accidentally deleted, ensure that object versioning is enabled for all your storage buckets. More info
Cloud Storage Medium PCI DSS 10.2 HIPAA (Audit) global staging.sylvan-surf-339107.appspot.com Storage bucket has no logging enabled. To fulfill HIPAA requirements for logging of all activity including access and actions taken, enable logging for your storage buckets by using "gsutil logging set on" command More info
Cloud Storage Medium CIS 2.3 global staging.sylvan-surf-339107.appspot.com Storage bucket has no retention policy. For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. More info
Cloud Storage Medium CIS 5.2 global staging.sylvan-surf-339107.appspot.com Storage bucket does not have uniform bucket-level access enabled. To ensure uniform access to all the objects within a storage bucket. ensure that uniform bucket-level access is enabled for all your storage buckets. More info
Cloud Storage Medium global staging.sylvan-surf-339107.appspot.com Storage bucket does not have object versioning enabled. To protect your object data from being overwritten or accidentally deleted, ensure that object versioning is enabled for all your storage buckets. More info
Cloud Storage Medium global sylvan-surf-339107.appspot.com Storage bucket does not use lifecycle management rules to manage objects during their lifetime. To optimize your data for storage costs, make sure your storage buckets are using lifecycle management rules to manage objects during their lifetime. More info
Cloud Storage Medium PCI DSS 10.2 HIPAA (Audit) global sylvan-surf-339107.appspot.com Storage bucket has no logging enabled. To fulfill HIPAA requirements for logging of all activity including access and actions taken, enable logging for your storage buckets by using "gsutil logging set on" command More info
Cloud Storage Medium CIS 2.3 global sylvan-surf-339107.appspot.com Storage bucket has no retention policy. For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. More info
Cloud Storage Medium CIS 5.2 global sylvan-surf-339107.appspot.com Storage bucket does not have uniform bucket-level access enabled. To ensure uniform access to all the objects within a storage bucket. ensure that uniform bucket-level access is enabled for all your storage buckets. More info
Cloud Storage Medium global sylvan-surf-339107.appspot.com Storage bucket does not have object versioning enabled. To protect your object data from being overwritten or accidentally deleted, ensure that object versioning is enabled for all your storage buckets. More info
Cloud Storage Medium CIS 5.1 global us.artifacts.sylvan-surf-339107.appspot.com Storage bucket has anonymous and/or public access. To prevent access from anonymous and/or public users, make sure the allUsers and allAuthenticatedUsers are removed from IAM policy for all storage bucket. More info
Cloud Storage Medium CIS 2.3 global us.artifacts.sylvan-surf-339107.appspot.com Storage bucket retention has expired 50 days ago. For security and compliance purposes, ensure that the objects stored within your storage buckets have a sufficient data retention period. More info
Cloud Storage Medium CIS 5.2 global us.artifacts.sylvan-surf-339107.appspot.com Storage bucket does not have uniform bucket-level access enabled. To ensure uniform access to all the objects within a storage bucket. ensure that uniform bucket-level access is enabled for all your storage buckets. More info
Medium severity private container images (0)
Repository Image name Image tag Region Image size Pushed at Latest Vulnerabilities Alerts Action
Medium severity public container images (0)
Repository Image name Image tag Region Image size Pushed at Latest Vulnerabilities Alerts Action