From 14ffbd86f5443b864a059bc1bba30c802bdb611f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Thu, 23 Oct 2025 23:23:02 +0530 Subject: [PATCH] updated tags --- cloud/alibaba/ack/ack-cluster-api-public.yaml | 2 +- cloud/alibaba/ack/ack-cluster-auditing-disable.yaml | 2 +- cloud/alibaba/ack/ack-cluster-cloud-monitor-disable.yaml | 2 +- cloud/alibaba/ack/ack-cluster-health-disable.yaml | 2 +- cloud/alibaba/ack/ack-cluster-network-policies-disable.yaml | 2 +- cloud/alibaba/ack/ack-cluster-network-policies-missing.yaml | 2 +- cloud/alibaba/ack/kubernetes-dashboard-enabled.yaml | 2 +- cloud/alibaba/actiontrail/multi-region-logging-disabled.yaml | 2 +- cloud/alibaba/actiontrail/public-actiontrail-bucket.yaml | 2 +- cloud/alibaba/alibaba-cloud-code-env.yaml | 2 +- cloud/alibaba/ecs/os-patches-outdated.yaml | 2 +- cloud/alibaba/ecs/unattached-disk-encryption-disabled.yaml | 2 +- .../ecs/unattached-vminstance-encryption-disabled.yaml | 2 +- cloud/alibaba/ecs/unrestricted-rdp-access.yaml | 2 +- cloud/alibaba/ecs/unrestricted-ssh-access.yaml | 2 +- cloud/alibaba/oss/access-logoss-disabled.yaml | 2 +- cloud/alibaba/oss/improper-bucket-sse.yaml | 2 +- cloud/alibaba/oss/limit-networkaccess-disabled.yaml | 2 +- cloud/alibaba/oss/oos-bucket-public-access.yaml | 2 +- cloud/alibaba/oss/secure-transfeross-disabled.yaml | 2 +- cloud/alibaba/oss/sse-cmk-disabled.yaml | 2 +- cloud/alibaba/oss/sse-smk-disabled.yaml | 2 +- cloud/alibaba/ram/custom-ram-policy-admin-priv.yaml | 2 +- cloud/alibaba/ram/max-password-retry-disabled.yaml | 2 +- cloud/alibaba/ram/mfa-console-password-disabled.yaml | 2 +- .../alibaba/ram/password-policy-expiration-unconfigured.yaml | 2 +- cloud/alibaba/ram/password-policy-length-unconfigured.yaml | 2 +- cloud/alibaba/ram/password-policy-lowercase-unconfigured.yaml | 2 +- cloud/alibaba/ram/password-policy-num-unconfigured.yaml | 2 +- cloud/alibaba/ram/password-policy-reuse-enabled.yaml | 2 +- cloud/alibaba/ram/password-policy-symbol-unconfigured.yaml | 2 +- cloud/alibaba/ram/password-policy-uppercase-unconfigured.yaml | 2 +- cloud/alibaba/rds/encryption-intransit-disabled.yaml | 2 +- cloud/alibaba/rds/log-connections-disabled.yaml | 2 +- cloud/alibaba/rds/log-disconnections-disabled.yaml | 2 +- cloud/alibaba/rds/log-duration-disabled.yaml | 2 +- cloud/alibaba/rds/mssql-audit-disabled.yaml | 2 +- cloud/alibaba/rds/mysql-audit-disabled.yaml | 2 +- cloud/alibaba/rds/postgresql-audit-disabled.yaml | 2 +- cloud/alibaba/rds/rds-audit-disabled.yaml | 2 +- cloud/alibaba/rds/transparent-encryption-disabled.yaml | 2 +- .../alibaba/security-center/scheduled-vulnscan-disabled.yaml | 2 +- .../security-center/security-notification-disabled.yaml | 2 +- cloud/alibaba/security-center/security-plan-disabled.yaml | 2 +- cloud/alibaba/vpc/vpc-flow-disabled.yaml | 2 +- cloud/aws/acm/acm-cert-expired.yaml | 2 +- cloud/aws/acm/acm-cert-renewal-30days.yaml | 2 +- cloud/aws/acm/acm-cert-renewal-45days.yaml | 2 +- cloud/aws/acm/acm-cert-validation.yaml | 2 +- cloud/aws/acm/acm-wildcard-cert.yaml | 2 +- cloud/aws/aws-code-env.yaml | 2 +- cloud/aws/cloudformation/stack-notification-disabled.yaml | 2 +- cloud/aws/cloudformation/stack-policy-not-inuse.yaml | 2 +- cloud/aws/cloudformation/stack-termination-disabled.yaml | 2 +- cloud/aws/cloudfront/cloudfront-compress-object.yaml | 2 +- cloud/aws/cloudfront/cloudfront-custom-certificates.yaml | 2 +- cloud/aws/cloudfront/cloudfront-geo-restriction.yaml | 2 +- cloud/aws/cloudfront/cloudfront-insecure-protocol.yaml | 2 +- cloud/aws/cloudfront/cloudfront-integrated-waf.yaml | 2 +- cloud/aws/cloudfront/cloudfront-logging-disabled.yaml | 2 +- cloud/aws/cloudfront/cloudfront-origin-shield.yaml | 2 +- cloud/aws/cloudfront/cloudfront-security-policy.yaml | 2 +- cloud/aws/cloudfront/cloudfront-traffic-unencrypted.yaml | 2 +- cloud/aws/cloudfront/cloudfront-viewer-policy.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-data-events.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-disabled.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-dup-logs.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-global-disabled.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-integrated-cloudwatch.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-log-integrity.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-logs-not-encrypted.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-mfa-delete.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-mgmt-events.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-public-buckets.yaml | 2 +- cloud/aws/cloudtrail/cloudtrail-s3-bucket-logging.yaml | 2 +- cloud/aws/cloudtrail/s3-object-lock-not-enabled.yaml | 2 +- cloud/aws/cloudwatch/cw-alarm-action-set.yaml | 2 +- cloud/aws/cloudwatch/cw-alarms-actions.yaml | 2 +- cloud/aws/dms/dms-multi-az.yaml | 2 +- cloud/aws/dms/dms-public-access.yaml | 2 +- cloud/aws/dms/dms-version-upgrade.yaml | 2 +- cloud/aws/ebs/ebs-encryption-disabled.yaml | 2 +- cloud/aws/ec2/ec2-imdsv2.yaml | 2 +- cloud/aws/ec2/ec2-public-ip.yaml | 2 +- cloud/aws/ec2/ec2-sg-egress-open.yaml | 2 +- cloud/aws/ec2/ec2-sg-ingress.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-cifs.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-dns.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-ftp.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-http.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-https.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-icmp.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-memcached.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-mongodb.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-mssql.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-mysql.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-netbios.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-opensearch.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-oracle.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-pgsql.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-rdp.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-redis.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-smtp.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-ssh.yaml | 2 +- cloud/aws/ec2/ec2-unrestricted-telnet.yaml | 2 +- cloud/aws/ec2/publicly-shared-ami.yaml | 2 +- cloud/aws/ec2/unencrypted-aws-ami.yaml | 2 +- cloud/aws/efs/efs-encryption-disabled.yaml | 2 +- cloud/aws/eks/eks-aws-managed-iam-policy.yaml | 2 +- cloud/aws/eks/eks-cluster-logging.yaml | 2 +- cloud/aws/eks/eks-endpoint-access.yaml | 2 +- cloud/aws/eks/eks-iam-managed-policy-networking.yaml | 2 +- cloud/aws/eks/eks-kubernetes-secrets-encryption.yaml | 2 +- cloud/aws/eks/eks-logging-kubes-api-calls.yaml | 2 +- cloud/aws/eks/eks-long-running-pods.yaml | 2 +- cloud/aws/eks/eks-managed-policy-ecr-access.yaml | 2 +- cloud/aws/eks/eks-node-group-remote-access.yaml | 2 +- cloud/aws/elasticache/cache-automatic-backups-disabled.yaml | 2 +- cloud/aws/elasticache/cache-event-notification-disabled.yaml | 2 +- cloud/aws/elasticache/cache-redis-encryption-disabled.yaml | 2 +- cloud/aws/elasticache/cache-redis-multiaz-disabled.yaml | 2 +- cloud/aws/elb/elb-delete-protection-disabled.yaml | 2 +- .../aws/firehose/firehose-server-destination-encryption.yaml | 2 +- cloud/aws/firehose/firehose-server-side-encryption.yaml | 2 +- cloud/aws/guardduty/guardduty-findings.yaml | 2 +- cloud/aws/guardduty/guardduty-not-enabled.yaml | 2 +- cloud/aws/guardduty/malware-protection-disabled.yaml | 2 +- cloud/aws/guardduty/s3-protection-disabled.yaml | 2 +- cloud/aws/iam/iam-access-analyzer.yaml | 2 +- cloud/aws/iam/iam-expired-ssl.yaml | 2 +- cloud/aws/iam/iam-full-admin-privileges.yaml | 2 +- cloud/aws/iam/iam-key-rotation-90days.yaml | 2 +- cloud/aws/iam/iam-mfa-enable.yaml | 2 +- cloud/aws/iam/iam-password-policy.yaml | 2 +- cloud/aws/iam/iam-root-mfa.yaml | 2 +- cloud/aws/iam/iam-ssh-keys-rotation.yaml | 2 +- cloud/aws/iam/iam-unapproved-policy.yaml | 2 +- cloud/aws/iam/iam-user-password-change.yaml | 2 +- cloud/aws/iam/ssl-cert-renewal.yaml | 2 +- cloud/aws/inspector2/inspector2-disabled.yaml | 2 +- cloud/aws/rds/aurora-copy-tags-snap.yaml | 2 +- cloud/aws/rds/aurora-delete-protect.yaml | 2 +- cloud/aws/rds/iam-db-auth.yaml | 2 +- cloud/aws/rds/rds-auto-minor-upgrade-disabled.yaml | 2 +- cloud/aws/rds/rds-automated-backup-disabled.yaml | 2 +- cloud/aws/rds/rds-backtrack-disabled.yaml | 2 +- cloud/aws/rds/rds-backup-enable.yaml | 2 +- cloud/aws/rds/rds-cluster-protection-disabled.yaml | 2 +- cloud/aws/rds/rds-copy-snap.yaml | 2 +- cloud/aws/rds/rds-deletion-protection.yaml | 2 +- cloud/aws/rds/rds-encryption-check.yaml | 2 +- cloud/aws/rds/rds-event-notify.yaml | 2 +- cloud/aws/rds/rds-event-sub-enable.yaml | 2 +- cloud/aws/rds/rds-event-sub.yaml | 2 +- cloud/aws/rds/rds-gp-ssd-usage.yaml | 2 +- cloud/aws/rds/rds-insights-disabled.yaml | 2 +- cloud/aws/rds/rds-instance-autoscaling-disabled.yaml | 2 +- cloud/aws/rds/rds-log-export-disabled.yaml | 2 +- cloud/aws/rds/rds-multi-az.yaml | 2 +- cloud/aws/rds/rds-public-access.yaml | 2 +- cloud/aws/rds/rds-public-snapshot.yaml | 2 +- cloud/aws/rds/rds-public-subnet.yaml | 2 +- cloud/aws/rds/rds-ri-payment-fail.yaml | 2 +- cloud/aws/rds/rds-snapshot-encryption.yaml | 2 +- cloud/aws/route53/route53-dns-query-disabled.yaml | 2 +- cloud/aws/route53/route53-dnssec-signing-disabled.yaml | 2 +- cloud/aws/s3/s3-access-logging.yaml | 2 +- cloud/aws/s3/s3-auth-fullcontrol.yaml | 2 +- cloud/aws/s3/s3-bucket-key.yaml | 2 +- cloud/aws/s3/s3-bucket-policy-public-access.yaml | 2 +- cloud/aws/s3/s3-mfa-delete-check.yaml | 2 +- cloud/aws/s3/s3-public-read-acp.yaml | 2 +- cloud/aws/s3/s3-public-read.yaml | 2 +- cloud/aws/s3/s3-public-write-acp.yaml | 2 +- cloud/aws/s3/s3-public-write.yaml | 2 +- cloud/aws/s3/s3-server-side-encryption.yaml | 2 +- cloud/aws/s3/s3-versioning.yaml | 2 +- cloud/aws/secrets-manager/secret-manager-not-inuse.yaml | 2 +- cloud/aws/secrets-manager/secret-rotation-interval.yaml | 2 +- cloud/aws/secrets-manager/secrets-rotation-disabled.yaml | 2 +- cloud/aws/sns/sns-public-subscribe-access.yaml | 2 +- cloud/aws/sns/sns-topic-public-accessible.yaml | 2 +- cloud/aws/sqs/sqs-deadletter-disabled.yaml | 2 +- cloud/aws/sqs/sqs-encryption-disabled.yaml | 2 +- cloud/aws/sqs/sqs-queue-exposed.yaml | 2 +- cloud/aws/vpc/nacl-open-inbound.yaml | 2 +- cloud/aws/vpc/nacl-outbound-restrict.yaml | 2 +- cloud/aws/vpc/nat-gateway-usage.yaml | 2 +- cloud/aws/vpc/unrestricted-admin-ports.yaml | 2 +- cloud/aws/vpc/vpc-endpoint-exposed.yaml | 2 +- cloud/aws/vpc/vpc-endpoints-not-deployed.yaml | 2 +- cloud/aws/vpc/vpc-flowlogs-not-enabled.yaml | 2 +- cloud/aws/vpc/vpn-tunnel-down.yaml | 2 +- .../accesscontrol/azure-custom-admin-role-unrestricted.yaml | 2 +- .../accesscontrol/azure-custom-owner-role-unrestricted.yaml | 2 +- .../azure-iam-role-resource-lock-unassigned.yaml | 2 +- .../azure-entra-id-guest-users-unmonitored.yaml | 2 +- .../azure-mfa-not-enabled-privileged-users.yaml | 2 +- cloud/azure/activitylog/azure-db-mysql-delete-unalerted.yaml | 2 +- .../azure/activitylog/azure-delete-lb-alert-unconfigured.yaml | 2 +- cloud/azure/activitylog/azure-key-vault-delete-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-keyvault-update-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-lb-create-update-missing.yaml | 2 +- cloud/azure/activitylog/azure-mysql-db-update-unalerted.yaml | 2 +- .../azure/activitylog/azure-nsg-create-update-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-nsg-delete-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-nsg-rule-delete-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-nsg-rule-update-unalerted.yaml | 2 +- .../azure-policy-assignment-create-alert-missing.yaml | 2 +- .../activitylog/azure-policy-assignment-delete-unalerted.yaml | 2 +- .../activitylog/azure-postgresql-db-delete-unalerted.yaml | 2 +- .../activitylog/azure-postgresql-db-update-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-public-ip-delete-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-public-ip-update-unalerted.yaml | 2 +- .../activitylog/azure-security-policy-update-unalerted.yaml | 2 +- .../activitylog/azure-security-solution-delete-unalerted.yaml | 2 +- .../azure-security-solutions-update-unalerted.yaml | 2 +- .../activitylog/azure-sql-database-rename-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-sql-db-update-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-sql-delete-db-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-sql-fw-rule-unalerted.yaml | 2 +- .../activitylog/azure-storage-account-delete-unalerted.yaml | 2 +- .../activitylog/azure-storage-account-update-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-vm-create-update-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-vm-deallocate-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-vm-delete-unalerted.yaml | 2 +- cloud/azure/activitylog/azure-vm-poweroff-unalerted.yaml | 2 +- cloud/azure/aiservices/azure-openai-cmk-not-enabled.yaml | 2 +- .../aiservices/azure-openai-managed-identity-not-used.yaml | 2 +- .../azure-openai-private-endpoints-unconfigured.yaml | 2 +- .../azure/aiservices/azure-openai-public-access-disabled.yaml | 2 +- cloud/azure/aks/azure-aks-api-unrestricted.yaml | 2 +- cloud/azure/aks/azure-aks-api-version-not-latest.yaml | 2 +- cloud/azure/aks/azure-aks-cni-not-configured.yaml | 2 +- cloud/azure/aks/azure-aks-entra-id-unintegrated.yaml | 2 +- cloud/azure/aks/azure-aks-kubernetes-version-outdated.yaml | 2 +- cloud/azure/aks/azure-aks-managed-identity-unassigned.yaml | 2 +- cloud/azure/aks/azure-aks-network-contrib-unassigned.yaml | 2 +- cloud/azure/aks/azure-aks-not-user-assigned.yaml | 2 +- cloud/azure/aks/azure-aks-rbac-unconfigured.yaml | 2 +- cloud/azure/aks/azure-aks-use-private-kv.yaml | 2 +- cloud/azure/apimanagement/azure-apim-http2-not-enabled.yaml | 2 +- .../apimanagement/azure-apim-https-enforcement-missing.yaml | 2 +- .../azure/apimanagement/azure-apim-nv-plaintext-exposure.yaml | 2 +- .../apimanagement/azure-apim-public-access-disabled.yaml | 2 +- .../azure-apim-resource-logs-not-configured.yaml | 2 +- .../azure-apim-system-assigned-identity-unconfigured.yaml | 2 +- cloud/azure/apimanagement/azure-apim-tls-config-weak.yaml | 2 +- .../apimanagement/azure-apim-user-assigned-id-not-used.yaml | 2 +- .../azure/appservice/azure-appservice-always-on-disabled.yaml | 2 +- cloud/azure/appservice/azure-appservice-auth-disabled.yaml | 2 +- .../azure/appservice/azure-appservice-backup-not-enabled.yaml | 2 +- .../appservice/azure-appservice-backup-retention-missing.yaml | 2 +- .../appservice/azure-appservice-client-cert-disabled.yaml | 2 +- cloud/azure/appservice/azure-appservice-entra-id-missing.yaml | 2 +- .../appservice/azure-appservice-ftp-deployment-disabled.yaml | 2 +- .../appservice/azure-appservice-ftps-only-not-enabled.yaml | 2 +- .../azure/appservice/azure-appservice-http2-not-enabled.yaml | 2 +- .../appservice/azure-appservice-https-only-not-enforced.yaml | 2 +- .../appservice/azure-appservice-insights-not-enabled.yaml | 2 +- .../appservice/azure-appservice-remote-debugging-enabled.yaml | 2 +- .../azure-appservice-tls-latest-version-missing.yaml | 2 +- cloud/azure/azure-env.yaml | 2 +- .../azure/cosmosdb/azure-cosmosdb-auto-failover-missing.yaml | 2 +- .../azure-cosmosdb-default-network-access-unrestricted.yaml | 2 +- .../functions/azure-functionapp-access-keys-missing.yaml | 2 +- cloud/azure/functions/azure-functionapp-admin-privileges.yaml | 2 +- .../functions/azure-functionapp-appinsights-missing.yaml | 2 +- cloud/azure/functions/azure-functionapp-public-exposure.yaml | 2 +- .../functions/azure-functionapp-system-assigned-missing.yaml | 2 +- .../functions/azure-functionapp-user-assigned-id-missing.yaml | 2 +- .../functions/azure-functionapp-vnet-integration-missing.yaml | 2 +- cloud/azure/keyvault/azure-app-tier-cmk-untagged.yaml | 2 +- cloud/azure/keyvault/azure-database-tier-cmk-absent.yaml | 2 +- cloud/azure/keyvault/azure-keyvault-audit-not-enabled.yaml | 2 +- .../keyvault/azure-keyvault-cert-keytype-unapproved.yaml | 2 +- .../keyvault/azure-keyvault-cert-transparency-missing.yaml | 2 +- .../azure-keyvault-certificate-insufficient-autorenew.yaml | 2 +- cloud/azure/keyvault/azure-keyvault-network-unrestricted.yaml | 2 +- .../keyvault/azure-keyvault-recoverability-unconfigured.yaml | 2 +- .../keyvault/azure-keyvault-ssl-autorenewal-missing.yaml | 2 +- .../keyvault/azure-keyvault-trusted-ms-unrestricted.yaml | 2 +- cloud/azure/locks/azure-keyvault-resource-lock-check.yaml | 2 +- cloud/azure/monitor/azure-diag-logs-not-enabled.yaml | 2 +- .../monitor/azure-diagnostic-categories-misconfigured.yaml | 2 +- cloud/azure/monitor/azure-log-profile-all-activities.yaml | 2 +- .../azure/monitor/azure-monitor-diagnostic-unrestricted.yaml | 2 +- cloud/azure/network/azure-network-watcher.yaml | 2 +- cloud/azure/network/azure-nic-ip-forwarding-check.yaml | 2 +- cloud/azure/network/azure-nsg-cifs-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-dns-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-ftp-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-http-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-https-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-icmp-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-mongodb-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-mssql-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-mysql-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-netbios-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-oracle-db-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-postgresql-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-rdp-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-rpc-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-smtp-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-ssh-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-telnet-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-udp-unrestricted.yaml | 2 +- cloud/azure/network/azure-nsg-unrestricted-port-range.yaml | 2 +- cloud/azure/network/azure-vnet-ddos-protection.yaml | 2 +- .../azure-postgres-allow-azure-services-disabled.yaml | 2 +- .../azure-postgres-connection-throttling-disabled.yaml | 2 +- .../postgresql/azure-postgres-double-encryption-disabled.yaml | 2 +- .../postgresql/azure-postgres-log-checkpoints-disabled.yaml | 2 +- .../postgresql/azure-postgres-log-connections-disabled.yaml | 2 +- .../azure-postgres-log-disconnections-disabled.yaml | 2 +- .../postgresql/azure-postgres-log-duration-disabled.yaml | 2 +- .../postgresql/azure-postgresql-geo-backup-disabled.yaml | 2 +- cloud/azure/postgresql/azure-postgresql-ssl-enforcement.yaml | 2 +- .../azure-postgresql-storage-autogrow-disabled.yaml | 2 +- cloud/azure/redis/azure-redis-nonssl-port-disabled.yaml | 2 +- cloud/azure/redis/azure-redis-tls-version-outdated.yaml | 2 +- .../azure-search-service-managed-identity-disabled.yaml | 2 +- .../azure-defender-auto-provisioning-disabled.yaml | 2 +- .../servicebus/azure-servicebus-public-access-disabled.yaml | 2 +- .../servicebus/azure-servicebus-tls-version-outdated.yaml | 2 +- cloud/azure/sql/azure-sql-auditing-disabled.yaml | 2 +- cloud/azure/sql/azure-sql-failover-not-enabled.yaml | 2 +- cloud/azure/sql/azure-sql-mi-tde-cmk-not-enabled.yaml | 2 +- cloud/azure/sql/azure-sql-mi-tls-version-outdated.yaml | 2 +- cloud/azure/sql/azure-sql-tde-cmk-not-used.yaml | 2 +- cloud/azure/sql/azure-sql-tde-not-enabled.yaml | 2 +- cloud/azure/sql/azure-sql-va-emails-unconfigured.yaml | 2 +- .../storageaccounts/azure-blob-anonymous-access-disabled.yaml | 2 +- .../storageaccounts/azure-blob-immutable-not-enabled.yaml | 2 +- .../storageaccounts/azure-blob-lifecycle-not-enabled.yaml | 2 +- .../storageaccounts/azure-blob-service-logging-disabled.yaml | 2 +- .../storageaccounts/azure-blob-soft-delete-disabled.yaml | 2 +- .../storageaccounts/azure-storage-blob-public-access.yaml | 2 +- cloud/azure/storageaccounts/azure-storage-byok-not-used.yaml | 2 +- cloud/azure/storageaccounts/azure-storage-cmk-not-used.yaml | 2 +- .../azure-storage-cross-tenant-replication-disabled.yaml | 2 +- .../storageaccounts/azure-storage-encryption-missing.yaml | 2 +- .../azure/storageaccounts/azure-storage-min-tls-version.yaml | 2 +- .../storageaccounts/azure-storage-network-unrestricted.yaml | 2 +- .../storageaccounts/azure-storage-overly-permissive-sap.yaml | 2 +- .../azure-storage-private-endpoint-unconfigured.yaml | 2 +- cloud/azure/storageaccounts/azure-storage-public-access.yaml | 2 +- .../storageaccounts/azure-storage-queue-logging-disabled.yaml | 2 +- .../azure/storageaccounts/azure-storage-secure-transfer.yaml | 2 +- .../storageaccounts/azure-storage-static-website-review.yaml | 2 +- .../storageaccounts/azure-storage-table-logging-disabled.yaml | 2 +- .../azure-storage-trusted-access-disabled.yaml | 2 +- cloud/azure/subscriptions/azure-budget-alerts-missing.yaml | 2 +- .../azure-policy-not-allowed-types-unassigned.yaml | 2 +- cloud/azure/synapse/azure-synapse-sqlpool-tde-disabled.yaml | 2 +- cloud/azure/tags/azure-vm-tags-schema-noncompliant.yaml | 2 +- .../virtualmachines/azure-app-tier-vm-disk-unencrypted.yaml | 2 +- .../azure-disk-encryption-unattached-volumes.yaml | 2 +- cloud/azure/virtualmachines/azure-lb-unused.yaml | 2 +- .../azure-vm-accelerated-networking-disabled.yaml | 2 +- .../azure-vm-accelerated-networking-not-enabled.yaml | 2 +- .../azure-vm-boot-diagnostics-not-enabled.yaml | 2 +- .../azure/virtualmachines/azure-vm-boot-disk-unencrypted.yaml | 2 +- .../azure-vm-byok-disk-volumes-not-enabled.yaml | 2 +- .../virtualmachines/azure-vm-endpoint-protection-missing.yaml | 2 +- cloud/azure/virtualmachines/azure-vm-entra-id-unenabled.yaml | 2 +- .../virtualmachines/azure-vm-guest-diagnostics-unenabled.yaml | 2 +- .../virtualmachines/azure-vm-jit-access-not-enabled.yaml | 2 +- .../virtualmachines/azure-vm-managed-identity-unassigned.yaml | 2 +- .../azure-vm-performance-diagnostics-unenabled.yaml | 2 +- cloud/azure/virtualmachines/azure-vm-ssh-auth-type.yaml | 2 +- .../azure/virtualmachines/azure-vm-standard-ssd-required.yaml | 2 +- .../virtualmachines/azure-vm-trusted-launch-disabled.yaml | 2 +- cloud/azure/virtualmachines/azure-vm-unapproved-image.yaml | 2 +- .../virtualmachines/azure-vm-unmanaged-disk-volumes.yaml | 2 +- .../virtualmachines/azure-vm-web-tier-disk-unencrypted.yaml | 2 +- .../virtualmachines/azure-vmss-auto-os-upgrade-missing.yaml | 2 +- .../virtualmachines/azure-vmss-auto-repairs-disabled.yaml | 2 +- cloud/azure/virtualmachines/azure-vmss-empty-unattached.yaml | 2 +- .../virtualmachines/azure-vmss-health-monitoring-missing.yaml | 2 +- .../azure-vmss-load-balancer-unassociated.yaml | 2 +- .../azure/virtualmachines/azure-vmss-public-ip-disabled.yaml | 2 +- .../azure-vmss-termination-notif-disabled.yaml | 2 +- .../virtualmachines/azure-vmss-zone-redundancy-missing.yaml | 2 +- cloud/gcp/api/gcloud-api-key-restrictions-missing.yaml | 2 +- cloud/gcp/api/gcloud-api-key-unrestricted.yaml | 2 +- cloud/gcp/api/gcloud-api-keys-inactive-services.yaml | 2 +- cloud/gcp/api/gcloud-critical-service-apis-disabled.yaml | 2 +- cloud/gcp/api/gcloud-security-center-api-disabled.yaml | 2 +- cloud/gcp/api/gcloud-vm-os-config-disabled.yaml | 2 +- .../gcp/artifactregistry/gcloud-artifact-registry-public.yaml | 2 +- cloud/gcp/artifactregistry/gcloud-vuln-scan-missing.yaml | 2 +- cloud/gcp/bigquery/gcloud-bigquery-cmek-not-enabled.yaml | 2 +- cloud/gcp/bigquery/gcloud-bigquery-cmk-not-enabled.yaml | 2 +- cloud/gcp/bigquery/gcloud-bigquery-public-datasets.yaml | 2 +- cloud/gcp/cdn/gcloud-backend-bucket-missing-storage.yaml | 2 +- cloud/gcp/cdn/gcloud-cdn-backend-bucket.yaml | 2 +- cloud/gcp/cdn/gcloud-cdn-origin-auth-unconfigured.yaml | 2 +- cloud/gcp/cdn/gcloud-cdn-ssl-enforcement.yaml | 2 +- cloud/gcp/cdn/gcloud-cdn-tls-unenforced.yaml | 2 +- .../gcloud-certificate-validity-exceeded.yaml | 2 +- cloud/gcp/compute/gcloud-disk-image-public-access.yaml | 2 +- .../compute/gcloud-instance-group-autohealing-disabled.yaml | 2 +- cloud/gcp/compute/gcloud-mig-no-load-balancer.yaml | 2 +- cloud/gcp/compute/gcloud-mig-single-zone.yaml | 2 +- cloud/gcp/compute/gcloud-oslogin-disabled.yaml | 2 +- cloud/gcp/compute/gcloud-persistent-disks-suspended-vms.yaml | 2 +- cloud/gcp/compute/gcloud-vm-automatic-restart-disabled.yaml | 2 +- .../compute/gcloud-vm-confidential-computing-disabled.yaml | 2 +- .../gcloud-vm-default-service-account-full-access.yaml | 2 +- cloud/gcp/compute/gcloud-vm-default-service-account.yaml | 2 +- cloud/gcp/compute/gcloud-vm-deletion-protection-disabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-disk-autodelete-enabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-disk-cmk-not-enabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-disk-csek-disabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-disk-csek-not-enabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-ip-forwarding-enabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-maintenance-terminate.yaml | 2 +- cloud/gcp/compute/gcloud-vm-oslogin-2fa-disabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-preemptible-enabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-project-ssh-keys-enabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-public-ip-enabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-serial-console-enabled.yaml | 2 +- cloud/gcp/compute/gcloud-vm-shielded-disabled.yaml | 2 +- cloud/gcp/dataproc/gcloud-dataproc-no-cmk.yaml | 2 +- cloud/gcp/dataproc/gcloud-dataproc-public-access.yaml | 2 +- .../gcloud-filestore-deletion-protection-disabled.yaml | 2 +- cloud/gcp/filestore/gcloud-filestore-no-backups.yaml | 2 +- cloud/gcp/filestore/gcloud-filestore-no-cmek.yaml | 2 +- cloud/gcp/filestore/gcloud-filestore-no-vpc-controls.yaml | 2 +- cloud/gcp/filestore/gcloud-filestore-unrestricted-access.yaml | 2 +- .../function/gcloud-func-auto-runtime-updates-disabled.yaml | 2 +- cloud/gcp/function/gcloud-func-cmek-not-used.yaml | 2 +- cloud/gcp/function/gcloud-func-inactive-svc-acc.yaml | 2 +- cloud/gcp/function/gcloud-func-min-instances-unset.yaml | 2 +- cloud/gcp/function/gcloud-func-missing-labels.yaml | 2 +- cloud/gcp/function/gcloud-func-no-vpc-access.yaml | 2 +- cloud/gcp/function/gcloud-func-public-access.yaml | 2 +- cloud/gcp/function/gcloud-func-pubsub-dlt-missing.yaml | 2 +- cloud/gcp/function/gcloud-func-secrets-unmanaged.yaml | 2 +- cloud/gcp/function/gcloud-func-unrestricted-outbound.yaml | 2 +- cloud/gcp/function/gcp-cloud-func-gen1-deprecated.yaml | 2 +- cloud/gcp/function/gcp-func-default-svc-acc.yaml | 2 +- cloud/gcp/gcp-env.yaml | 2 +- cloud/gcp/gke/gcloud-gke-auto-repair-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-auto-upgrade-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-backups-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-binary-authorization-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-client-certificate-enabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-confidential-nodes-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-cos-containerd-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-cost-allocation-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-default-service-account.yaml | 2 +- cloud/gcp/gke/gcloud-gke-integrity-monitoring-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-intranode-visibility-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-labels-missing.yaml | 2 +- cloud/gcp/gke/gcloud-gke-logging-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-metadata-server-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-monitoring-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-notifications-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-private-nodes-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-public-endpoint-enabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-release-channel-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-sandbox-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-secrets-encryption-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-secure-boot-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-security-posture-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-shielded-nodes-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-transparent-encryption-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-vpc-native-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-vulnerability-scanning-disabled.yaml | 2 +- cloud/gcp/gke/gcloud-gke-workload-identity-disabled.yaml | 2 +- cloud/gcp/iam/gcloud-access-approval-not-enabled.yaml | 2 +- cloud/gcp/iam/gcloud-api-keys-present.yaml | 2 +- cloud/gcp/iam/gcloud-iam-admin-roles.yaml | 2 +- cloud/gcp/iam/gcloud-iam-primitive-roles.yaml | 2 +- cloud/gcp/iam/gcloud-iam-separation-duties.yaml | 2 +- cloud/gcp/iam/gcloud-iam-service-roles-project-level.yaml | 2 +- cloud/gcp/iam/gcloud-iam-unrestricted-decryption.yaml | 2 +- cloud/gcp/iam/gcloud-service-account-admin-restriction.yaml | 2 +- cloud/gcp/iam/gcloud-service-account-user-keys.yaml | 2 +- cloud/gcp/kms/gcloud-kms-public-access.yaml | 2 +- cloud/gcp/loadbalancing/gcloud-alb-ssl-google-managed.yaml | 2 +- cloud/gcp/loadbalancing/gcloud-approved-external-lb.yaml | 2 +- cloud/gcp/loadbalancing/gcloud-https-lb-logging-disabled.yaml | 2 +- cloud/gcp/loadbalancing/gcloud-lb-backend-unsecured.yaml | 2 +- .../gcp/loadbalancing/gcloud-ssl-policy-insecure-ciphers.yaml | 2 +- .../gcp/logging/gcloud-enable-data-access-audit-logging.yaml | 2 +- cloud/gcp/logging/gcloud-global-logging-not-enabled.yaml | 2 +- .../gcp/logging/gcloud-log-retention-period-insufficient.yaml | 2 +- cloud/gcp/logging/gcloud-logging-sink-not-configured.yaml | 2 +- cloud/gcp/logging/gcloud-logs-router-cmek-not-enabled.yaml | 2 +- .../gcloud-vpc-network-changes-monitoring-not-enabled.yaml | 2 +- cloud/gcp/nat/gcloud-iam-least-privilege-nat.yaml | 2 +- cloud/gcp/nat/gcloud-nat-logging-disabled.yaml | 2 +- cloud/gcp/nat/gcloud-nat-private-subnet-disabled.yaml | 2 +- cloud/gcp/nat/gcloud-nat-static-ip-unconfigured.yaml | 2 +- cloud/gcp/nat/gcloud-nat-subnet-unrestricted.yaml | 2 +- cloud/gcp/pubsub/gcloud-pubsub-cmek-disabled.yaml | 2 +- cloud/gcp/pubsub/gcloud-pubsub-crossproject-access.yaml | 2 +- cloud/gcp/pubsub/gcloud-pubsub-deadletter-disabled.yaml | 2 +- cloud/gcp/pubsub/gcloud-pubsub-publicly-accessible.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-allowed-apis.yaml | 2 +- .../gcp/resourcemanager/gcloud-org-allowed-external-ips.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-auto-iam-grants.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-default-network.yaml | 2 +- .../resourcemanager/gcloud-org-detailed-audit-logging.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-guest-attributes.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-ip-forwarding.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-load-balancer-types.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-os-login.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-resource-locations.yaml | 2 +- .../resourcemanager/gcloud-org-service-account-creation.yaml | 2 +- .../gcloud-org-service-account-key-creation.yaml | 2 +- .../gcloud-org-service-account-key-upload.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-shared-vpc-subnets.yaml | 2 +- .../resourcemanager/gcloud-org-sql-authorized-networks.yaml | 2 +- .../resourcemanager/gcloud-org-sql-default-encryption.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-sql-public-ip.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-trusted-images.yaml | 2 +- .../gcp/resourcemanager/gcloud-org-uniform-bucket-access.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-vpc-peering.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-vpn-peer-ips.yaml | 2 +- cloud/gcp/resourcemanager/gcloud-org-workload-identity.yaml | 2 +- cloud/gcp/run/gcloud-run-services-user-labels-missing.yaml | 2 +- cloud/gcp/sql/gcloud-mysql-local-infile-enabled.yaml | 2 +- cloud/gcp/sql/gcloud-mysql-pitr-disabled.yaml | 2 +- cloud/gcp/sql/gcloud-mysql-slowquerylog-disabled.yaml | 2 +- .../gcloud-pg-log-error-verbosity-flag-not-configured.yaml | 2 +- cloud/gcp/sql/gcloud-pg-log-executor-stats-enabled.yaml | 2 +- .../gcp/sql/gcloud-pg-log-min-duration-statement-enabled.yaml | 2 +- ...gcloud-pg-log-min-error-statement-flag-not-configured.yaml | 2 +- .../sql/gcloud-pg-log-min-messages-flag-not-configured.yaml | 2 +- cloud/gcp/sql/gcloud-pg-log-parser-stats-enabled.yaml | 2 +- cloud/gcp/sql/gcloud-pg-log-planner-stats-enabled.yaml | 2 +- .../gcp/sql/gcloud-pg-log-statement-flag-not-configured.yaml | 2 +- cloud/gcp/sql/gcloud-pg-log-statement-stats-enabled.yaml | 2 +- cloud/gcp/sql/gcloud-postgresql-log-checkpoints-disabled.yaml | 2 +- .../sql/gcloud-postgresql-log-disconnections-unenabled.yaml | 2 +- cloud/gcp/sql/gcloud-postgresql-log-hostname-disabled.yaml | 2 +- cloud/gcp/sql/gcloud-postgresql-logtempfiles-disabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-auto-storage-disabled.yaml | 2 +- .../gcp/sql/gcloud-sql-auto-storage-limit-not-configured.yaml | 2 +- cloud/gcp/sql/gcloud-sql-backups-disabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-cmk-not-enabled.yaml | 2 +- .../sql/gcloud-sql-contained-db-authentication-enabled.yaml | 2 +- .../sql/gcloud-sql-cross-db-ownership-chaining-enabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-database-public-ip-configured.yaml | 2 +- cloud/gcp/sql/gcloud-sql-external-scripts-enabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-ha-not-enabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-log-checkpoints-disabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-log-connections-disabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-log-lock-waits-disabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-pgaudit-not-enabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-publicly-accessible-instances.yaml | 2 +- cloud/gcp/sql/gcloud-sql-remote-access-enabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-skip-show-database-disabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-ssl-not-enforced.yaml | 2 +- .../gcp/sql/gcloud-sql-ssl-tls-connections-not-enforced.yaml | 2 +- cloud/gcp/sql/gcloud-sql-trace-3625-enabled.yaml | 2 +- cloud/gcp/sql/gcloud-sql-user-options.yaml | 2 +- cloud/gcp/storage/gcloud-bucket-lock-not-configured.yaml | 2 +- .../gcp/storage/gcloud-bucket-policies-admin-permissions.yaml | 2 +- .../gcp/storage/gcloud-bucket-website-config-not-defined.yaml | 2 +- .../storage/gcloud-data-access-audit-logs-not-enabled.yaml | 2 +- .../storage/gcloud-insufficient-data-retention-period.yaml | 2 +- .../gcp/storage/gcloud-lifecycle-management-not-enabled.yaml | 2 +- .../gcp/storage/gcloud-object-encryption-cmk-not-enabled.yaml | 2 +- cloud/gcp/storage/gcloud-object-versioning-not-enabled.yaml | 2 +- .../storage/gcloud-public-access-prevention-not-enabled.yaml | 2 +- .../storage/gcloud-publicly-accessible-storage-buckets.yaml | 2 +- cloud/gcp/storage/gcloud-secure-cors-configuration.yaml | 2 +- cloud/gcp/storage/gcloud-storage-logs-not-enabled.yaml | 2 +- .../gcloud-uniform-bucket-level-access-not-enabled.yaml | 2 +- .../storage/gcloud-vpc-service-controls-not-configured.yaml | 2 +- cloud/gcp/vertexai/gcloud-vertexai-auto-upgrades.yaml | 2 +- cloud/gcp/vertexai/gcloud-vertexai-default-vpc.yaml | 2 +- cloud/gcp/vertexai/gcloud-vertexai-external-ip.yaml | 2 +- cloud/gcp/vertexai/gcloud-vertexai-idle-shutdown.yaml | 2 +- cloud/gcp/vertexai/gcloud-vertexai-integrity.yaml | 2 +- cloud/gcp/vertexai/gcloud-vertexai-monitoring.yaml | 2 +- cloud/gcp/vertexai/gcloud-vertexai-root-access.yaml | 2 +- cloud/gcp/vertexai/gcloud-vertexai-secure-boot.yaml | 2 +- cloud/gcp/vertexai/gcloud-vertexai-vtpm.yaml | 2 +- cloud/gcp/vpc/gcloud-check-legacy-networks.yaml | 2 +- cloud/gcp/vpc/gcloud-default-vpc-in-use.yaml | 2 +- cloud/gcp/vpc/gcloud-dns-logging-not-enabled.yaml | 2 +- cloud/gcp/vpc/gcloud-enable-vpc-flow-logs.yaml | 2 +- .../vpc/gcloud-exclude-metadata-from-firewall-logging.yaml | 2 +- cloud/gcp/vpc/gcloud-firewall-rule-logging-not-enabled.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-dns-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-ftp-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-icmp-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-inbound-uncommon-ports.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-mysql-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-oracle-db-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-outbound-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-postgresql-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-rdp-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-rpc-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-smtp-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-sqlserver-access.yaml | 2 +- cloud/gcp/vpc/gcloud-unrestricted-ssh-access.yaml | 2 +- cloud/gcp/vpc/gcloud-vpc-firewall-port-ranges.yaml | 2 +- cloud/gcp/vpc/gcloud-vpc-private-service-connect.yaml | 2 +- cloud/gcp/vpc/gcloud-vpc-unattached-static-ips.yaml | 2 +- cloud/kubernetes/cves/2025/CVE-2025-1974-k8s.yaml | 2 +- cloud/kubernetes/deployments/k8s-cpu-limits-not-set.yaml | 2 +- cloud/kubernetes/deployments/k8s-cpu-requests-not-set.yaml | 2 +- cloud/kubernetes/deployments/k8s-default-namespace-used.yaml | 2 +- cloud/kubernetes/deployments/k8s-host-ports-check.yaml | 2 +- .../kubernetes/deployments/k8s-image-pull-policy-always.yaml | 2 +- cloud/kubernetes/deployments/k8s-image-tag-not-fixed.yaml | 2 +- .../deployments/k8s-liveness-probe-not-configured.yaml | 2 +- cloud/kubernetes/deployments/k8s-memory-limits-not-set.yaml | 2 +- cloud/kubernetes/deployments/k8s-memory-requests-not-set.yaml | 2 +- .../deployments/k8s-minimize-added-capabilities.yaml | 2 +- cloud/kubernetes/deployments/k8s-privileged-container.yaml | 2 +- cloud/kubernetes/deployments/k8s-readiness-probe-not-set.yaml | 2 +- .../kubernetes/deployments/k8s-root-container-admission.yaml | 2 +- cloud/kubernetes/deployments/k8s-seccomp-profile-set.yaml | 2 +- cloud/kubernetes/kubernetes-code-env.yaml | 2 +- .../kubernetes-exposing-docker-socket-hostpath.yaml | 2 +- .../network-policies/k8s-missing-network-policies.yaml | 2 +- .../kubernetes/network-policies/k8s-netpol-egress-rules.yaml | 2 +- cloud/kubernetes/network-policies/k8s-netpol-namespace.yaml | 2 +- .../network-policies/k8s-network-ingress-rules.yaml | 2 +- cloud/kubernetes/pods/k8s-allow-privilege-escalation-set.yaml | 2 +- cloud/kubernetes/pods/k8s-containers-share-host-ipc.yaml | 2 +- cloud/kubernetes/pods/k8s-host-network-namespace-shared.yaml | 2 +- cloud/kubernetes/pods/k8s-host-pid-namespace-sharing.yaml | 2 +- cloud/kubernetes/pods/k8s-readonly-fs.yaml | 2 +- cloud/kubernetes/pods/k8s-readonly-rootfs.yaml | 2 +- cloud/kubernetes/pods/k8s-root-user-id.yaml | 2 +- cloud/kubernetes/rbac/k8s-role-pod-create.yaml | 2 +- .../security-compliance/k8s-apiserver-anonymous-access.yaml | 2 +- .../security-compliance/k8s-apiserver-token-auth-file.yaml | 4 ++-- .../security-compliance/k8s-audit-log-path-set.yaml | 2 +- cloud/kubernetes/security-compliance/k8s-enc-prov-conf.yaml | 2 +- cloud/kubernetes/security-compliance/k8s-etcd-cafile-set.yaml | 2 +- cloud/kubernetes/security-compliance/k8s-etcd-files-set.yaml | 2 +- cloud/kubernetes/security-compliance/k8s-ns-usage-check.yaml | 2 +- .../security-compliance/k8s-svc-acct-issuer-set.yaml | 2 +- cloud/kubernetes/security-compliance/k8s-svc-acct-key.yaml | 2 +- .../security-compliance/k8s-svc-acct-lookup-set.yaml | 2 +- cloud/kubernetes/security-compliance/k8s-tls-config-set.yaml | 2 +- http/iot/brother-unauthorized-access.yaml | 2 +- http/iot/dell-laser-printer-unauth.yaml | 2 +- http/iot/iotawatt-app-exposure.yaml | 2 +- http/misconfiguration/gocd/gocd-unauth-dashboard.yaml | 2 +- http/osint/phishing/1password-phish.yaml | 2 +- http/osint/phishing/adobe-phish.yaml | 2 +- http/osint/phishing/aliexpress-phish.yaml | 2 +- http/osint/phishing/amazon-phish.yaml | 2 +- http/osint/phishing/amazon-web-services-phish.yaml | 2 +- http/osint/phishing/american-express-phish.yaml | 2 +- http/osint/phishing/anydesk-phish.yaml | 2 +- http/osint/phishing/avast-phish.yaml | 2 +- http/osint/phishing/avg-phish.yaml | 2 +- http/osint/phishing/bank-central-asia-phish.yaml | 2 +- http/osint/phishing/bank-of-america-phish.yaml | 2 +- http/osint/phishing/battlenet-phish.yaml | 2 +- http/osint/phishing/bestbuy-phish.yaml | 2 +- http/osint/phishing/bitdefender-phish.yaml | 2 +- http/osint/phishing/bitwarden-phish.yaml | 2 +- http/osint/phishing/blender-phish.yaml | 2 +- http/osint/phishing/booking-phish.yaml | 2 +- http/osint/phishing/box-storage-phish.yaml | 2 +- http/osint/phishing/brave-phish.yaml | 2 +- http/osint/phishing/brighthr-phish.yaml | 2 +- http/osint/phishing/ccleaner-phish.yaml | 2 +- http/osint/phishing/chase-phish.yaml | 2 +- http/osint/phishing/chrome-phish.yaml | 2 +- http/osint/phishing/costa-phish.yaml | 2 +- http/osint/phishing/dashlane-phish.yaml | 2 +- http/osint/phishing/deezer-phish.yaml | 2 +- http/osint/phishing/deliveroo-phish.yaml | 2 +- http/osint/phishing/digital-ocean-phish.yaml | 2 +- http/osint/phishing/discord-phish.yaml | 2 +- http/osint/phishing/disneyplus-phish.yaml | 2 +- http/osint/phishing/dropbox-phish.yaml | 2 +- http/osint/phishing/duckduckgo-phish.yaml | 2 +- http/osint/phishing/ebay-phish.yaml | 2 +- http/osint/phishing/edge-phish.yaml | 2 +- http/osint/phishing/ee-mobile-phish.yaml | 2 +- http/osint/phishing/eset-phish.yaml | 2 +- http/osint/phishing/evernote-phish.yaml | 2 +- http/osint/phishing/facebook-phish.yaml | 2 +- http/osint/phishing/figma-phish.yaml | 2 +- http/osint/phishing/filezilla-phish.yaml | 2 +- http/osint/phishing/firefox-phish.yaml | 2 +- http/osint/phishing/gimp-phish.yaml | 2 +- http/osint/phishing/github-phish.yaml | 2 +- http/osint/phishing/google-phish.yaml | 2 +- http/osint/phishing/icloud-phish.yaml | 2 +- http/osint/phishing/instagram-phish.yaml | 2 +- http/osint/phishing/kakao-login-phish.yaml | 2 +- http/osint/phishing/kaspersky-phish.yaml | 2 +- http/osint/phishing/kayak-phish.yaml | 2 +- http/osint/phishing/keepass-phish.yaml | 2 +- http/osint/phishing/keepersecurity-phish.yaml | 2 +- http/osint/phishing/keybase-phish.yaml | 2 +- http/osint/phishing/lastpass-phish.yaml | 2 +- http/osint/phishing/libre-office-phish.yaml | 2 +- http/osint/phishing/linkedin-phish.yaml | 2 +- http/osint/phishing/malwarebytes-phish.yaml | 2 +- http/osint/phishing/mcafee-phish.yaml | 2 +- http/osint/phishing/mega-phish.yaml | 2 +- http/osint/phishing/messenger-phish.yaml | 2 +- http/osint/phishing/microcenter-phish.yaml | 2 +- http/osint/phishing/microsoft-phish.yaml | 2 +- http/osint/phishing/microsoft-teams-phish.yaml | 2 +- http/osint/phishing/naver-login-phish.yaml | 2 +- http/osint/phishing/netflix-phish.yaml | 2 +- http/osint/phishing/nordpass-phish.yaml | 2 +- http/osint/phishing/norton-phish.yaml | 2 +- http/osint/phishing/notion-phish.yaml | 2 +- http/osint/phishing/o2-mobile-phish.yaml | 2 +- http/osint/phishing/openai-phish.yaml | 2 +- http/osint/phishing/opera-phish.yaml | 2 +- http/osint/phishing/paramountplus-phish.yaml | 2 +- http/osint/phishing/paypal-phish.yaml | 2 +- http/osint/phishing/pcloud-phish.yaml | 2 +- http/osint/phishing/pintrest-phish.yaml | 2 +- http/osint/phishing/plusnet-phish.yaml | 2 +- http/osint/phishing/proton-phish.yaml | 2 +- http/osint/phishing/putty-phish.yaml | 2 +- http/osint/phishing/python-phish.yaml | 2 +- http/osint/phishing/quora-phish.yaml | 2 +- http/osint/phishing/reddit-phish.yaml | 2 +- http/osint/phishing/roblox-phish.yaml | 2 +- http/osint/phishing/roboform-phish.yaml | 2 +- http/osint/phishing/royal-mail-phish.yaml | 2 +- http/osint/phishing/samsung-phish.yaml | 2 +- http/osint/phishing/signal-phish.yaml | 2 +- http/osint/phishing/sky-phish.yaml | 2 +- http/osint/phishing/skype-phish.yaml | 2 +- http/osint/phishing/skyscanner-phish.yaml | 2 +- http/osint/phishing/slack-phish.yaml | 2 +- http/osint/phishing/sophos-phish.yaml | 2 +- http/osint/phishing/spotify-phish.yaml | 2 +- http/osint/phishing/steam-phish.yaml | 2 +- http/osint/phishing/sync-storage-phish.yaml | 2 +- http/osint/phishing/target-phish.yaml | 2 +- http/osint/phishing/teamviewer-phish.yaml | 2 +- http/osint/phishing/telegram-phish.yaml | 2 +- http/osint/phishing/three-mobile-phish.yaml | 2 +- http/osint/phishing/thunderbird-phish.yaml | 2 +- http/osint/phishing/ticketmaster-phish.yaml | 2 +- http/osint/phishing/tiktok-phish.yaml | 2 +- http/osint/phishing/trading212-phish.yaml | 2 +- http/osint/phishing/trend-micro-phish.yaml | 2 +- http/osint/phishing/trip-phish.yaml | 2 +- http/osint/phishing/twitch-phish.yaml | 2 +- http/osint/phishing/uber-phish.yaml | 2 +- http/osint/phishing/visual-studio-code-phish.yaml | 2 +- http/osint/phishing/vlc-player-phish.yaml | 2 +- http/osint/phishing/vodafone-phish.yaml | 2 +- http/osint/phishing/vultr-phish.yaml | 2 +- http/osint/phishing/walmart-phish.yaml | 2 +- http/osint/phishing/wetransfer-phish.yaml | 2 +- http/osint/phishing/whatsapp-phish.yaml | 2 +- http/osint/phishing/wikipedia-phish.yaml | 2 +- http/osint/phishing/winscp-phish.yaml | 2 +- http/osint/phishing/yahoo-phish.yaml | 2 +- http/osint/phishing/zoom-phish.yaml | 2 +- http/token-spray/api-1forge.yaml | 2 +- http/token-spray/api-abstract-company-enrichment.yaml | 2 +- http/token-spray/api-abstract-email-validation.yaml | 2 +- http/token-spray/api-abstract-exchange-rates.yaml | 2 +- http/token-spray/api-abstract-iban-validation.yaml | 2 +- http/token-spray/api-abstract-image-processing.yaml | 2 +- http/token-spray/api-abstract-ip-geolocation.yaml | 2 +- http/token-spray/api-abstract-phone-validation.yaml | 2 +- http/token-spray/api-abstract-public-holidays.yaml | 2 +- http/token-spray/api-abstract-timezone.yaml | 2 +- http/token-spray/api-abstract-user-avatars.yaml | 2 +- http/token-spray/api-abstract-vat-validation-rates.yaml | 2 +- http/token-spray/api-abstract-website-scraping.yaml | 2 +- http/token-spray/api-abstract-website-screenshot.yaml | 2 +- http/token-spray/api-abuseipdb.yaml | 2 +- http/token-spray/api-accuweather.yaml | 2 +- http/token-spray/api-adafruit-io.yaml | 2 +- http/token-spray/api-adoptapet.yaml | 2 +- http/token-spray/api-airtable.yaml | 2 +- http/token-spray/api-alchemy.yaml | 2 +- http/token-spray/api-alienvault.yaml | 2 +- http/token-spray/api-amdoren.yaml | 2 +- http/token-spray/api-aniapi.yaml | 2 +- http/token-spray/api-api2convert.yaml | 2 +- http/token-spray/api-apiflash.yaml | 2 +- http/token-spray/api-apigee-edge.yaml | 2 +- http/token-spray/api-appveyor.yaml | 2 +- http/token-spray/api-asana.yaml | 2 +- http/token-spray/api-bhagavadgita.yaml | 2 +- http/token-spray/api-bible.yaml | 2 +- http/token-spray/api-binance.yaml | 2 +- http/token-spray/api-binaryedge.yaml | 2 +- http/token-spray/api-bingmaps.yaml | 2 +- http/token-spray/api-bitcoinaverage.yaml | 2 +- http/token-spray/api-bitly.yaml | 2 +- http/token-spray/api-bitquery.yaml | 2 +- http/token-spray/api-bitrise.yaml | 2 +- http/token-spray/api-blitapp.yaml | 2 +- http/token-spray/api-block.yaml | 2 +- http/token-spray/api-blockchain.yaml | 2 +- http/token-spray/api-blockfrost.yaml | 2 +- http/token-spray/api-box.yaml | 2 +- http/token-spray/api-bravenewcoin.yaml | 2 +- http/token-spray/api-browshot.yaml | 2 +- http/token-spray/api-buildkite.yaml | 2 +- http/token-spray/api-buttercms.yaml | 2 +- http/token-spray/api-c99.yaml | 2 +- http/token-spray/api-calendarific.yaml | 2 +- http/token-spray/api-calendly.yaml | 2 +- http/token-spray/api-chaos.yaml | 2 +- http/token-spray/api-charity.yaml | 2 +- http/token-spray/api-circleci.yaml | 2 +- http/token-spray/api-clearbit.yaml | 2 +- http/token-spray/api-clickup.yaml | 2 +- http/token-spray/api-clockify.yaml | 2 +- http/token-spray/api-cloudconvert.yaml | 2 +- http/token-spray/api-cloudflare.yaml | 2 +- http/token-spray/api-codestats.yaml | 2 +- http/token-spray/api-coinapi.yaml | 2 +- http/token-spray/api-coinlayer.yaml | 2 +- http/token-spray/api-coinmarketcap.yaml | 2 +- http/token-spray/api-coinranking.yaml | 2 +- http/token-spray/api-cooperhewitt.yaml | 2 +- http/token-spray/api-covalent.yaml | 2 +- http/token-spray/api-craftmypdf.yaml | 2 +- http/token-spray/api-currencyfreaks.yaml | 2 +- http/token-spray/api-currencylayer.yaml | 2 +- http/token-spray/api-currencyscoop.yaml | 2 +- http/token-spray/api-dbt.yaml | 2 +- http/token-spray/api-ddownload.yaml | 2 +- http/token-spray/api-debounce.yaml | 2 +- http/token-spray/api-delighted.yaml | 2 +- http/token-spray/api-deviantart.yaml | 2 +- http/token-spray/api-digitalocean.yaml | 2 +- http/token-spray/api-dribbble.yaml | 2 +- http/token-spray/api-dropbox.yaml | 2 +- http/token-spray/api-ebird.yaml | 2 +- http/token-spray/api-etherscan.yaml | 2 +- http/token-spray/api-europeana.yaml | 2 +- http/token-spray/api-exchangerateapi.yaml | 2 +- http/token-spray/api-facebook.yaml | 2 +- http/token-spray/api-fastly.yaml | 2 +- http/token-spray/api-festivo.yaml | 2 +- http/token-spray/api-flickr.yaml | 2 +- http/token-spray/api-flowdash.yaml | 2 +- http/token-spray/api-fontawesome.yaml | 2 +- http/token-spray/api-fortitoken-cloud.yaml | 2 +- http/token-spray/api-front.yaml | 2 +- http/token-spray/api-fullhunt.yaml | 2 +- http/token-spray/api-giphy.yaml | 2 +- http/token-spray/api-github.yaml | 2 +- http/token-spray/api-gitlab.yaml | 2 +- http/token-spray/api-gofile.yaml | 2 +- http/token-spray/api-google-drive.yaml | 2 +- http/token-spray/api-gorest.yaml | 2 +- http/token-spray/api-harvardart.yaml | 2 +- http/token-spray/api-heroku.yaml | 2 +- http/token-spray/api-hirak-rates.yaml | 2 +- http/token-spray/api-holidayapi.yaml | 2 +- http/token-spray/api-host-io.yaml | 2 +- http/token-spray/api-html2pdf.yaml | 2 +- http/token-spray/api-hubspot.yaml | 2 +- http/token-spray/api-hunter.yaml | 2 +- http/token-spray/api-iconfinder.yaml | 2 +- http/token-spray/api-improvmx.yaml | 2 +- http/token-spray/api-instagram.yaml | 2 +- http/token-spray/api-instatus.yaml | 2 +- http/token-spray/api-intelx.yaml | 2 +- http/token-spray/api-intercom.yaml | 2 +- http/token-spray/api-intigriti.yaml | 2 +- http/token-spray/api-ip2whois.yaml | 2 +- http/token-spray/api-ipdata.yaml | 2 +- http/token-spray/api-ipfind.yaml | 2 +- http/token-spray/api-ipinfo.yaml | 2 +- http/token-spray/api-ipstack.yaml | 2 +- http/token-spray/api-iterable.yaml | 2 +- http/token-spray/api-iucn.yaml | 2 +- http/token-spray/api-jotform.yaml | 2 +- http/token-spray/api-jsonbin.yaml | 2 +- http/token-spray/api-jumpcloud.yaml | 2 +- http/token-spray/api-launchdarkly.yaml | 2 +- http/token-spray/api-leanix.yaml | 2 +- http/token-spray/api-linkedin.yaml | 2 +- http/token-spray/api-lob.yaml | 2 +- http/token-spray/api-lokalise.yaml | 2 +- http/token-spray/api-loqate.yaml | 2 +- http/token-spray/api-mac-address-lookup.yaml | 2 +- http/token-spray/api-mailboxvalidator.yaml | 2 +- http/token-spray/api-mailchimp.yaml | 2 +- http/token-spray/api-mailgun.yaml | 2 +- http/token-spray/api-malshare.yaml | 2 +- http/token-spray/api-malwarebazaar.yaml | 2 +- http/token-spray/api-mapbox.yaml | 2 +- http/token-spray/api-micro-user-service.yaml | 2 +- http/token-spray/api-mojoauth.yaml | 2 +- http/token-spray/api-monday.yaml | 2 +- http/token-spray/api-moonpay.yaml | 2 +- http/token-spray/api-myanimelist.yaml | 2 +- http/token-spray/api-mywot.yaml | 2 +- http/token-spray/api-nerdgraph.yaml | 2 +- http/token-spray/api-netlify.yaml | 2 +- http/token-spray/api-networksdb.yaml | 2 +- http/token-spray/api-newrelic.yaml | 2 +- http/token-spray/api-notolytix.yaml | 2 +- http/token-spray/api-nownodes.yaml | 2 +- http/token-spray/api-npm.yaml | 2 +- http/token-spray/api-nytimes.yaml | 2 +- http/token-spray/api-onelogin.yaml | 2 +- http/token-spray/api-onyphe.yaml | 2 +- http/token-spray/api-open-page-rank.yaml | 2 +- http/token-spray/api-openai.yaml | 2 +- http/token-spray/api-opengraphr.yaml | 2 +- http/token-spray/api-openweather.yaml | 2 +- http/token-spray/api-opsgenie.yaml | 2 +- http/token-spray/api-optimizely.yaml | 2 +- http/token-spray/api-orbintelligence.yaml | 2 +- http/token-spray/api-pagecdn.yaml | 2 +- http/token-spray/api-pagerduty.yaml | 2 +- http/token-spray/api-particle.yaml | 2 +- http/token-spray/api-pastebin.yaml | 2 +- http/token-spray/api-paypal.yaml | 2 +- http/token-spray/api-pdflayer.yaml | 2 +- http/token-spray/api-pendo.yaml | 2 +- http/token-spray/api-petfinder.yaml | 2 +- http/token-spray/api-pinata.yaml | 2 +- http/token-spray/api-pivotaltracker.yaml | 2 +- http/token-spray/api-postmark.yaml | 2 +- http/token-spray/api-prexview.yaml | 2 +- http/token-spray/api-proxycrawl.yaml | 2 +- http/token-spray/api-proxykingdom.yaml | 2 +- http/token-spray/api-quip.yaml | 2 +- http/token-spray/api-rijksmuseum.yaml | 2 +- http/token-spray/api-savepage.yaml | 2 +- http/token-spray/api-scanii.yaml | 2 +- http/token-spray/api-scraperapi.yaml | 2 +- http/token-spray/api-scraperbox.yaml | 2 +- http/token-spray/api-scrapestack.yaml | 2 +- http/token-spray/api-scrapingant.yaml | 2 +- http/token-spray/api-scrapingdog.yaml | 2 +- http/token-spray/api-screenshotapi.yaml | 2 +- http/token-spray/api-securitytrails.yaml | 2 +- http/token-spray/api-segment.yaml | 2 +- http/token-spray/api-sendgrid.yaml | 2 +- http/token-spray/api-sentry.yaml | 2 +- http/token-spray/api-serpstack.yaml | 2 +- http/token-spray/api-shodan.yaml | 2 +- http/token-spray/api-slack.yaml | 2 +- http/token-spray/api-smartsheet.yaml | 2 +- http/token-spray/api-sonarcloud.yaml | 2 +- http/token-spray/api-spotify.yaml | 2 +- http/token-spray/api-square.yaml | 2 +- http/token-spray/api-sslmate.yaml | 2 +- http/token-spray/api-strava.yaml | 2 +- http/token-spray/api-stripe.yaml | 2 +- http/token-spray/api-stytch.yaml | 2 +- http/token-spray/api-supportivekoala.yaml | 2 +- http/token-spray/api-taiga.yaml | 2 +- http/token-spray/api-tatum.yaml | 2 +- http/token-spray/api-telegram.yaml | 2 +- http/token-spray/api-thecatapi.yaml | 2 +- http/token-spray/api-thedogapi.yaml | 2 +- http/token-spray/api-ticketmaster.yaml | 2 +- http/token-spray/api-tink.yaml | 2 +- http/token-spray/api-tinypng.yaml | 2 +- http/token-spray/api-todoist.yaml | 2 +- http/token-spray/api-travisci.yaml | 2 +- http/token-spray/api-trello.yaml | 2 +- http/token-spray/api-twitter.yaml | 2 +- http/token-spray/api-urlscan.yaml | 2 +- http/token-spray/api-userstack.yaml | 2 +- http/token-spray/api-vercel.yaml | 2 +- http/token-spray/api-virustotal.yaml | 2 +- http/token-spray/api-visualstudio.yaml | 2 +- http/token-spray/api-wakatime.yaml | 2 +- http/token-spray/api-web3storage.yaml | 2 +- http/token-spray/api-webex.yaml | 2 +- http/token-spray/api-weglot.yaml | 2 +- http/token-spray/api-wordcloud.yaml | 2 +- http/token-spray/api-wordnik.yaml | 2 +- http/token-spray/api-youtube.yaml | 2 +- http/token-spray/api-zenrows.yaml | 2 +- http/token-spray/api-zerbounce.yaml | 2 +- http/token-spray/api-zoomeye.yaml | 2 +- http/token-spray/google-autocomplete.yaml | 2 +- http/token-spray/google-books.yaml | 2 +- http/token-spray/google-customsearch.yaml | 2 +- http/token-spray/google-directions.yaml | 2 +- http/token-spray/google-elevation.yaml | 2 +- http/token-spray/google-fcm.yaml | 2 +- http/token-spray/google-findplacefromtext.yaml | 2 +- http/token-spray/google-gedistancematrix.yaml | 2 +- http/token-spray/google-geocode.yaml | 2 +- http/token-spray/google-geolocation.yaml | 2 +- http/token-spray/google-mapsembed.yaml | 2 +- http/token-spray/google-mapsembedadvanced.yaml | 2 +- http/token-spray/google-nearbysearch.yaml | 2 +- http/token-spray/google-nearestroads.yaml | 2 +- http/token-spray/google-placedetails.yaml | 2 +- http/token-spray/google-placesphoto.yaml | 2 +- http/token-spray/google-playablelocations.yaml | 2 +- http/token-spray/google-routetotraveled.yaml | 2 +- http/token-spray/google-safebrowsing.yaml | 2 +- http/token-spray/google-speedlimit.yaml | 2 +- http/token-spray/google-staticmaps.yaml | 2 +- http/token-spray/google-streetview.yaml | 2 +- http/token-spray/google-textsearchplaces.yaml | 2 +- http/token-spray/google-timezone.yaml | 2 +- ssl/c2/asyncrat-c2.yaml | 2 +- ssl/c2/bitrat-c2.yaml | 2 +- ssl/c2/cobalt-strike-c2.yaml | 2 +- ssl/c2/covenant-c2-ssl.yaml | 2 +- ssl/c2/dcrat-server-c2.yaml | 2 +- ssl/c2/gozi-malware-c2.yaml | 2 +- ssl/c2/havoc-c2.yaml | 2 +- ssl/c2/icedid.yaml | 2 +- ssl/c2/metasploit-c2.yaml | 2 +- ssl/c2/mythic-c2-ssl.yaml | 2 +- ssl/c2/onimai-rat-c2.yaml | 2 +- ssl/c2/orcus-rat-c2.yaml | 2 +- ssl/c2/posh-c2.yaml | 2 +- ssl/c2/quasar-rat-c2.yaml | 2 +- ssl/c2/shadowpad-c2.yaml | 2 +- ssl/c2/sliver-c2.yaml | 2 +- ssl/c2/venomrat.yaml | 2 +- 1030 files changed, 1031 insertions(+), 1031 deletions(-) diff --git a/cloud/alibaba/ack/ack-cluster-api-public.yaml b/cloud/alibaba/ack/ack-cluster-api-public.yaml index 93bdee81b7b..22aa245e806 100644 --- a/cloud/alibaba/ack/ack-cluster-api-public.yaml +++ b/cloud/alibaba/ack/ack-cluster-api-public.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ack/ack-cluster-auditing-disable.yaml b/cloud/alibaba/ack/ack-cluster-auditing-disable.yaml index cb425e31dc2..c1ab344cfb3 100644 --- a/cloud/alibaba/ack/ack-cluster-auditing-disable.yaml +++ b/cloud/alibaba/ack/ack-cluster-auditing-disable.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ack/ack-cluster-cloud-monitor-disable.yaml b/cloud/alibaba/ack/ack-cluster-cloud-monitor-disable.yaml index 272754bdd5d..c88251fe7aa 100644 --- a/cloud/alibaba/ack/ack-cluster-cloud-monitor-disable.yaml +++ b/cloud/alibaba/ack/ack-cluster-cloud-monitor-disable.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ack/ack-cluster-health-disable.yaml b/cloud/alibaba/ack/ack-cluster-health-disable.yaml index f8ed9c74986..7146cdfe275 100644 --- a/cloud/alibaba/ack/ack-cluster-health-disable.yaml +++ b/cloud/alibaba/ack/ack-cluster-health-disable.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ack/ack-cluster-network-policies-disable.yaml b/cloud/alibaba/ack/ack-cluster-network-policies-disable.yaml index 2a03f414980..74179220b15 100644 --- a/cloud/alibaba/ack/ack-cluster-network-policies-disable.yaml +++ b/cloud/alibaba/ack/ack-cluster-network-policies-disable.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ack/ack-cluster-network-policies-missing.yaml b/cloud/alibaba/ack/ack-cluster-network-policies-missing.yaml index f7af311da96..8f82c8ff0d8 100644 --- a/cloud/alibaba/ack/ack-cluster-network-policies-missing.yaml +++ b/cloud/alibaba/ack/ack-cluster-network-policies-missing.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ack/kubernetes-dashboard-enabled.yaml b/cloud/alibaba/ack/kubernetes-dashboard-enabled.yaml index 6ad93f327b9..b1a5aaddd71 100644 --- a/cloud/alibaba/ack/kubernetes-dashboard-enabled.yaml +++ b/cloud/alibaba/ack/kubernetes-dashboard-enabled.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ack variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/actiontrail/multi-region-logging-disabled.yaml b/cloud/alibaba/actiontrail/multi-region-logging-disabled.yaml index 748179fbe5e..3a982db9fce 100644 --- a/cloud/alibaba/actiontrail/multi-region-logging-disabled.yaml +++ b/cloud/alibaba/actiontrail/multi-region-logging-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,actiontrail,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,actiontrail variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/actiontrail/public-actiontrail-bucket.yaml b/cloud/alibaba/actiontrail/public-actiontrail-bucket.yaml index 7d8db58dc0e..1025503143f 100644 --- a/cloud/alibaba/actiontrail/public-actiontrail-bucket.yaml +++ b/cloud/alibaba/actiontrail/public-actiontrail-bucket.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,actiontrail,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,actiontrail variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/alibaba-cloud-code-env.yaml b/cloud/alibaba/alibaba-cloud-code-env.yaml index 3c23d8fbe40..2a7e0a0127a 100644 --- a/cloud/alibaba/alibaba-cloud-code-env.yaml +++ b/cloud/alibaba/alibaba-cloud-code-env.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 3 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ecs/os-patches-outdated.yaml b/cloud/alibaba/ecs/os-patches-outdated.yaml index 5c385839c17..dd41b71f0c6 100644 --- a/cloud/alibaba/ecs/os-patches-outdated.yaml +++ b/cloud/alibaba/ecs/os-patches-outdated.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ecs/unattached-disk-encryption-disabled.yaml b/cloud/alibaba/ecs/unattached-disk-encryption-disabled.yaml index b2d9739dfa4..70d88e75d33 100644 --- a/cloud/alibaba/ecs/unattached-disk-encryption-disabled.yaml +++ b/cloud/alibaba/ecs/unattached-disk-encryption-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ecs/unattached-vminstance-encryption-disabled.yaml b/cloud/alibaba/ecs/unattached-vminstance-encryption-disabled.yaml index 18e6e6b36ec..6b086bc486c 100644 --- a/cloud/alibaba/ecs/unattached-vminstance-encryption-disabled.yaml +++ b/cloud/alibaba/ecs/unattached-vminstance-encryption-disabled.yaml @@ -13,7 +13,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ecs/unrestricted-rdp-access.yaml b/cloud/alibaba/ecs/unrestricted-rdp-access.yaml index cb4c8fd5b9b..a08f2f3e45e 100644 --- a/cloud/alibaba/ecs/unrestricted-rdp-access.yaml +++ b/cloud/alibaba/ecs/unrestricted-rdp-access.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ecs/unrestricted-ssh-access.yaml b/cloud/alibaba/ecs/unrestricted-ssh-access.yaml index 4505085c691..5e52d3d736c 100644 --- a/cloud/alibaba/ecs/unrestricted-ssh-access.yaml +++ b/cloud/alibaba/ecs/unrestricted-ssh-access.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/oss/access-logoss-disabled.yaml b/cloud/alibaba/oss/access-logoss-disabled.yaml index 08120709a7c..5a6b3829be2 100644 --- a/cloud/alibaba/oss/access-logoss-disabled.yaml +++ b/cloud/alibaba/oss/access-logoss-disabled.yaml @@ -13,7 +13,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/oss/improper-bucket-sse.yaml b/cloud/alibaba/oss/improper-bucket-sse.yaml index 91c123a1d52..f4962d1c388 100644 --- a/cloud/alibaba/oss/improper-bucket-sse.yaml +++ b/cloud/alibaba/oss/improper-bucket-sse.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,oss,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,oss variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/oss/limit-networkaccess-disabled.yaml b/cloud/alibaba/oss/limit-networkaccess-disabled.yaml index 13c2cc96dc6..3bf2d0568bc 100644 --- a/cloud/alibaba/oss/limit-networkaccess-disabled.yaml +++ b/cloud/alibaba/oss/limit-networkaccess-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/oss/oos-bucket-public-access.yaml b/cloud/alibaba/oss/oos-bucket-public-access.yaml index 6ea54d62059..875d4af2634 100644 --- a/cloud/alibaba/oss/oos-bucket-public-access.yaml +++ b/cloud/alibaba/oss/oos-bucket-public-access.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/oss/secure-transfeross-disabled.yaml b/cloud/alibaba/oss/secure-transfeross-disabled.yaml index 5003a7100f9..185d83c262c 100644 --- a/cloud/alibaba/oss/secure-transfeross-disabled.yaml +++ b/cloud/alibaba/oss/secure-transfeross-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/oss/sse-cmk-disabled.yaml b/cloud/alibaba/oss/sse-cmk-disabled.yaml index e2be9846b8b..a9e3a212444 100644 --- a/cloud/alibaba/oss/sse-cmk-disabled.yaml +++ b/cloud/alibaba/oss/sse-cmk-disabled.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ecs,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,ecs variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/oss/sse-smk-disabled.yaml b/cloud/alibaba/oss/sse-smk-disabled.yaml index 10372159bd1..63a6b085303 100644 --- a/cloud/alibaba/oss/sse-smk-disabled.yaml +++ b/cloud/alibaba/oss/sse-smk-disabled.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,oss,vuln + tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,oss variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/custom-ram-policy-admin-priv.yaml b/cloud/alibaba/ram/custom-ram-policy-admin-priv.yaml index 44585772d0f..150d18438d7 100644 --- a/cloud/alibaba/ram/custom-ram-policy-admin-priv.yaml +++ b/cloud/alibaba/ram/custom-ram-policy-admin-priv.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/max-password-retry-disabled.yaml b/cloud/alibaba/ram/max-password-retry-disabled.yaml index 0798f56f674..8c19a5e2673 100644 --- a/cloud/alibaba/ram/max-password-retry-disabled.yaml +++ b/cloud/alibaba/ram/max-password-retry-disabled.yaml @@ -11,7 +11,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/mfa-console-password-disabled.yaml b/cloud/alibaba/ram/mfa-console-password-disabled.yaml index 5c24f8d6c2e..efb84fd8e6e 100644 --- a/cloud/alibaba/ram/mfa-console-password-disabled.yaml +++ b/cloud/alibaba/ram/mfa-console-password-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/password-policy-expiration-unconfigured.yaml b/cloud/alibaba/ram/password-policy-expiration-unconfigured.yaml index ea3633aa53e..3cfef5f5450 100644 --- a/cloud/alibaba/ram/password-policy-expiration-unconfigured.yaml +++ b/cloud/alibaba/ram/password-policy-expiration-unconfigured.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/password-policy-length-unconfigured.yaml b/cloud/alibaba/ram/password-policy-length-unconfigured.yaml index 60fccd1d7b0..50adacbaf0f 100644 --- a/cloud/alibaba/ram/password-policy-length-unconfigured.yaml +++ b/cloud/alibaba/ram/password-policy-length-unconfigured.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/password-policy-lowercase-unconfigured.yaml b/cloud/alibaba/ram/password-policy-lowercase-unconfigured.yaml index 595c64efc97..3d4e1092c17 100644 --- a/cloud/alibaba/ram/password-policy-lowercase-unconfigured.yaml +++ b/cloud/alibaba/ram/password-policy-lowercase-unconfigured.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/password-policy-num-unconfigured.yaml b/cloud/alibaba/ram/password-policy-num-unconfigured.yaml index 7fef13c3287..b38810a7a9e 100644 --- a/cloud/alibaba/ram/password-policy-num-unconfigured.yaml +++ b/cloud/alibaba/ram/password-policy-num-unconfigured.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/password-policy-reuse-enabled.yaml b/cloud/alibaba/ram/password-policy-reuse-enabled.yaml index 8e9d7f06bda..2f01956cec4 100644 --- a/cloud/alibaba/ram/password-policy-reuse-enabled.yaml +++ b/cloud/alibaba/ram/password-policy-reuse-enabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/password-policy-symbol-unconfigured.yaml b/cloud/alibaba/ram/password-policy-symbol-unconfigured.yaml index 90a6e3e42c8..bcb4cc23750 100644 --- a/cloud/alibaba/ram/password-policy-symbol-unconfigured.yaml +++ b/cloud/alibaba/ram/password-policy-symbol-unconfigured.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/ram/password-policy-uppercase-unconfigured.yaml b/cloud/alibaba/ram/password-policy-uppercase-unconfigured.yaml index cfc8b103f7f..b1a5d7bb8a4 100644 --- a/cloud/alibaba/ram/password-policy-uppercase-unconfigured.yaml +++ b/cloud/alibaba/ram/password-policy-uppercase-unconfigured.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-ram variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/rds/encryption-intransit-disabled.yaml b/cloud/alibaba/rds/encryption-intransit-disabled.yaml index 324474f7585..f2c0a51c89e 100644 --- a/cloud/alibaba/rds/encryption-intransit-disabled.yaml +++ b/cloud/alibaba/rds/encryption-intransit-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/rds/log-connections-disabled.yaml b/cloud/alibaba/rds/log-connections-disabled.yaml index b095decac6c..94d57eea46e 100644 --- a/cloud/alibaba/rds/log-connections-disabled.yaml +++ b/cloud/alibaba/rds/log-connections-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/rds/log-disconnections-disabled.yaml b/cloud/alibaba/rds/log-disconnections-disabled.yaml index 78e0fb0be90..da4adb5a335 100644 --- a/cloud/alibaba/rds/log-disconnections-disabled.yaml +++ b/cloud/alibaba/rds/log-disconnections-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/rds/log-duration-disabled.yaml b/cloud/alibaba/rds/log-duration-disabled.yaml index 4e5f0e7aac6..31d2f064f06 100644 --- a/cloud/alibaba/rds/log-duration-disabled.yaml +++ b/cloud/alibaba/rds/log-duration-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/rds/mssql-audit-disabled.yaml b/cloud/alibaba/rds/mssql-audit-disabled.yaml index 4f396093027..6e58a76cf83 100644 --- a/cloud/alibaba/rds/mssql-audit-disabled.yaml +++ b/cloud/alibaba/rds/mssql-audit-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/rds/mysql-audit-disabled.yaml b/cloud/alibaba/rds/mysql-audit-disabled.yaml index f9ec65b355a..4de08e50011 100644 --- a/cloud/alibaba/rds/mysql-audit-disabled.yaml +++ b/cloud/alibaba/rds/mysql-audit-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/rds/postgresql-audit-disabled.yaml b/cloud/alibaba/rds/postgresql-audit-disabled.yaml index c18d098f8c2..0b4dd7deddb 100644 --- a/cloud/alibaba/rds/postgresql-audit-disabled.yaml +++ b/cloud/alibaba/rds/postgresql-audit-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/rds/rds-audit-disabled.yaml b/cloud/alibaba/rds/rds-audit-disabled.yaml index 9c1958718a7..8426d5df31e 100644 --- a/cloud/alibaba/rds/rds-audit-disabled.yaml +++ b/cloud/alibaba/rds/rds-audit-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/rds/transparent-encryption-disabled.yaml b/cloud/alibaba/rds/transparent-encryption-disabled.yaml index ef621372b23..d41aa6f1446 100644 --- a/cloud/alibaba/rds/transparent-encryption-disabled.yaml +++ b/cloud/alibaba/rds/transparent-encryption-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 2 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/security-center/scheduled-vulnscan-disabled.yaml b/cloud/alibaba/security-center/scheduled-vulnscan-disabled.yaml index ba7eaeacee6..aa437b2449a 100644 --- a/cloud/alibaba/security-center/scheduled-vulnscan-disabled.yaml +++ b/cloud/alibaba/security-center/scheduled-vulnscan-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,security-center,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,security-center variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/security-center/security-notification-disabled.yaml b/cloud/alibaba/security-center/security-notification-disabled.yaml index 3ed4d8afe97..3f6d1b746af 100644 --- a/cloud/alibaba/security-center/security-notification-disabled.yaml +++ b/cloud/alibaba/security-center/security-notification-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,security-center,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,security-center variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/security-center/security-plan-disabled.yaml b/cloud/alibaba/security-center/security-plan-disabled.yaml index 2f47687ccdc..3a059ba29a7 100644 --- a/cloud/alibaba/security-center/security-plan-disabled.yaml +++ b/cloud/alibaba/security-center/security-plan-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,security-center,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,security-center variables: region: "cn-hangzhou" diff --git a/cloud/alibaba/vpc/vpc-flow-disabled.yaml b/cloud/alibaba/vpc/vpc-flow-disabled.yaml index 6bdec23f775..beed1fad176 100644 --- a/cloud/alibaba/vpc/vpc-flow-disabled.yaml +++ b/cloud/alibaba/vpc/vpc-flow-disabled.yaml @@ -12,7 +12,7 @@ info: metadata: max-request: 1 verified: true - tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-vpc,vuln + tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-vpc variables: region: "cn-hangzhou" diff --git a/cloud/aws/acm/acm-cert-expired.yaml b/cloud/aws/acm/acm-cert-expired.yaml index 3bcf741e245..6e009dfbbe9 100644 --- a/cloud/aws/acm/acm-cert-expired.yaml +++ b/cloud/aws/acm/acm-cert-expired.yaml @@ -11,7 +11,7 @@ info: Regularly review ACM for expired certificates and delete them or replace with updated versions. reference: - https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html - tags: cloud,devops,aws,amazon,acm,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,acm,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/acm/acm-cert-renewal-30days.yaml b/cloud/aws/acm/acm-cert-renewal-30days.yaml index 40a3818aae5..c92b10cdfad 100644 --- a/cloud/aws/acm/acm-cert-renewal-30days.yaml +++ b/cloud/aws/acm/acm-cert-renewal-30days.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/acm/latest/userguide/acm-renewal.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,acm,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,acm,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/acm/acm-cert-renewal-45days.yaml b/cloud/aws/acm/acm-cert-renewal-45days.yaml index 203fe09a3cd..7ea919bead6 100644 --- a/cloud/aws/acm/acm-cert-renewal-45days.yaml +++ b/cloud/aws/acm/acm-cert-renewal-45days.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/acm/latest/userguide/acm-renewal.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,acm,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,acm,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/acm/acm-cert-validation.yaml b/cloud/aws/acm/acm-cert-validation.yaml index d30a01cd198..002b2906fb6 100644 --- a/cloud/aws/acm/acm-cert-validation.yaml +++ b/cloud/aws/acm/acm-cert-validation.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/acm/latest/userguide/gs-acm-validate.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,acm,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,acm,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/acm/acm-wildcard-cert.yaml b/cloud/aws/acm/acm-wildcard-cert.yaml index e91dc7a4dc4..25f9d451e79 100644 --- a/cloud/aws/acm/acm-wildcard-cert.yaml +++ b/cloud/aws/acm/acm-wildcard-cert.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/acm/latest/userguide/acm-certificate.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,acm,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,acm,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/aws-code-env.yaml b/cloud/aws/aws-code-env.yaml index d4011a71e5b..eeb22adc32e 100644 --- a/cloud/aws/aws-code-env.yaml +++ b/cloud/aws/aws-code-env.yaml @@ -9,7 +9,7 @@ info: - https://aws.amazon.com/cli/ metadata: max-request: 2 - tags: cloud,devops,aws,amazone,aws-cloud-config,vuln + tags: cloud,devops,aws,amazone,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/cloudformation/stack-notification-disabled.yaml b/cloud/aws/cloudformation/stack-notification-disabled.yaml index 5c29f2a047c..e4a4666de1d 100644 --- a/cloud/aws/cloudformation/stack-notification-disabled.yaml +++ b/cloud/aws/cloudformation/stack-notification-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/cloudformation-stack-notification.html - http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-stack.html - tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudformation/stack-policy-not-inuse.yaml b/cloud/aws/cloudformation/stack-policy-not-inuse.yaml index a19e42a04df..0ec3f6a1e27 100644 --- a/cloud/aws/cloudformation/stack-policy-not-inuse.yaml +++ b/cloud/aws/cloudformation/stack-policy-not-inuse.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/cloudformation-stack-policy.html - http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/protect-stack-resources.html - tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudformation/stack-termination-disabled.yaml b/cloud/aws/cloudformation/stack-termination-disabled.yaml index 5c1dddc69e4..b0468ff6a32 100644 --- a/cloud/aws/cloudformation/stack-termination-disabled.yaml +++ b/cloud/aws/cloudformation/stack-termination-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFormation/stack-termination-protection.html - http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-protect-stacks.html - tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-compress-object.yaml b/cloud/aws/cloudfront/cloudfront-compress-object.yaml index d8db5dc5bf6..7cb8c58aed0 100644 --- a/cloud/aws/cloudfront/cloudfront-compress-object.yaml +++ b/cloud/aws/cloudfront/cloudfront-compress-object.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/compress-objects-automatically.html - https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/ServingCompressedFiles.html - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-custom-certificates.yaml b/cloud/aws/cloudfront/cloudfront-custom-certificates.yaml index 02f67326b58..5b43972df65 100644 --- a/cloud/aws/cloudfront/cloudfront-custom-certificates.yaml +++ b/cloud/aws/cloudfront/cloudfront-custom-certificates.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-distro-custom-tls.html - https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/CNAMEs.html - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-geo-restriction.yaml b/cloud/aws/cloudfront/cloudfront-geo-restriction.yaml index 28589b5b813..c742d1ccebb 100644 --- a/cloud/aws/cloudfront/cloudfront-geo-restriction.yaml +++ b/cloud/aws/cloudfront/cloudfront-geo-restriction.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/geo-restriction.html - https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/georestrictions.html - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-insecure-protocol.yaml b/cloud/aws/cloudfront/cloudfront-insecure-protocol.yaml index be7a1322a9d..aa30c2169b5 100644 --- a/cloud/aws/cloudfront/cloudfront-insecure-protocol.yaml +++ b/cloud/aws/cloudfront/cloudfront-insecure-protocol.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-insecure-origin-ssl-protocols.html - http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/SecureConnections.html - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-integrated-waf.yaml b/cloud/aws/cloudfront/cloudfront-integrated-waf.yaml index fa4c4f41182..ae70315daa6 100644 --- a/cloud/aws/cloudfront/cloudfront-integrated-waf.yaml +++ b/cloud/aws/cloudfront/cloudfront-integrated-waf.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-integrated-with-waf.html - http://docs.aws.amazon.com/waf/latest/developerguide/what-is-aws-waf.html - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-logging-disabled.yaml b/cloud/aws/cloudfront/cloudfront-logging-disabled.yaml index 70d50f657d0..4632fd851c3 100644 --- a/cloud/aws/cloudfront/cloudfront-logging-disabled.yaml +++ b/cloud/aws/cloudfront/cloudfront-logging-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-logging-enabled.html - http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/AccessLogs.html - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-origin-shield.yaml b/cloud/aws/cloudfront/cloudfront-origin-shield.yaml index ae1a73ced31..2f8d724c5f1 100644 --- a/cloud/aws/cloudfront/cloudfront-origin-shield.yaml +++ b/cloud/aws/cloudfront/cloudfront-origin-shield.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/enable-origin-shield.html - https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/origin-shield.html - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-security-policy.yaml b/cloud/aws/cloudfront/cloudfront-security-policy.yaml index de34a1183b8..b7e61f30187 100644 --- a/cloud/aws/cloudfront/cloudfront-security-policy.yaml +++ b/cloud/aws/cloudfront/cloudfront-security-policy.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/security-policy.html - https://aws.amazon.com/about-aws/whats-new/2017/09/amazon-cloudfront-now-lets-you-select-a-security-policy-with-minimum-tls-v1_1-1_2-and-security-ciphers-for-viewer-connections/ - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-traffic-unencrypted.yaml b/cloud/aws/cloudfront/cloudfront-traffic-unencrypted.yaml index 5f81da73bb3..902ab638f1a 100644 --- a/cloud/aws/cloudfront/cloudfront-traffic-unencrypted.yaml +++ b/cloud/aws/cloudfront/cloudfront-traffic-unencrypted.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/cloudfront-traffic-to-origin-unencrypted.html - http://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/SecureConnections.html - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudfront/cloudfront-viewer-policy.yaml b/cloud/aws/cloudfront/cloudfront-viewer-policy.yaml index 0dcbd550df8..18934871225 100644 --- a/cloud/aws/cloudfront/cloudfront-viewer-policy.yaml +++ b/cloud/aws/cloudfront/cloudfront-viewer-policy.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/CloudFront/viewer-protocol-policy.html - https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html - tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/cloudtrail/cloudtrail-data-events.yaml b/cloud/aws/cloudtrail/cloudtrail-data-events.yaml index c2f796505b4..21fd42e1a3e 100644 --- a/cloud/aws/cloudtrail/cloudtrail-data-events.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-data-events.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,cloudtrail,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,cloudtrail,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-disabled.yaml b/cloud/aws/cloudtrail/cloudtrail-disabled.yaml index e97234f4d3d..6b61db3942c 100644 --- a/cloud/aws/cloudtrail/cloudtrail-disabled.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-disabled.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-getting-started.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-dup-logs.yaml b/cloud/aws/cloudtrail/cloudtrail-dup-logs.yaml index abfbb3c297c..bd07c1920e6 100644 --- a/cloud/aws/cloudtrail/cloudtrail-dup-logs.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-dup-logs.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-find-log-files.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-global-disabled.yaml b/cloud/aws/cloudtrail/cloudtrail-global-disabled.yaml index 82819090206..66682be666d 100644 --- a/cloud/aws/cloudtrail/cloudtrail-global-disabled.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-global-disabled.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-create-and-update-a-trail.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-integrated-cloudwatch.yaml b/cloud/aws/cloudtrail/cloudtrail-integrated-cloudwatch.yaml index e5723e042cc..4362fb9a46f 100644 --- a/cloud/aws/cloudtrail/cloudtrail-integrated-cloudwatch.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-integrated-cloudwatch.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/send-cloudtrail-events-to-cloudwatch-logs.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,cloudtrail,cloudwatch,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudtrail,cloudwatch,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-log-integrity.yaml b/cloud/aws/cloudtrail/cloudtrail-log-integrity.yaml index 6b6e3986d96..71fa371f969 100644 --- a/cloud/aws/cloudtrail/cloudtrail-log-integrity.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-log-integrity.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-log-file-validation-intro.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-logs-not-encrypted.yaml b/cloud/aws/cloudtrail/cloudtrail-logs-not-encrypted.yaml index e66f8b00021..bc5a1c899fd 100644 --- a/cloud/aws/cloudtrail/cloudtrail-logs-not-encrypted.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-logs-not-encrypted.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/encrypting-cloudtrail-log-files-with-aws-kms.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-mfa-delete.yaml b/cloud/aws/cloudtrail/cloudtrail-mfa-delete.yaml index 00a2355f670..5b538259d84 100644 --- a/cloud/aws/cloudtrail/cloudtrail-mfa-delete.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-mfa-delete.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonS3/latest/userguide/MultiFactorAuthenticationDelete.html metadata: max-request: 3 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-mgmt-events.yaml b/cloud/aws/cloudtrail/cloudtrail-mgmt-events.yaml index 533f0ad6f1f..7457e8168d7 100644 --- a/cloud/aws/cloudtrail/cloudtrail-mgmt-events.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-mgmt-events.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-and-data-events-with-cloudtrail.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-public-buckets.yaml b/cloud/aws/cloudtrail/cloudtrail-public-buckets.yaml index 912467a2b57..e81204af505 100644 --- a/cloud/aws/cloudtrail/cloudtrail-public-buckets.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-public-buckets.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-find-log-files.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/cloudtrail-s3-bucket-logging.yaml b/cloud/aws/cloudtrail/cloudtrail-s3-bucket-logging.yaml index 2ce6efde090..863967e5612 100644 --- a/cloud/aws/cloudtrail/cloudtrail-s3-bucket-logging.yaml +++ b/cloud/aws/cloudtrail/cloudtrail-s3-bucket-logging.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-log-file-validation-intro.html metadata: max-request: 3 - tags: cloud,devops,aws,amazon,s3,cloudtrail,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,cloudtrail,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudtrail/s3-object-lock-not-enabled.yaml b/cloud/aws/cloudtrail/s3-object-lock-not-enabled.yaml index b02f31afd1e..fcfac797483 100644 --- a/cloud/aws/cloudtrail/s3-object-lock-not-enabled.yaml +++ b/cloud/aws/cloudtrail/s3-object-lock-not-enabled.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonS3/latest/dev/object-lock-overview.html metadata: max-request: 3 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config variables: region: "ap-south-1" diff --git a/cloud/aws/cloudwatch/cw-alarm-action-set.yaml b/cloud/aws/cloudwatch/cw-alarm-action-set.yaml index 6c824b3e93d..c845b95aab9 100644 --- a/cloud/aws/cloudwatch/cw-alarm-action-set.yaml +++ b/cloud/aws/cloudwatch/cw-alarm-action-set.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/AlarmThatSendsEmail.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,cloudwatch,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudwatch,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/cloudwatch/cw-alarms-actions.yaml b/cloud/aws/cloudwatch/cw-alarms-actions.yaml index a4d1d964efd..d527bdc55aa 100644 --- a/cloud/aws/cloudwatch/cw-alarms-actions.yaml +++ b/cloud/aws/cloudwatch/cw-alarms-actions.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/AlarmThatSendsEmail.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,cloudwatch,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,cloudwatch,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/dms/dms-multi-az.yaml b/cloud/aws/dms/dms-multi-az.yaml index c9d46a2d74d..0cea92e23f3 100644 --- a/cloud/aws/dms/dms-multi-az.yaml +++ b/cloud/aws/dms/dms-multi-az.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/DMS/multi-az.html - https://docs.aws.amazon.com/cli/latest/reference/dms/describe-replication-instances.html - tags: cloud,devops,aws,amazon,dms,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,dms,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/dms/dms-public-access.yaml b/cloud/aws/dms/dms-public-access.yaml index ad75809fb67..62f4ec7a11a 100644 --- a/cloud/aws/dms/dms-public-access.yaml +++ b/cloud/aws/dms/dms-public-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/DMS/publicly-accessible.html - https://docs.aws.amazon.com/dms/latest/userguide/CHAP_ReplicationInstance.html - tags: cloud,devops,aws,amazon,dms,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,dms,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/dms/dms-version-upgrade.yaml b/cloud/aws/dms/dms-version-upgrade.yaml index 849e6b47504..be6ab7aaa99 100644 --- a/cloud/aws/dms/dms-version-upgrade.yaml +++ b/cloud/aws/dms/dms-version-upgrade.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/DMS/auto-minor-version-upgrade.html - https://docs.aws.amazon.com/cli/latest/reference/dms/index.html - tags: cloud,devops,aws,amazon,dms,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,dms,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/ebs/ebs-encryption-disabled.yaml b/cloud/aws/ebs/ebs-encryption-disabled.yaml index 540b69fb67b..d6c6da5e373 100644 --- a/cloud/aws/ebs/ebs-encryption-disabled.yaml +++ b/cloud/aws/ebs/ebs-encryption-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/EBS/ebs-encrypted.html - http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html - tags: cloud,devops,aws,amazon,ebs,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ebs,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/ec2/ec2-imdsv2.yaml b/cloud/aws/ec2/ec2-imdsv2.yaml index afba7b9e987..e0f46d0df1b 100644 --- a/cloud/aws/ec2/ec2-imdsv2.yaml +++ b/cloud/aws/ec2/ec2-imdsv2.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-service.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-public-ip.yaml b/cloud/aws/ec2/ec2-public-ip.yaml index 26ad600928d..1ffae4f4099 100644 --- a/cloud/aws/ec2/ec2-public-ip.yaml +++ b/cloud/aws/ec2/ec2-public-ip.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-instance-addressing.html#concepts-public-addresses metadata: max-request: 2 - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-sg-egress-open.yaml b/cloud/aws/ec2/ec2-sg-egress-open.yaml index 340f9294a87..6df6e1b33e6 100644 --- a/cloud/aws/ec2/ec2-sg-egress-open.yaml +++ b/cloud/aws/ec2/ec2-sg-egress-open.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html#sg-rules metadata: max-request: 2 - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-sg-ingress.yaml b/cloud/aws/ec2/ec2-sg-ingress.yaml index e56bfd9ae0f..52c6507e117 100644 --- a/cloud/aws/ec2/ec2-sg-ingress.yaml +++ b/cloud/aws/ec2/ec2-sg-ingress.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-cifs.yaml b/cloud/aws/ec2/ec2-unrestricted-cifs.yaml index cb32c04a7f8..8f806fc46b8 100644 --- a/cloud/aws/ec2/ec2-unrestricted-cifs.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-cifs.yaml @@ -11,7 +11,7 @@ info: Restrict inbound access on TCP port 445 to known IPs or ranges. Regularly review security group configurations to ensure compliance with security policies. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-dns.yaml b/cloud/aws/ec2/ec2-unrestricted-dns.yaml index 8b4c1ec2d66..0ad9bb6bfc0 100644 --- a/cloud/aws/ec2/ec2-unrestricted-dns.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-dns.yaml @@ -11,7 +11,7 @@ info: Restrict the inbound rules for TCP/UDP port 53 in EC2 security groups to known, trusted IPs only. Ensure security group rules are tightly controlled and monitored. reference: - https://docs.aws.amazon.com/vpc/latest/userguide/VPC_SecurityGroups.html#SecurityGroupRules - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-ftp.yaml b/cloud/aws/ec2/ec2-unrestricted-ftp.yaml index 9ec89a77094..518c6269c56 100644 --- a/cloud/aws/ec2/ec2-unrestricted-ftp.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-ftp.yaml @@ -11,7 +11,7 @@ info: Restrict inbound access on TCP ports 20 and 21 for EC2 security groups to known IPs or remove the rules if FTP is not required. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html#security-group-rules - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-http.yaml b/cloud/aws/ec2/ec2-unrestricted-http.yaml index 34b383d53da..5bde85ff2c3 100644 --- a/cloud/aws/ec2/ec2-unrestricted-http.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-http.yaml @@ -11,7 +11,7 @@ info: Restrict inbound traffic on TCP port 80 to only necessary IP addresses, adhering to the principle of least privilege. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-https.yaml b/cloud/aws/ec2/ec2-unrestricted-https.yaml index d6457dee50f..9bc42bce7e6 100644 --- a/cloud/aws/ec2/ec2-unrestricted-https.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-https.yaml @@ -11,7 +11,7 @@ info: Restrict inbound traffic on TCP port 443 to only necessary IP addresses, adhering to the principle of least privilege. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-icmp.yaml b/cloud/aws/ec2/ec2-unrestricted-icmp.yaml index a9d59192515..dc1f06023b0 100644 --- a/cloud/aws/ec2/ec2-unrestricted-icmp.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-icmp.yaml @@ -11,7 +11,7 @@ info: Modify EC2 security group rules to limit ICMP access to necessary, trusted IP addresses/ranges only. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: diff --git a/cloud/aws/ec2/ec2-unrestricted-memcached.yaml b/cloud/aws/ec2/ec2-unrestricted-memcached.yaml index 69d672d1d6d..0b742c296be 100644 --- a/cloud/aws/ec2/ec2-unrestricted-memcached.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-memcached.yaml @@ -11,7 +11,7 @@ info: Restrict inbound access to Memcached by updating EC2 security group rules to allow only trusted IPs to connect on TCP/UDP port 11211. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-mongodb.yaml b/cloud/aws/ec2/ec2-unrestricted-mongodb.yaml index 5381458395d..75ef5716106 100644 --- a/cloud/aws/ec2/ec2-unrestricted-mongodb.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-mongodb.yaml @@ -12,7 +12,7 @@ info: reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html - https://www.mongodb.com/docs/manual/security/ - tags: cloud,devops,aws,amazon,ec2,mongodb,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,mongodb,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-mssql.yaml b/cloud/aws/ec2/ec2-unrestricted-mssql.yaml index c58c83922d4..42fe5c027f8 100644 --- a/cloud/aws/ec2/ec2-unrestricted-mssql.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-mssql.yaml @@ -11,7 +11,7 @@ info: Restrict inbound traffic on TCP port 1433 to known, secure IP addresses. Regularly review and update security group rules to maintain minimal access requirements. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-mysql.yaml b/cloud/aws/ec2/ec2-unrestricted-mysql.yaml index 758f9594192..6402d38b870 100644 --- a/cloud/aws/ec2/ec2-unrestricted-mysql.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-mysql.yaml @@ -11,7 +11,7 @@ info: Restrict inbound access on TCP port 3306 to known, necessary IP addresses or ranges, and avoid using 0.0.0.0/0 or ::/0. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-netbios.yaml b/cloud/aws/ec2/ec2-unrestricted-netbios.yaml index 06db93e855f..3844bdbb704 100644 --- a/cloud/aws/ec2/ec2-unrestricted-netbios.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-netbios.yaml @@ -11,7 +11,7 @@ info: Restrict access to TCP port 139 and UDP ports 137 and 138 in EC2 security groups. Implement strict access control based on the principle of least privilege. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-opensearch.yaml b/cloud/aws/ec2/ec2-unrestricted-opensearch.yaml index 1ceff98337a..f52b585cd22 100644 --- a/cloud/aws/ec2/ec2-unrestricted-opensearch.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-opensearch.yaml @@ -11,7 +11,7 @@ info: Modify EC2 security group rules to limit access to TCP port 9200 for OpenSearch, allowing only necessary IPs, implementing the principle of least privilege. reference: - https://en.wikipedia.org/wiki/OpenSearch - tags: cloud,devops,aws,amazon,opensearch,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,opensearch,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-oracle.yaml b/cloud/aws/ec2/ec2-unrestricted-oracle.yaml index f05a86b4a57..3be5bba2f7c 100644 --- a/cloud/aws/ec2/ec2-unrestricted-oracle.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-oracle.yaml @@ -11,7 +11,7 @@ info: Restrict inbound traffic on TCP port 1521 to known IPs or ranges and employ strict access controls. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-pgsql.yaml b/cloud/aws/ec2/ec2-unrestricted-pgsql.yaml index 834ae5849e6..0c8f224cc56 100644 --- a/cloud/aws/ec2/ec2-unrestricted-pgsql.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-pgsql.yaml @@ -11,7 +11,7 @@ info: Restrict inbound traffic to PostgreSQL servers by setting stringent rules in EC2 security groups, limiting access to specific IPs or ranges. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html#security-group-rules - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-rdp.yaml b/cloud/aws/ec2/ec2-unrestricted-rdp.yaml index 757b13b34fe..e6afb9db992 100644 --- a/cloud/aws/ec2/ec2-unrestricted-rdp.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-rdp.yaml @@ -11,7 +11,7 @@ info: Modify the EC2 security group rules to limit RDP access (TCP 3389) to known, trusted IP addresses or ranges. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/authorizing-access-to-an-instance.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-redis.yaml b/cloud/aws/ec2/ec2-unrestricted-redis.yaml index 25773e1c6b6..6a0bf8f31b9 100644 --- a/cloud/aws/ec2/ec2-unrestricted-redis.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-redis.yaml @@ -11,7 +11,7 @@ info: Restrict inbound access to Redis instances by updating EC2 security group rules to allow only specific, trusted IP addresses. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-security-groups.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-smtp.yaml b/cloud/aws/ec2/ec2-unrestricted-smtp.yaml index 5903bd47a45..de8ba276133 100644 --- a/cloud/aws/ec2/ec2-unrestricted-smtp.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-smtp.yaml @@ -11,7 +11,7 @@ info: Restrict TCP port 25 access to known, necessary IP addresses only. Avoid using 0.0.0.0/0 or ::/0 in security group rules. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/authorizing-access-to-an-instance.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-ssh.yaml b/cloud/aws/ec2/ec2-unrestricted-ssh.yaml index 0ed24b838e8..747f03c8426 100644 --- a/cloud/aws/ec2/ec2-unrestricted-ssh.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-ssh.yaml @@ -11,7 +11,7 @@ info: Restrict SSH access in EC2 security groups to trusted IP addresses or ranges, adhering to the Principle of Least Privilege (POLP) and mitigating the risk of unauthorized access. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/security-group-rules-reference.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/ec2-unrestricted-telnet.yaml b/cloud/aws/ec2/ec2-unrestricted-telnet.yaml index b236cba9afe..e55b05f1dd9 100644 --- a/cloud/aws/ec2/ec2-unrestricted-telnet.yaml +++ b/cloud/aws/ec2/ec2-unrestricted-telnet.yaml @@ -11,7 +11,7 @@ info: Restrict inbound Telnet access by updating EC2 security group rules to allow only trusted IP ranges or disabling Telnet if not required. reference: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/authorizing-access-to-an-instance.html - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/publicly-shared-ami.yaml b/cloud/aws/ec2/publicly-shared-ami.yaml index ef856c33bd1..be077bb3c93 100644 --- a/cloud/aws/ec2/publicly-shared-ami.yaml +++ b/cloud/aws/ec2/publicly-shared-ami.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/sharingamis-explicit.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,ami,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ami,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/ec2/unencrypted-aws-ami.yaml b/cloud/aws/ec2/unencrypted-aws-ami.yaml index 83d9311065a..61e6ba0c074 100644 --- a/cloud/aws/ec2/unencrypted-aws-ami.yaml +++ b/cloud/aws/ec2/unencrypted-aws-ami.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AMIEncryption.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,ec2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,ec2,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/efs/efs-encryption-disabled.yaml b/cloud/aws/efs/efs-encryption-disabled.yaml index ab6d9e4b47b..e2c97278f21 100644 --- a/cloud/aws/efs/efs-encryption-disabled.yaml +++ b/cloud/aws/efs/efs-encryption-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/ElastiCache/in-transit-and-at-rest-encryption.html - https://docs.aws.amazon.com/efs/latest/ug/encryption.html - tags: cloud,devops,aws,amazon,efs-encryption-disabled,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,efs-encryption-disabled,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/eks/eks-aws-managed-iam-policy.yaml b/cloud/aws/eks/eks-aws-managed-iam-policy.yaml index 78c7d84ef73..b61ee6954e0 100644 --- a/cloud/aws/eks/eks-aws-managed-iam-policy.yaml +++ b/cloud/aws/eks/eks-aws-managed-iam-policy.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/EKS/eks-aws-managed-iam-policy.html - https://docs.aws.amazon.com/eks/latest/userguide/service_IAM_role.html - tags: cloud,devops,aws,amazon,eks,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,eks,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/eks/eks-cluster-logging.yaml b/cloud/aws/eks/eks-cluster-logging.yaml index f2f2b2ab727..84cb2d4cbf8 100644 --- a/cloud/aws/eks/eks-cluster-logging.yaml +++ b/cloud/aws/eks/eks-cluster-logging.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/EKS/cluster-logging.html - https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html - tags: cloud,devops,aws,amazon,eks,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,eks,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/eks/eks-endpoint-access.yaml b/cloud/aws/eks/eks-endpoint-access.yaml index a916390cdba..e387bfbeb4a 100644 --- a/cloud/aws/eks/eks-endpoint-access.yaml +++ b/cloud/aws/eks/eks-endpoint-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/EKS/endpoint-access.html - https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html - tags: cloud,devops,aws,amazon,eks,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,eks,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/eks/eks-iam-managed-policy-networking.yaml b/cloud/aws/eks/eks-iam-managed-policy-networking.yaml index 81a2b3954bd..1d58bbf0270 100644 --- a/cloud/aws/eks/eks-iam-managed-policy-networking.yaml +++ b/cloud/aws/eks/eks-iam-managed-policy-networking.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/EKS/eks-iam-managed-policy-networking.html - https://docs.aws.amazon.com/eks/latest/userguide/cni-iam-role.html - tags: cloud,devops,aws,amazon,eks,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,eks,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/eks/eks-kubernetes-secrets-encryption.yaml b/cloud/aws/eks/eks-kubernetes-secrets-encryption.yaml index 11bc870689a..92ab8c4a60a 100644 --- a/cloud/aws/eks/eks-kubernetes-secrets-encryption.yaml +++ b/cloud/aws/eks/eks-kubernetes-secrets-encryption.yaml @@ -13,7 +13,7 @@ info: reference: - https://docs.aws.amazon.com/eks/latest/userguide/encryption-configuration.html - https://docs.aws.amazon.com/eks/latest/userguide/update-cluster.html - tags: cloud,devops,aws,amazon,eks,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,eks,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/eks/eks-logging-kubes-api-calls.yaml b/cloud/aws/eks/eks-logging-kubes-api-calls.yaml index ca1bbda5185..7e177523c6d 100644 --- a/cloud/aws/eks/eks-logging-kubes-api-calls.yaml +++ b/cloud/aws/eks/eks-logging-kubes-api-calls.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/EKS/eks-logging-kubes-api-calls.html - https://docs.aws.amazon.com/eks/latest/userguide/logging-using-cloudtrail.html - tags: cloud,devops,aws,amazon,eks,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,eks,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/eks/eks-long-running-pods.yaml b/cloud/aws/eks/eks-long-running-pods.yaml index 617e3ea718f..42ef884a617 100644 --- a/cloud/aws/eks/eks-long-running-pods.yaml +++ b/cloud/aws/eks/eks-long-running-pods.yaml @@ -13,7 +13,7 @@ info: reference: - https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/ - https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html - tags: cloud,devops,aws,amazon,eks,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,eks,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/eks/eks-managed-policy-ecr-access.yaml b/cloud/aws/eks/eks-managed-policy-ecr-access.yaml index f31da45e347..6c31b33f56a 100644 --- a/cloud/aws/eks/eks-managed-policy-ecr-access.yaml +++ b/cloud/aws/eks/eks-managed-policy-ecr-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/EKS/managed-policy-ecr-access.html - https://docs.aws.amazon.com/AmazonECR/latest/userguide/ecr_managed_policies.html - tags: cloud,devops,aws,amazon,eks,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,eks,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/eks/eks-node-group-remote-access.yaml b/cloud/aws/eks/eks-node-group-remote-access.yaml index 1ffcc26b2df..e4e3597bb51 100644 --- a/cloud/aws/eks/eks-node-group-remote-access.yaml +++ b/cloud/aws/eks/eks-node-group-remote-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/aws/EKS/eks-node-group-remote-access.html - https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html - tags: cloud,devops,aws,amazon,eks,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,eks,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/elasticache/cache-automatic-backups-disabled.yaml b/cloud/aws/elasticache/cache-automatic-backups-disabled.yaml index c679db41bbf..3e6273f9e2a 100644 --- a/cloud/aws/elasticache/cache-automatic-backups-disabled.yaml +++ b/cloud/aws/elasticache/cache-automatic-backups-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/ElastiCache/enable-automatic-backups.html - https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/backups-automatic.html - tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/elasticache/cache-event-notification-disabled.yaml b/cloud/aws/elasticache/cache-event-notification-disabled.yaml index bb2ca6b4800..6e3ff4da3f5 100644 --- a/cloud/aws/elasticache/cache-event-notification-disabled.yaml +++ b/cloud/aws/elasticache/cache-event-notification-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/ElastiCache/enable-cluster-event-notifications.html - https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/ECEvents.SNS.html - tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/elasticache/cache-redis-encryption-disabled.yaml b/cloud/aws/elasticache/cache-redis-encryption-disabled.yaml index effdcbee987..42681142f28 100644 --- a/cloud/aws/elasticache/cache-redis-encryption-disabled.yaml +++ b/cloud/aws/elasticache/cache-redis-encryption-disabled.yaml @@ -14,7 +14,7 @@ info: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/ElastiCache/in-transit-and-at-rest-encryption.html - https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/in-transit-encryption.html - https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/at-rest-encryption.html - tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/elasticache/cache-redis-multiaz-disabled.yaml b/cloud/aws/elasticache/cache-redis-multiaz-disabled.yaml index 023b6e22a3b..ad678296cb2 100644 --- a/cloud/aws/elasticache/cache-redis-multiaz-disabled.yaml +++ b/cloud/aws/elasticache/cache-redis-multiaz-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/ElastiCache/elasticache-multi-az.html - https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/WhatIs.Components.html - tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/elb/elb-delete-protection-disabled.yaml b/cloud/aws/elb/elb-delete-protection-disabled.yaml index 46c3b3bea1b..92757e8e96c 100644 --- a/cloud/aws/elb/elb-delete-protection-disabled.yaml +++ b/cloud/aws/elb/elb-delete-protection-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/ELBv2/enable-gwlb-deletion-protection.html - https://awscli.amazonaws.com/v2/documentation/api/latest/reference/elbv2/index.html - tags: cloud, devops, aws, amazon, elb, aws-cloud-config,vuln + tags: cloud, devops, aws, amazon, elb, aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/firehose/firehose-server-destination-encryption.yaml b/cloud/aws/firehose/firehose-server-destination-encryption.yaml index ddfbbb8825d..c3151d89bcc 100644 --- a/cloud/aws/firehose/firehose-server-destination-encryption.yaml +++ b/cloud/aws/firehose/firehose-server-destination-encryption.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/Firehose/delivery-stream-destination-encryption.html - https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html - tags: cloud,devops,aws,amazon,firehose,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,firehose,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/firehose/firehose-server-side-encryption.yaml b/cloud/aws/firehose/firehose-server-side-encryption.yaml index 6c83f84c8f9..b7f05eba0d4 100644 --- a/cloud/aws/firehose/firehose-server-side-encryption.yaml +++ b/cloud/aws/firehose/firehose-server-side-encryption.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/Firehose/delivery-stream-encrypted-with-kms-customer-master-keys.html - https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html - tags: cloud,devops,aws,amazon,firehose,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,firehose,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/guardduty/guardduty-findings.yaml b/cloud/aws/guardduty/guardduty-findings.yaml index 0ac465e153e..d038fcaa070 100644 --- a/cloud/aws/guardduty/guardduty-findings.yaml +++ b/cloud/aws/guardduty/guardduty-findings.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/GuardDuty/findings.html - https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_findings.html - tags: cloud,devops,aws,amazon,guardduty,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,guardduty,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/guardduty/guardduty-not-enabled.yaml b/cloud/aws/guardduty/guardduty-not-enabled.yaml index 1df3af371e1..3d8edd19975 100644 --- a/cloud/aws/guardduty/guardduty-not-enabled.yaml +++ b/cloud/aws/guardduty/guardduty-not-enabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/GuardDuty/guardduty-enabled.html - https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_settingup.html - tags: cloud,devops,aws,amazon,guardduty,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,guardduty,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/guardduty/malware-protection-disabled.yaml b/cloud/aws/guardduty/malware-protection-disabled.yaml index d04d15c0e54..208b48a2f7a 100644 --- a/cloud/aws/guardduty/malware-protection-disabled.yaml +++ b/cloud/aws/guardduty/malware-protection-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/GuardDuty/enable-malware-protection.html - https://docs.aws.amazon.com/guardduty/latest/ug/malware-protection.html - tags: cloud,devops,aws,amazon,guardduty,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,guardduty,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/guardduty/s3-protection-disabled.yaml b/cloud/aws/guardduty/s3-protection-disabled.yaml index 38a96cdcb10..1c3221968d0 100644 --- a/cloud/aws/guardduty/s3-protection-disabled.yaml +++ b/cloud/aws/guardduty/s3-protection-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/GuardDuty/enable-s3-protection.html - https://docs.aws.amazon.com/guardduty/latest/ug/s3-protection.html - tags: cloud,devops,aws,amazon,guardduty,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,guardduty,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/iam/iam-access-analyzer.yaml b/cloud/aws/iam/iam-access-analyzer.yaml index 42dce90055a..ea7a0c64c1a 100644 --- a/cloud/aws/iam/iam-access-analyzer.yaml +++ b/cloud/aws/iam/iam-access-analyzer.yaml @@ -7,7 +7,7 @@ info: Checks if Amazon IAM Access Analyzer is active for identifying unsolicited access risks in AWS resources reference: - https://docs.aws.amazon.com/cli/latest/reference/accessanalyzer/list-analyzers.html - tags: cloud,devops,aws,amazon,iam,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,aws-cloud-config self-contained: true code: diff --git a/cloud/aws/iam/iam-expired-ssl.yaml b/cloud/aws/iam/iam-expired-ssl.yaml index 5a6e792ef0d..dfcd267f515 100644 --- a/cloud/aws/iam/iam-expired-ssl.yaml +++ b/cloud/aws/iam/iam-expired-ssl.yaml @@ -7,7 +7,7 @@ info: Checks for expired SSL/TLS certificates from AWS IAM reference: - https://docs.aws.amazon.com/cli/latest/reference/iam/list-server-certificates.html - tags: cloud,devops,aws,amazon,iam,ssl,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,ssl,aws-cloud-config self-contained: true code: diff --git a/cloud/aws/iam/iam-full-admin-privileges.yaml b/cloud/aws/iam/iam-full-admin-privileges.yaml index bf8aa005e00..8c12f391e89 100644 --- a/cloud/aws/iam/iam-full-admin-privileges.yaml +++ b/cloud/aws/iam/iam-full-admin-privileges.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/iam/get-policy-version.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,iam,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/iam/iam-key-rotation-90days.yaml b/cloud/aws/iam/iam-key-rotation-90days.yaml index f4b8c035a1a..cef15e2fbfb 100644 --- a/cloud/aws/iam/iam-key-rotation-90days.yaml +++ b/cloud/aws/iam/iam-key-rotation-90days.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/iam/list-access-keys.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,iam,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/iam/iam-mfa-enable.yaml b/cloud/aws/iam/iam-mfa-enable.yaml index 26f0cd3f07d..754ce2c38a2 100644 --- a/cloud/aws/iam/iam-mfa-enable.yaml +++ b/cloud/aws/iam/iam-mfa-enable.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/iam/list-mfa-devices.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,iam,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/iam/iam-password-policy.yaml b/cloud/aws/iam/iam-password-policy.yaml index a958ed1288f..8d6303c2be1 100644 --- a/cloud/aws/iam/iam-password-policy.yaml +++ b/cloud/aws/iam/iam-password-policy.yaml @@ -7,7 +7,7 @@ info: Verifies that Amazon IAM users adhere to a strong password policy, including requirements for minimum length, expiration, and pattern reference: - https://docs.aws.amazon.com/cli/latest/reference/iam/get-account-password-policy.html - tags: cloud,devops,aws,amazon,iam,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,aws-cloud-config self-contained: true code: diff --git a/cloud/aws/iam/iam-root-mfa.yaml b/cloud/aws/iam/iam-root-mfa.yaml index 26f1ffa96d9..bab2da7af88 100644 --- a/cloud/aws/iam/iam-root-mfa.yaml +++ b/cloud/aws/iam/iam-root-mfa.yaml @@ -7,7 +7,7 @@ info: Checks if Multi-Factor Authentication (MFA) is enabled for the AWS root account reference: - https://docs.aws.amazon.com/cli/latest/reference/iam/get-account-summary.html - tags: cloud,devops,aws,amazon,iam,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,aws-cloud-config self-contained: true code: diff --git a/cloud/aws/iam/iam-ssh-keys-rotation.yaml b/cloud/aws/iam/iam-ssh-keys-rotation.yaml index d5e61554662..f3461abe0c9 100644 --- a/cloud/aws/iam/iam-ssh-keys-rotation.yaml +++ b/cloud/aws/iam/iam-ssh-keys-rotation.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/iam/list-ssh-public-keys.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,iam,ssh,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,ssh,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/iam/iam-unapproved-policy.yaml b/cloud/aws/iam/iam-unapproved-policy.yaml index dce52e99b4c..71d5002bcf9 100644 --- a/cloud/aws/iam/iam-unapproved-policy.yaml +++ b/cloud/aws/iam/iam-unapproved-policy.yaml @@ -7,7 +7,7 @@ info: Checks for the attachment of unapproved Amazon IAM managed policies to IAM roles, users, or groups, ensuring compliance with organizational access policies reference: - https://docs.aws.amazon.com/cli/latest/reference/iam/get-policy.html - tags: cloud,devops,aws,amazon,iam,ssl,tls,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,ssl,tls,aws-cloud-config self-contained: true code: diff --git a/cloud/aws/iam/iam-user-password-change.yaml b/cloud/aws/iam/iam-user-password-change.yaml index 45bf3803191..0bac2df1bff 100644 --- a/cloud/aws/iam/iam-user-password-change.yaml +++ b/cloud/aws/iam/iam-user-password-change.yaml @@ -7,7 +7,7 @@ info: Verifies that all Amazon IAM users have permissions to change their own console passwords, allowing access to 'iam:ChangePassword' for their accounts and 'iam:GetAccountPasswordPolicy' action. reference: - https://docs.aws.amazon.com/cli/latest/reference/iam/get-account-password-policy.html - tags: cloud,devops,aws,amazon,iam,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,aws-cloud-config self-contained: true code: diff --git a/cloud/aws/iam/ssl-cert-renewal.yaml b/cloud/aws/iam/ssl-cert-renewal.yaml index 1fb526f5232..ced35d55468 100644 --- a/cloud/aws/iam/ssl-cert-renewal.yaml +++ b/cloud/aws/iam/ssl-cert-renewal.yaml @@ -7,7 +7,7 @@ info: Checks if SSL/TLS certificates in AWS IAM are set for renewal 30 days before expiration. reference: - https://docs.aws.amazon.com/cli/latest/reference/iam/get-account-password-policy.html - tags: cloud,devops,aws,amazon,iam,ssl,tls,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,iam,ssl,tls,aws-cloud-config self-contained: true code: diff --git a/cloud/aws/inspector2/inspector2-disabled.yaml b/cloud/aws/inspector2/inspector2-disabled.yaml index eda2b9010f8..3f61e789064 100644 --- a/cloud/aws/inspector2/inspector2-disabled.yaml +++ b/cloud/aws/inspector2/inspector2-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/Inspector2/enable-amazon-inspector2.html - https://aws.amazon.com/about-aws/whats-new/2021/11/amazon-inspector-continual-vulnerability-management/ - tags: cloud,devops,aws,amazon,inspector2,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,inspector2,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/aurora-copy-tags-snap.yaml b/cloud/aws/rds/aurora-copy-tags-snap.yaml index ec0ca491f21..c2956d5b79d 100644 --- a/cloud/aws/rds/aurora-copy-tags-snap.yaml +++ b/cloud/aws/rds/aurora-copy-tags-snap.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/USER_Tagging.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,aurora,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,aurora,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/aurora-delete-protect.yaml b/cloud/aws/rds/aurora-delete-protect.yaml index 8aaa8182adf..984a00f0373 100644 --- a/cloud/aws/rds/aurora-delete-protect.yaml +++ b/cloud/aws/rds/aurora-delete-protect.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/DBInstanceDeletionProtection.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,aurora,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,aurora,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/iam-db-auth.yaml b/cloud/aws/rds/iam-db-auth.yaml index 831a0c52515..4691e31dc0c 100644 --- a/cloud/aws/rds/iam-db-auth.yaml +++ b/cloud/aws/rds/iam-db-auth.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.IAMDBAuth.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-auto-minor-upgrade-disabled.yaml b/cloud/aws/rds/rds-auto-minor-upgrade-disabled.yaml index e0ad5586fe5..56964bb6593 100644 --- a/cloud/aws/rds/rds-auto-minor-upgrade-disabled.yaml +++ b/cloud/aws/rds/rds-auto-minor-upgrade-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/rds-auto-minor-version-upgrade.html - http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_UpgradeDBInstance.Upgrading.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-automated-backup-disabled.yaml b/cloud/aws/rds/rds-automated-backup-disabled.yaml index f29a1a1af72..be137144057 100644 --- a/cloud/aws/rds/rds-automated-backup-disabled.yaml +++ b/cloud/aws/rds/rds-automated-backup-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/rds-automated-backups-enabled.html - http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithAutomatedBackups.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-backtrack-disabled.yaml b/cloud/aws/rds/rds-backtrack-disabled.yaml index 032563726d5..da54fedd1ed 100644 --- a/cloud/aws/rds/rds-backtrack-disabled.yaml +++ b/cloud/aws/rds/rds-backtrack-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/backtrack.html - https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Managing.Backtrack.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-backup-enable.yaml b/cloud/aws/rds/rds-backup-enable.yaml index edd48bf775f..b49cae11bd9 100644 --- a/cloud/aws/rds/rds-backup-enable.yaml +++ b/cloud/aws/rds/rds-backup-enable.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithAutomatedBackups.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-cluster-protection-disabled.yaml b/cloud/aws/rds/rds-cluster-protection-disabled.yaml index e19f4320e64..f4f7d975aaa 100644 --- a/cloud/aws/rds/rds-cluster-protection-disabled.yaml +++ b/cloud/aws/rds/rds-cluster-protection-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/cluster-deletion-protection.html - https://aws.amazon.com/about-aws/whats-new/2018/09/amazon-rds-now-provides-database-deletion-protection/ - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-copy-snap.yaml b/cloud/aws/rds/rds-copy-snap.yaml index 0d8e48b0e1f..b6460ff2ad3 100644 --- a/cloud/aws/rds/rds-copy-snap.yaml +++ b/cloud/aws/rds/rds-copy-snap.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/copy-tags-to-snapshot.html - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_Tagging.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-deletion-protection.yaml b/cloud/aws/rds/rds-deletion-protection.yaml index d74e18716e6..2a228634b53 100644 --- a/cloud/aws/rds/rds-deletion-protection.yaml +++ b/cloud/aws/rds/rds-deletion-protection.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_DeleteInstance.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-encryption-check.yaml b/cloud/aws/rds/rds-encryption-check.yaml index 039d81d7ca3..522aceaad3a 100644 --- a/cloud/aws/rds/rds-encryption-check.yaml +++ b/cloud/aws/rds/rds-encryption-check.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Overview.Encryption.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-event-notify.yaml b/cloud/aws/rds/rds-event-notify.yaml index 9da1c2f89da..c0fe1b32871 100644 --- a/cloud/aws/rds/rds-event-notify.yaml +++ b/cloud/aws/rds/rds-event-notify.yaml @@ -11,7 +11,7 @@ info: Enable event notifications in Amazon RDS by creating an event subscription with Amazon SNS to receive notifications. reference: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_Events.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-event-sub-enable.yaml b/cloud/aws/rds/rds-event-sub-enable.yaml index 977ef68d0c4..ae17ed859a1 100644 --- a/cloud/aws/rds/rds-event-sub-enable.yaml +++ b/cloud/aws/rds/rds-event-sub-enable.yaml @@ -11,7 +11,7 @@ info: Enable RDS event notification subscriptions for relevant database instance level events through the AWS Management Console or AWS CLI. reference: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_Events.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-event-sub.yaml b/cloud/aws/rds/rds-event-sub.yaml index b95e8e29a75..dc7c21a11dc 100644 --- a/cloud/aws/rds/rds-event-sub.yaml +++ b/cloud/aws/rds/rds-event-sub.yaml @@ -11,7 +11,7 @@ info: Enable Amazon RDS event notification subscriptions for relevant database security group events through the AWS Management Console or AWS CLI. reference: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_Events.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-gp-ssd-usage.yaml b/cloud/aws/rds/rds-gp-ssd-usage.yaml index 17141003057..830b405bb2b 100644 --- a/cloud/aws/rds/rds-gp-ssd-usage.yaml +++ b/cloud/aws/rds/rds-gp-ssd-usage.yaml @@ -13,7 +13,7 @@ info: - https://aws.amazon.com/rds/features/storage/ metadata: max-request: 2 - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-insights-disabled.yaml b/cloud/aws/rds/rds-insights-disabled.yaml index 9dcefe121b8..93a6e7e9ca7 100644 --- a/cloud/aws/rds/rds-insights-disabled.yaml +++ b/cloud/aws/rds/rds-insights-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/performance-insights.html - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_PerfInsights.Enabling.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-instance-autoscaling-disabled.yaml b/cloud/aws/rds/rds-instance-autoscaling-disabled.yaml index d2b01933684..f21a5b4d5cf 100644 --- a/cloud/aws/rds/rds-instance-autoscaling-disabled.yaml +++ b/cloud/aws/rds/rds-instance-autoscaling-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/enable-rds-storage-autoscaling.html - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_PIOPS.StorageTypes.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-log-export-disabled.yaml b/cloud/aws/rds/rds-log-export-disabled.yaml index bc7d861d3e0..d77b390482b 100644 --- a/cloud/aws/rds/rds-log-export-disabled.yaml +++ b/cloud/aws/rds/rds-log-export-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/log-exports.html - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_LogAccess.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-multi-az.yaml b/cloud/aws/rds/rds-multi-az.yaml index 86ab83990d2..f82d315a1f3 100644 --- a/cloud/aws/rds/rds-multi-az.yaml +++ b/cloud/aws/rds/rds-multi-az.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/rds-multi-az.html - http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Concepts.MultiAZ.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-public-access.yaml b/cloud/aws/rds/rds-public-access.yaml index 2f041c6f619..43369bec509 100644 --- a/cloud/aws/rds/rds-public-access.yaml +++ b/cloud/aws/rds/rds-public-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/RDS/rds-publicly-accessible.html - http://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.html - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/rds/rds-public-snapshot.yaml b/cloud/aws/rds/rds-public-snapshot.yaml index 6f4f3da850d..4d2eb8fb73a 100644 --- a/cloud/aws/rds/rds-public-snapshot.yaml +++ b/cloud/aws/rds/rds-public-snapshot.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_ShareSnapshot.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-public-subnet.yaml b/cloud/aws/rds/rds-public-subnet.yaml index 6e3e66c1824..9b42fa8cda2 100644 --- a/cloud/aws/rds/rds-public-subnet.yaml +++ b/cloud/aws/rds/rds-public-subnet.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.WorkingWithRDSInstanceinaVPC.html#USER_VPC.Subnets metadata: max-request: 3 - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-ri-payment-fail.yaml b/cloud/aws/rds/rds-ri-payment-fail.yaml index 7008073d415..136369255cc 100644 --- a/cloud/aws/rds/rds-ri-payment-fail.yaml +++ b/cloud/aws/rds/rds-ri-payment-fail.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_WorkingWithReservedDBInstances.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/rds/rds-snapshot-encryption.yaml b/cloud/aws/rds/rds-snapshot-encryption.yaml index 8b127622e28..54c80475f6a 100644 --- a/cloud/aws/rds/rds-snapshot-encryption.yaml +++ b/cloud/aws/rds/rds-snapshot-encryption.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_EncryptSnapshot.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,rds,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,rds,aws-cloud-config variables: region: "ap-northeast-1" diff --git a/cloud/aws/route53/route53-dns-query-disabled.yaml b/cloud/aws/route53/route53-dns-query-disabled.yaml index 5746a6d6408..2d7826a8afa 100644 --- a/cloud/aws/route53/route53-dns-query-disabled.yaml +++ b/cloud/aws/route53/route53-dns-query-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/Route53/enable-query-logging.html - https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/monitoring-overview.html - tags: cloud,devops,aws,amazon,route53,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,route53,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/route53/route53-dnssec-signing-disabled.yaml b/cloud/aws/route53/route53-dnssec-signing-disabled.yaml index 2e5014c673d..12c73044658 100644 --- a/cloud/aws/route53/route53-dnssec-signing-disabled.yaml +++ b/cloud/aws/route53/route53-dnssec-signing-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/Route53/enable-query-logging.html - https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/monitoring-overview.html - tags: cloud,devops,aws,amazon,route53,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,route53,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/s3/s3-access-logging.yaml b/cloud/aws/s3/s3-access-logging.yaml index b9b7205a98f..2e72e81719a 100644 --- a/cloud/aws/s3/s3-access-logging.yaml +++ b/cloud/aws/s3/s3-access-logging.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/s3api/get-bucket-encryption.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-auth-fullcontrol.yaml b/cloud/aws/s3/s3-auth-fullcontrol.yaml index f9f8e68b64a..20c3d874a69 100644 --- a/cloud/aws/s3/s3-auth-fullcontrol.yaml +++ b/cloud/aws/s3/s3-auth-fullcontrol.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/AmazonS3/latest/userguide/manage-versioning-examples.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-bucket-key.yaml b/cloud/aws/s3/s3-bucket-key.yaml index 6b1fb5d3a7d..e79a8661925 100644 --- a/cloud/aws/s3/s3-bucket-key.yaml +++ b/cloud/aws/s3/s3-bucket-key.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/AmazonS3/latest/userguide/manage-versioning-examples.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-bucket-policy-public-access.yaml b/cloud/aws/s3/s3-bucket-policy-public-access.yaml index 42644241d9f..ef1a57525ef 100644 --- a/cloud/aws/s3/s3-bucket-policy-public-access.yaml +++ b/cloud/aws/s3/s3-bucket-policy-public-access.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/s3api/get-bucket-policy.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-mfa-delete-check.yaml b/cloud/aws/s3/s3-mfa-delete-check.yaml index d0ca5c4b353..5a0f754d3b2 100644 --- a/cloud/aws/s3/s3-mfa-delete-check.yaml +++ b/cloud/aws/s3/s3-mfa-delete-check.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/s3api/get-bucket-versioning.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-public-read-acp.yaml b/cloud/aws/s3/s3-public-read-acp.yaml index 55273ec9053..9ec67d00710 100644 --- a/cloud/aws/s3/s3-public-read-acp.yaml +++ b/cloud/aws/s3/s3-public-read-acp.yaml @@ -10,7 +10,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/s3api/get-bucket-acl.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-public-read.yaml b/cloud/aws/s3/s3-public-read.yaml index bf0e5631116..e7427912fbf 100644 --- a/cloud/aws/s3/s3-public-read.yaml +++ b/cloud/aws/s3/s3-public-read.yaml @@ -10,7 +10,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/s3api/get-bucket-acl.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-public-write-acp.yaml b/cloud/aws/s3/s3-public-write-acp.yaml index c56cb3bfa84..3cfc141241d 100644 --- a/cloud/aws/s3/s3-public-write-acp.yaml +++ b/cloud/aws/s3/s3-public-write-acp.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/s3api/get-bucket-acl.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-public-write.yaml b/cloud/aws/s3/s3-public-write.yaml index 77c8e499498..eff6dd4d4a6 100644 --- a/cloud/aws/s3/s3-public-write.yaml +++ b/cloud/aws/s3/s3-public-write.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/s3api/get-bucket-acl.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-server-side-encryption.yaml b/cloud/aws/s3/s3-server-side-encryption.yaml index 8b55598e0a3..5c2ff3991f5 100644 --- a/cloud/aws/s3/s3-server-side-encryption.yaml +++ b/cloud/aws/s3/s3-server-side-encryption.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/cli/latest/reference/s3api/get-bucket-encryption.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/s3/s3-versioning.yaml b/cloud/aws/s3/s3-versioning.yaml index a3070d471e7..3cfcc59dcd8 100644 --- a/cloud/aws/s3/s3-versioning.yaml +++ b/cloud/aws/s3/s3-versioning.yaml @@ -9,7 +9,7 @@ info: - https://docs.aws.amazon.com/AmazonS3/latest/userguide/manage-versioning-examples.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,s3,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,s3,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/secrets-manager/secret-manager-not-inuse.yaml b/cloud/aws/secrets-manager/secret-manager-not-inuse.yaml index 25f2327c696..6b4e6c638da 100644 --- a/cloud/aws/secrets-manager/secret-manager-not-inuse.yaml +++ b/cloud/aws/secrets-manager/secret-manager-not-inuse.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/SecretsManager/secrets-manager-in-use.html - https://docs.aws.amazon.com/secretsmanager/latest/userguide/intro.html - tags: cloud,devops,aws,amazon,secret-manager,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,secret-manager,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/secrets-manager/secret-rotation-interval.yaml b/cloud/aws/secrets-manager/secret-rotation-interval.yaml index b9e06f126fc..77f43e48427 100644 --- a/cloud/aws/secrets-manager/secret-rotation-interval.yaml +++ b/cloud/aws/secrets-manager/secret-rotation-interval.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/SecretsManager/rotation-interval.html - https://docs.aws.amazon.com/cli/latest/reference/secretsmanager/rotate-secret.html - tags: cloud,devops,aws,amazon,secret-manager,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,secret-manager,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/secrets-manager/secrets-rotation-disabled.yaml b/cloud/aws/secrets-manager/secrets-rotation-disabled.yaml index bbae265f525..74289d0a885 100644 --- a/cloud/aws/secrets-manager/secrets-rotation-disabled.yaml +++ b/cloud/aws/secrets-manager/secrets-rotation-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/SecretsManager/rotation-enabled.html - https://docs.aws.amazon.com/cli/latest/reference/secretsmanager/rotate-secret.html - tags: cloud,devops,aws,amazon,secrets-manager,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,secrets-manager,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/sns/sns-public-subscribe-access.yaml b/cloud/aws/sns/sns-public-subscribe-access.yaml index 185414f947c..ae4e00c2295 100644 --- a/cloud/aws/sns/sns-public-subscribe-access.yaml +++ b/cloud/aws/sns/sns-public-subscribe-access.yaml @@ -8,7 +8,7 @@ info: This template checks if Amazon SNS topics are configured to allow public subscription access via topic policies. reference: - https://docs.aws.amazon.com/sns/latest/api/API_GetTopicAttributes.html - tags: cloud,devops,aws,amazon,sns,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,sns,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/sns/sns-topic-public-accessible.yaml b/cloud/aws/sns/sns-topic-public-accessible.yaml index 55e4b15e7a6..5c883a78d4b 100644 --- a/cloud/aws/sns/sns-topic-public-accessible.yaml +++ b/cloud/aws/sns/sns-topic-public-accessible.yaml @@ -10,7 +10,7 @@ info: - https://docs.aws.amazon.com/sns/latest/api/API_GetTopicAttributes.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,sns,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,sns,aws-cloud-config flow: | code(1) diff --git a/cloud/aws/sqs/sqs-deadletter-disabled.yaml b/cloud/aws/sqs/sqs-deadletter-disabled.yaml index ee6836980b7..94d50ceb52b 100644 --- a/cloud/aws/sqs/sqs-deadletter-disabled.yaml +++ b/cloud/aws/sqs/sqs-deadletter-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/SQS/dead-letter-queue.html - https://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-dead-letter-queues.html - tags: cloud,devops,aws,amazon,sqs,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,sqs,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/sqs/sqs-encryption-disabled.yaml b/cloud/aws/sqs/sqs-encryption-disabled.yaml index 6782156c516..7f71d1a6815 100644 --- a/cloud/aws/sqs/sqs-encryption-disabled.yaml +++ b/cloud/aws/sqs/sqs-encryption-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/SQS/server-side-encryption.html - http://docs.aws.amazon.com/AWSSimpleQueueService/latest/SQSDeveloperGuide/sqs-configure-sse-existing-queue.html - tags: cloud,devops,aws,amazon,sqs,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,sqs,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/sqs/sqs-queue-exposed.yaml b/cloud/aws/sqs/sqs-queue-exposed.yaml index ea7f4244df3..37ba84f964e 100644 --- a/cloud/aws/sqs/sqs-queue-exposed.yaml +++ b/cloud/aws/sqs/sqs-queue-exposed.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity-staging/knowledge-base/aws/SQS/sqs-queue-exposed.html - https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingKMSEncryption.html - tags: cloud,devops,aws,amazon,sqs,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,sqs,aws-cloud-config variables: region: "us-west-2" diff --git a/cloud/aws/vpc/nacl-open-inbound.yaml b/cloud/aws/vpc/nacl-open-inbound.yaml index c070c0ab5fd..a441f5d4a25 100644 --- a/cloud/aws/vpc/nacl-open-inbound.yaml +++ b/cloud/aws/vpc/nacl-open-inbound.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,vpc,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,vpc,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/vpc/nacl-outbound-restrict.yaml b/cloud/aws/vpc/nacl-outbound-restrict.yaml index 05dd741d8f1..adf7ee7ebef 100644 --- a/cloud/aws/vpc/nacl-outbound-restrict.yaml +++ b/cloud/aws/vpc/nacl-outbound-restrict.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,vpc,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,vpc,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/vpc/nat-gateway-usage.yaml b/cloud/aws/vpc/nat-gateway-usage.yaml index 795de17ab70..d855a387a7f 100644 --- a/cloud/aws/vpc/nat-gateway-usage.yaml +++ b/cloud/aws/vpc/nat-gateway-usage.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,vpc,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,vpc,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/vpc/unrestricted-admin-ports.yaml b/cloud/aws/vpc/unrestricted-admin-ports.yaml index 779c7d3b3a7..0fb1ff864d8 100644 --- a/cloud/aws/vpc/unrestricted-admin-ports.yaml +++ b/cloud/aws/vpc/unrestricted-admin-ports.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/vpc/latest/userguide/vpc-network-acls.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,vpc,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,vpc,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/vpc/vpc-endpoint-exposed.yaml b/cloud/aws/vpc/vpc-endpoint-exposed.yaml index 437aa9bde1e..bdc53e503a6 100644 --- a/cloud/aws/vpc/vpc-endpoint-exposed.yaml +++ b/cloud/aws/vpc/vpc-endpoint-exposed.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/vpc/latest/userguide/vpc-endpoints-access.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,vpc,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,vpc,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/vpc/vpc-endpoints-not-deployed.yaml b/cloud/aws/vpc/vpc-endpoints-not-deployed.yaml index b51e1ab3279..0c6b08d76fa 100644 --- a/cloud/aws/vpc/vpc-endpoints-not-deployed.yaml +++ b/cloud/aws/vpc/vpc-endpoints-not-deployed.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/vpc/latest/userguide/vpc-endpoints.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,vpc,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,vpc,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/vpc/vpc-flowlogs-not-enabled.yaml b/cloud/aws/vpc/vpc-flowlogs-not-enabled.yaml index 2df942ca09a..f52e2619218 100644 --- a/cloud/aws/vpc/vpc-flowlogs-not-enabled.yaml +++ b/cloud/aws/vpc/vpc-flowlogs-not-enabled.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,vpc,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,vpc,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/aws/vpc/vpn-tunnel-down.yaml b/cloud/aws/vpc/vpn-tunnel-down.yaml index ac3353d7a73..420a6f1d775 100644 --- a/cloud/aws/vpc/vpn-tunnel-down.yaml +++ b/cloud/aws/vpc/vpn-tunnel-down.yaml @@ -13,7 +13,7 @@ info: - https://docs.aws.amazon.com/vpn/latest/s2svpn/VPNConnections.html metadata: max-request: 2 - tags: cloud,devops,aws,amazon,vpn,aws-cloud-config,vuln + tags: cloud,devops,aws,amazon,vpn,aws-cloud-config variables: region: "us-east-1" diff --git a/cloud/azure/accesscontrol/azure-custom-admin-role-unrestricted.yaml b/cloud/azure/accesscontrol/azure-custom-admin-role-unrestricted.yaml index bfd343ee4e9..5a047c40df1 100644 --- a/cloud/azure/accesscontrol/azure-custom-admin-role-unrestricted.yaml +++ b/cloud/azure/accesscontrol/azure-custom-admin-role-unrestricted.yaml @@ -11,7 +11,7 @@ info: Review and restrict the permissions of custom roles in Azure cloud subscriptions. Ensure that custom roles do not grant more privileges than necessary by conforming to the Principle of Least Privilege. reference: - https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles - tags: cloud,devops,azure,microsoft,role-based-access,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,role-based-access,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/accesscontrol/azure-custom-owner-role-unrestricted.yaml b/cloud/azure/accesscontrol/azure-custom-owner-role-unrestricted.yaml index fc40c714c1a..8f2a0888149 100644 --- a/cloud/azure/accesscontrol/azure-custom-owner-role-unrestricted.yaml +++ b/cloud/azure/accesscontrol/azure-custom-owner-role-unrestricted.yaml @@ -11,7 +11,7 @@ info: Remove any custom owner roles or modify their permissions to align with the principle of least privilege, ensuring users have only the necessary access rights to perform their duties. reference: - https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles - tags: cloud,devops,azure,microsoft,role-management,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,role-management,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/accesscontrol/azure-iam-role-resource-lock-unassigned.yaml b/cloud/azure/accesscontrol/azure-iam-role-resource-lock-unassigned.yaml index 5a34108511c..a72348fdcab 100644 --- a/cloud/azure/accesscontrol/azure-iam-role-resource-lock-unassigned.yaml +++ b/cloud/azure/accesscontrol/azure-iam-role-resource-lock-unassigned.yaml @@ -11,7 +11,7 @@ info: Create a custom IAM role with permissions for Microsoft.Authorization/locks/read, Microsoft.Authorization/locks/write, and Microsoft.Authorization/locks/delete and ensure it is assigned to an identity. reference: - https://docs.microsoft.com/en-us/azure/role-based-access-control/custom-roles - tags: cloud,devops,azure,microsoft,resource-lock,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,resource-lock,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activedirectory/azure-entra-id-guest-users-unmonitored.yaml b/cloud/azure/activedirectory/azure-entra-id-guest-users-unmonitored.yaml index fb0afd75acf..6f4c612801f 100644 --- a/cloud/azure/activedirectory/azure-entra-id-guest-users-unmonitored.yaml +++ b/cloud/azure/activedirectory/azure-entra-id-guest-users-unmonitored.yaml @@ -11,7 +11,7 @@ info: Regularly review and monitor guest users in Microsoft Entra ID to ensure each is associated with a business owner or process. Remove any unnecessary guest user accounts. reference: - https://docs.microsoft.com/en-us/azure/active-directory/external-identities/ - tags: cloud,devops,azure,microsoft,entra-id,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,entra-id,azure-cloud-config self-contained: true code: diff --git a/cloud/azure/activedirectory/azure-mfa-not-enabled-privileged-users.yaml b/cloud/azure/activedirectory/azure-mfa-not-enabled-privileged-users.yaml index 6b29bd2cf6d..e231045c83d 100644 --- a/cloud/azure/activedirectory/azure-mfa-not-enabled-privileged-users.yaml +++ b/cloud/azure/activedirectory/azure-mfa-not-enabled-privileged-users.yaml @@ -14,7 +14,7 @@ info: - https://learn.microsoft.com/en-us/azure/role-based-access-control/built-in-roles - https://docs.microsoft.com/en-us/graph/api/resources/authenticationmethods-overview - https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates - tags: cloud,devops,azure,microsoft,azure-cloud-config,graph-api,vuln + tags: cloud,devops,azure,microsoft,azure-cloud-config,graph-api flow: | code(1); diff --git a/cloud/azure/activitylog/azure-db-mysql-delete-unalerted.yaml b/cloud/azure/activitylog/azure-db-mysql-delete-unalerted.yaml index 873f333cdfe..79ea0f94fa6 100644 --- a/cloud/azure/activitylog/azure-db-mysql-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-db-mysql-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure an activity log alert to fire on "Delete MySQL Database" events with the condition set to "Microsoft.DBforMySQL/servers/databases/delete" and ensure that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,mysql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,mysql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-delete-lb-alert-unconfigured.yaml b/cloud/azure/activitylog/azure-delete-lb-alert-unconfigured.yaml index 0d7ea0bcd70..4620c07f665 100644 --- a/cloud/azure/activitylog/azure-delete-lb-alert-unconfigured.yaml +++ b/cloud/azure/activitylog/azure-delete-lb-alert-unconfigured.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Delete Load Balancer" events by setting the alert condition to "Microsoft.Network/loadBalancers/delete" and attaching an action group for notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,load-balancer,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,load-balancer,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-key-vault-delete-unalerted.yaml b/cloud/azure/activitylog/azure-key-vault-delete-unalerted.yaml index c4689afbd3e..dcdaf3e923b 100644 --- a/cloud/azure/activitylog/azure-key-vault-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-key-vault-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure alert rules to monitor and notify whenever "Delete Key Vault" events occur by setting the alert condition to "Microsoft.KeyVault/vaults/delete" and attaching an action group to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,key-vault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,key-vault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-keyvault-update-unalerted.yaml b/cloud/azure/activitylog/azure-keyvault-update-unalerted.yaml index c6333c4963c..4fcbe1802bd 100644 --- a/cloud/azure/activitylog/azure-keyvault-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-keyvault-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure alert rules to monitor and notify of "Update Key Vault" events by setting the alert condition to "Microsoft.KeyVault/vaults/write" and ensuring that an action group is attached for managing notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-lb-create-update-missing.yaml b/cloud/azure/activitylog/azure-lb-create-update-missing.yaml index 0006742db04..010c27c9c53 100644 --- a/cloud/azure/activitylog/azure-lb-create-update-missing.yaml +++ b/cloud/azure/activitylog/azure-lb-create-update-missing.yaml @@ -11,7 +11,7 @@ info: Configure Azure activity log alerts to include events for "Create or Update Load Balancer" with proper conditions to ensure compliance and operational awareness. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,loadbalancer,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,loadbalancer,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-mysql-db-update-unalerted.yaml b/cloud/azure/activitylog/azure-mysql-db-update-unalerted.yaml index 24851ad7b7f..cbee522de40 100644 --- a/cloud/azure/activitylog/azure-mysql-db-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-mysql-db-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Create or Update MySQL Database" events by setting the alert condition to "Microsoft.DBforMySQL/servers/databases/write" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,mysql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,mysql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-nsg-create-update-unalerted.yaml b/cloud/azure/activitylog/azure-nsg-create-update-unalerted.yaml index dd7ed6d7631..41b273f300e 100644 --- a/cloud/azure/activitylog/azure-nsg-create-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-nsg-create-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure alert rules to monitor "Create" or "Update Network Security Group" events by setting the alert condition to "Microsoft.Network/networkSecurityGroups/write" and attaching an action group to handle notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,network-security-group,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,network-security-group,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-nsg-delete-unalerted.yaml b/cloud/azure/activitylog/azure-nsg-delete-unalerted.yaml index 4ce4ca1fe80..ca1c0e1a37a 100644 --- a/cloud/azure/activitylog/azure-nsg-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-nsg-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure alert rules to monitor and notify on "Delete Network Security Group" events by setting the alert condition to "Microsoft.Network/networkSecurityGroups/delete" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,network-security-group,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,network-security-group,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-nsg-rule-delete-unalerted.yaml b/cloud/azure/activitylog/azure-nsg-rule-delete-unalerted.yaml index e56a466ed41..0f7e3609a58 100644 --- a/cloud/azure/activitylog/azure-nsg-rule-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-nsg-rule-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Delete Network Security Group Rule" events by setting the alert condition to "Microsoft.Network/networkSecurityGroups/securityRules/delete" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,network-security,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,network-security,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-nsg-rule-update-unalerted.yaml b/cloud/azure/activitylog/azure-nsg-rule-update-unalerted.yaml index edd407f4f3b..52abd25118f 100644 --- a/cloud/azure/activitylog/azure-nsg-rule-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-nsg-rule-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Create or Update Network Security Group Rule" events by setting the alert condition to "Microsoft.Network/networkSecurityGroups/securityRules/write" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,network-security-group,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,network-security-group,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-policy-assignment-create-alert-missing.yaml b/cloud/azure/activitylog/azure-policy-assignment-create-alert-missing.yaml index f4f2fb4f456..b1d4bb62189 100644 --- a/cloud/azure/activitylog/azure-policy-assignment-create-alert-missing.yaml +++ b/cloud/azure/activitylog/azure-policy-assignment-create-alert-missing.yaml @@ -11,7 +11,7 @@ info: Configure an Azure activity log alert for "Create Policy Assignment" events to ensure compliance and enhance security monitoring. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,azure-monitor,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-monitor,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-policy-assignment-delete-unalerted.yaml b/cloud/azure/activitylog/azure-policy-assignment-delete-unalerted.yaml index cb98f5c934d..5ade082a8b0 100644 --- a/cloud/azure/activitylog/azure-policy-assignment-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-policy-assignment-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure alert rules to monitor and notify on "Delete Policy Assignment" events by setting the alert condition to "Microsoft.Authorization/policyAssignments/delete" and ensuring that an action group is attached for notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,policy-assignment,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,policy-assignment,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-postgresql-db-delete-unalerted.yaml b/cloud/azure/activitylog/azure-postgresql-db-delete-unalerted.yaml index 7ed2508026b..46be16a98d3 100644 --- a/cloud/azure/activitylog/azure-postgresql-db-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-postgresql-db-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure alert rules to fire when events with the operation name "Microsoft.DBforPostgreSQL/servers/databases/delete" occur, ensuring these critical events are monitored effectively. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-postgresql-db-update-unalerted.yaml b/cloud/azure/activitylog/azure-postgresql-db-update-unalerted.yaml index 1643d907bb2..310fa0afc7f 100644 --- a/cloud/azure/activitylog/azure-postgresql-db-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-postgresql-db-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Create or Update PostgreSQL Database" events by setting the alert condition to "Microsoft.DBforPostgreSQL/servers/databases/write" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-public-ip-delete-unalerted.yaml b/cloud/azure/activitylog/azure-public-ip-delete-unalerted.yaml index ff031b53cfa..1942c1796b4 100644 --- a/cloud/azure/activitylog/azure-public-ip-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-public-ip-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Delete Public IP Address" events by setting the alert condition to "Microsoft.Network/publicIPAddresses/delete" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,public-ip,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,public-ip,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-public-ip-update-unalerted.yaml b/cloud/azure/activitylog/azure-public-ip-update-unalerted.yaml index d2e8cccff2c..f60dba48836 100644 --- a/cloud/azure/activitylog/azure-public-ip-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-public-ip-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Create or Update Public IP Address" events by setting the alert condition to "Microsoft.Network/publicIPAddresses/write" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,public-ip,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,public-ip,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-security-policy-update-unalerted.yaml b/cloud/azure/activitylog/azure-security-policy-update-unalerted.yaml index 6b13bc743ab..90786469bbd 100644 --- a/cloud/azure/activitylog/azure-security-policy-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-security-policy-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Update Security Policy" events by setting the alert condition to "Microsoft.Security/policies/write" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,security,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,security,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-security-solution-delete-unalerted.yaml b/cloud/azure/activitylog/azure-security-solution-delete-unalerted.yaml index 364bf560640..87872626a17 100644 --- a/cloud/azure/activitylog/azure-security-solution-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-security-solution-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Delete Security Solution" events by setting the alert condition to "Microsoft.Security/securitySolutions/delete" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,security-solution,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,security-solution,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-security-solutions-update-unalerted.yaml b/cloud/azure/activitylog/azure-security-solutions-update-unalerted.yaml index b0288391781..a9da63858a5 100644 --- a/cloud/azure/activitylog/azure-security-solutions-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-security-solutions-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Create or Update Security Solution" events by setting the alert condition to "Microsoft.Security/securitySolutions/write" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,security-solutions,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,security-solutions,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-sql-database-rename-unalerted.yaml b/cloud/azure/activitylog/azure-sql-database-rename-unalerted.yaml index 06e58767f94..47fba9d9c5a 100644 --- a/cloud/azure/activitylog/azure-sql-database-rename-unalerted.yaml +++ b/cloud/azure/activitylog/azure-sql-database-rename-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Rename Azure SQL Database" events by setting the alert condition to "Microsoft.Sql/servers/databases/move/action" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,sql-database,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,sql-database,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-sql-db-update-unalerted.yaml b/cloud/azure/activitylog/azure-sql-db-update-unalerted.yaml index 9970b905201..4ffb64e67ca 100644 --- a/cloud/azure/activitylog/azure-sql-db-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-sql-db-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure Azure activity log alerts to monitor and notify on "Create or Update Azure SQL Database" events by setting the alert condition to "Microsoft.Sql/servers/databases/write" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,sql-database,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,sql-database,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-sql-delete-db-unalerted.yaml b/cloud/azure/activitylog/azure-sql-delete-db-unalerted.yaml index 1218f495c49..3b7ca6ff44b 100644 --- a/cloud/azure/activitylog/azure-sql-delete-db-unalerted.yaml +++ b/cloud/azure/activitylog/azure-sql-delete-db-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure alert rules to monitor and notify on "Delete Azure SQL Database" events by setting the alert condition to "Microsoft.Sql/servers/databases/delete" and ensuring an action group is configured to handle the alert. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,sql-database,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,sql-database,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-sql-fw-rule-unalerted.yaml b/cloud/azure/activitylog/azure-sql-fw-rule-unalerted.yaml index 97e3e06c72f..dfc7edc47cf 100644 --- a/cloud/azure/activitylog/azure-sql-fw-rule-unalerted.yaml +++ b/cloud/azure/activitylog/azure-sql-fw-rule-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure activity log alerts to monitor "Create, Update, or Delete SQL Server Firewall Rule" events by setting the alert condition to "Microsoft.Sql/servers/firewallRules/write" and attaching an action group to handle notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,sql-server,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,sql-server,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-storage-account-delete-unalerted.yaml b/cloud/azure/activitylog/azure-storage-account-delete-unalerted.yaml index a78e294128d..53be8be8985 100644 --- a/cloud/azure/activitylog/azure-storage-account-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-storage-account-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are configured to fire on "Delete Storage Account" events by setting the alert condition to "Microsoft.Storage/storageAccounts/delete" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,storage-account,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage-account,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-storage-account-update-unalerted.yaml b/cloud/azure/activitylog/azure-storage-account-update-unalerted.yaml index b0ce0ff096a..cc9dfe05e49 100644 --- a/cloud/azure/activitylog/azure-storage-account-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-storage-account-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Ensure alert rules are properly configured to monitor and notify on "Create or Update Storage Account" events by setting the alert condition to "Microsoft.Storage/storageAccounts/write" and ensuring that an action group is attached to manage notifications. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,storage-account,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage-account,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-vm-create-update-unalerted.yaml b/cloud/azure/activitylog/azure-vm-create-update-unalerted.yaml index 84354e1bdd9..17e57c5d9c2 100644 --- a/cloud/azure/activitylog/azure-vm-create-update-unalerted.yaml +++ b/cloud/azure/activitylog/azure-vm-create-update-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure alert rules to fire on "Create or Update Virtual Machine" events by setting the alert condition to "Microsoft.Compute/virtualMachines/write" and ensuring that notifications are managed through an action group. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-vm-deallocate-unalerted.yaml b/cloud/azure/activitylog/azure-vm-deallocate-unalerted.yaml index 7c3d427fb92..d8094e21848 100644 --- a/cloud/azure/activitylog/azure-vm-deallocate-unalerted.yaml +++ b/cloud/azure/activitylog/azure-vm-deallocate-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure Azure activity log alerts to detect "Deallocate Virtual Machine" events by setting the alert condition to "Microsoft.Compute/virtualMachines/deallocate/action" and ensuring that alerts trigger notifications appropriately. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-vm-delete-unalerted.yaml b/cloud/azure/activitylog/azure-vm-delete-unalerted.yaml index 00267a3b395..6745f495aaf 100644 --- a/cloud/azure/activitylog/azure-vm-delete-unalerted.yaml +++ b/cloud/azure/activitylog/azure-vm-delete-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure activity log alerts to fire on "Delete Virtual Machine" events by setting the alert condition to "Microsoft.Compute/virtualMachines/delete" and ensure that notifications are managed by an attached action group. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/activitylog/azure-vm-poweroff-unalerted.yaml b/cloud/azure/activitylog/azure-vm-poweroff-unalerted.yaml index 59fab8931e2..b04c3680b33 100644 --- a/cloud/azure/activitylog/azure-vm-poweroff-unalerted.yaml +++ b/cloud/azure/activitylog/azure-vm-poweroff-unalerted.yaml @@ -11,7 +11,7 @@ info: Configure the activity log alert to trigger on the event "Microsoft.Compute/virtualMachines/powerOff/action". Ensure the alert condition includes any event level, status, and initiator to capture all related events. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/alerts-activity-log - tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aiservices/azure-openai-cmk-not-enabled.yaml b/cloud/azure/aiservices/azure-openai-cmk-not-enabled.yaml index ffa4ac00c3b..c00ec917c30 100644 --- a/cloud/azure/aiservices/azure-openai-cmk-not-enabled.yaml +++ b/cloud/azure/aiservices/azure-openai-cmk-not-enabled.yaml @@ -11,7 +11,7 @@ info: Configure your Azure OpenAI instances to use Customer-Managed Keys by setting up encryption key attributes in the Azure Key Vault and then linking them to your OpenAI service instances. reference: - https://docs.microsoft.com/en-us/azure/cognitive-services/encryption-key-management - tags: cloud,devops,azure,microsoft,openai,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,openai,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aiservices/azure-openai-managed-identity-not-used.yaml b/cloud/azure/aiservices/azure-openai-managed-identity-not-used.yaml index a6356b3ca9c..6b1c7c7cd05 100644 --- a/cloud/azure/aiservices/azure-openai-managed-identity-not-used.yaml +++ b/cloud/azure/aiservices/azure-openai-managed-identity-not-used.yaml @@ -11,7 +11,7 @@ info: Configure your Azure OpenAI service instances to use either system-assigned or user-assigned managed identities to enhance security and simplify resource access management. reference: - https://docs.microsoft.com/en-us/azure/cognitive-services/authentication - tags: cloud,devops,azure,microsoft,openai,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,openai,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aiservices/azure-openai-private-endpoints-unconfigured.yaml b/cloud/azure/aiservices/azure-openai-private-endpoints-unconfigured.yaml index ee6ea5d5057..14a6e9c84f7 100644 --- a/cloud/azure/aiservices/azure-openai-private-endpoints-unconfigured.yaml +++ b/cloud/azure/aiservices/azure-openai-private-endpoints-unconfigured.yaml @@ -11,7 +11,7 @@ info: Configure all Azure OpenAI service instances to use private endpoints to enhance security and ensure that these instances are not accessible over the public internet. reference: - https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-overview - tags: cloud,devops,azure,microsoft,openai,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,openai,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aiservices/azure-openai-public-access-disabled.yaml b/cloud/azure/aiservices/azure-openai-public-access-disabled.yaml index 26f6d3c25c5..8f48301481d 100644 --- a/cloud/azure/aiservices/azure-openai-public-access-disabled.yaml +++ b/cloud/azure/aiservices/azure-openai-public-access-disabled.yaml @@ -11,7 +11,7 @@ info: Configure the Azure OpenAI service instances to disable public network access to secure them against unauthorized external access. reference: - https://docs.microsoft.com/en-us/azure/cognitive-services/cognitive-services-apis-create-account-cli?tabs=windows - tags: cloud,devops,azure,microsoft,openai,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,openai,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-api-unrestricted.yaml b/cloud/azure/aks/azure-aks-api-unrestricted.yaml index 3e0e8d509f5..a126f49ee00 100644 --- a/cloud/azure/aks/azure-aks-api-unrestricted.yaml +++ b/cloud/azure/aks/azure-aks-api-unrestricted.yaml @@ -11,7 +11,7 @@ info: Configure the AKS clusters to use API Server Authorized IP Address Ranges by setting the appropriate IP ranges in the AKS configuration to ensure that only authorized IPs have access to the Kubernetes control plane. reference: - https://docs.microsoft.com/en-us/azure/aks/api-server-authorized-ip-ranges - tags: cloud,devops,azure,microsoft,aks,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,aks,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-api-version-not-latest.yaml b/cloud/azure/aks/azure-aks-api-version-not-latest.yaml index 3a15ec030a6..4f6320ba68b 100644 --- a/cloud/azure/aks/azure-aks-api-version-not-latest.yaml +++ b/cloud/azure/aks/azure-aks-api-version-not-latest.yaml @@ -11,7 +11,7 @@ info: Upgrade the Kubernetes API version of your AKS clusters by following the Azure documentation to apply the latest approved updates and ensure all clusters are consistently using the most recent version available. reference: - https://docs.microsoft.com/en-us/azure/aks/upgrade-cluster - tags: cloud,devops,azure,microsoft,kubernetes,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,kubernetes,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-cni-not-configured.yaml b/cloud/azure/aks/azure-aks-cni-not-configured.yaml index de55343501c..e0548f8fe2c 100644 --- a/cloud/azure/aks/azure-aks-cni-not-configured.yaml +++ b/cloud/azure/aks/azure-aks-cni-not-configured.yaml @@ -11,7 +11,7 @@ info: Configure AKS clusters to use Azure CNI by setting the networkProfile.networkPlugin to 'azure' during AKS cluster setup or update the existing AKS clusters to use Azure CNI. reference: - https://docs.microsoft.com/en-us/azure/aks/configure-azure-cni - tags: cloud,devops,azure,microsoft,aks,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,aks,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-entra-id-unintegrated.yaml b/cloud/azure/aks/azure-aks-entra-id-unintegrated.yaml index 2074923a65f..7c37d65da7b 100644 --- a/cloud/azure/aks/azure-aks-entra-id-unintegrated.yaml +++ b/cloud/azure/aks/azure-aks-entra-id-unintegrated.yaml @@ -11,7 +11,7 @@ info: Ensure that each Azure Kubernetes Service (AKS) cluster is configured with Microsoft Entra ID by enabling the integration in the AKS cluster settings. reference: - https://docs.microsoft.com/en-us/azure/aks/managed-aad - tags: cloud,devops,azure,microsoft,aks,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,aks,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-kubernetes-version-outdated.yaml b/cloud/azure/aks/azure-aks-kubernetes-version-outdated.yaml index e9287d229c8..01c54473367 100644 --- a/cloud/azure/aks/azure-aks-kubernetes-version-outdated.yaml +++ b/cloud/azure/aks/azure-aks-kubernetes-version-outdated.yaml @@ -11,7 +11,7 @@ info: Upgrade your AKS clusters to the latest available Kubernetes version approved by Microsoft Azure to ensure enhanced features and security. reference: - https://docs.microsoft.com/en-us/azure/aks/kubernetes-service - tags: cloud,devops,azure,microsoft,kubernetes,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,kubernetes,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-managed-identity-unassigned.yaml b/cloud/azure/aks/azure-aks-managed-identity-unassigned.yaml index 3e5a774fa07..96b491dd9dd 100644 --- a/cloud/azure/aks/azure-aks-managed-identity-unassigned.yaml +++ b/cloud/azure/aks/azure-aks-managed-identity-unassigned.yaml @@ -11,7 +11,7 @@ info: Ensure that all AKS clusters are configured to use system-assigned managed identities. This can be set during the AKS cluster creation or can be updated on existing clusters. reference: - https://docs.microsoft.com/en-us/azure/aks/use-managed-identity - tags: cloud,devops,azure,microsoft,aks,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,aks,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-network-contrib-unassigned.yaml b/cloud/azure/aks/azure-aks-network-contrib-unassigned.yaml index b944b405c80..dbc48d09814 100644 --- a/cloud/azure/aks/azure-aks-network-contrib-unassigned.yaml +++ b/cloud/azure/aks/azure-aks-network-contrib-unassigned.yaml @@ -11,7 +11,7 @@ info: Ensure that the Network Contributor role is assigned to your AKS clusters within Azure to enable proper management of networking resources. This can be configured in the IAM settings of the Azure portal. reference: - https://docs.microsoft.com/en-us/azure/aks/manage-azure-rbac - tags: cloud,devops,azure,microsoft,aks,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,aks,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-not-user-assigned.yaml b/cloud/azure/aks/azure-aks-not-user-assigned.yaml index c23e9400b6e..75191a676ec 100644 --- a/cloud/azure/aks/azure-aks-not-user-assigned.yaml +++ b/cloud/azure/aks/azure-aks-not-user-assigned.yaml @@ -11,7 +11,7 @@ info: Configure your AKS clusters to use user-assigned managed identities by updating the identity type in the AKS cluster settings and specifying the appropriate managed identities. reference: - https://docs.microsoft.com/en-us/azure/aks/use-managed-identity - tags: cloud,devops,azure,microsoft,aks,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,aks,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-rbac-unconfigured.yaml b/cloud/azure/aks/azure-aks-rbac-unconfigured.yaml index 010fe22ef0e..a45997455ec 100644 --- a/cloud/azure/aks/azure-aks-rbac-unconfigured.yaml +++ b/cloud/azure/aks/azure-aks-rbac-unconfigured.yaml @@ -11,7 +11,7 @@ info: Ensure that Kubernetes Role-Based Access Control (RBAC) is enabled for each AKS cluster by configuring it during cluster creation or modifying existing clusters to enable RBAC settings. reference: - https://docs.microsoft.com/en-us/azure/aks/concepts-identity - tags: cloud,devops,azure,microsoft,aks,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,aks,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/aks/azure-aks-use-private-kv.yaml b/cloud/azure/aks/azure-aks-use-private-kv.yaml index 1b50efb6be2..08c8da39476 100644 --- a/cloud/azure/aks/azure-aks-use-private-kv.yaml +++ b/cloud/azure/aks/azure-aks-use-private-kv.yaml @@ -11,7 +11,7 @@ info: Configure your AKS clusters to use private Azure Key Vaults for encryption at rest by setting the 'azureKeyVaultKms.keyVaultNetworkAccess' to 'Private'. reference: - https://docs.microsoft.com/en-us/azure/aks/developer-best-practices-resource-management - tags: cloud,devops,azure,microsoft,aks,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,aks,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/apimanagement/azure-apim-http2-not-enabled.yaml b/cloud/azure/apimanagement/azure-apim-http2-not-enabled.yaml index 7c13371fb82..352a50fbb79 100644 --- a/cloud/azure/apimanagement/azure-apim-http2-not-enabled.yaml +++ b/cloud/azure/apimanagement/azure-apim-http2-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable HTTP/2 support in Azure API Management gateways by setting the 'Microsoft.WindowsAzure.ApiManagement.Gateway.Protocols.Server.Http2' property to 'true'. reference: - https://docs.microsoft.com/en-us/azure/api-management/api-management-howto-http2 - tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/apimanagement/azure-apim-https-enforcement-missing.yaml b/cloud/azure/apimanagement/azure-apim-https-enforcement-missing.yaml index b12cc72c1a5..c209bf098ef 100644 --- a/cloud/azure/apimanagement/azure-apim-https-enforcement-missing.yaml +++ b/cloud/azure/apimanagement/azure-apim-https-enforcement-missing.yaml @@ -11,7 +11,7 @@ info: Configure all Azure API Management APIs to enforce HTTPS by setting the URL scheme to "https" only in the API settings. reference: - https://docs.microsoft.com/en-us/azure/api-management/api-management-howto-secure-backend - tags: cloud,devops,azure,microsoft,apim,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,apim,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/apimanagement/azure-apim-nv-plaintext-exposure.yaml b/cloud/azure/apimanagement/azure-apim-nv-plaintext-exposure.yaml index e76214c4a39..22e88d5a0d2 100644 --- a/cloud/azure/apimanagement/azure-apim-nv-plaintext-exposure.yaml +++ b/cloud/azure/apimanagement/azure-apim-nv-plaintext-exposure.yaml @@ -11,7 +11,7 @@ info: Convert all named values storing secrets to use the secret (encrypted) type in Azure API Management to mitigate the risk of exposing sensitive information. reference: - https://docs.microsoft.com/en-us/azure/api-management/api-management-howto-properties - tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/apimanagement/azure-apim-public-access-disabled.yaml b/cloud/azure/apimanagement/azure-apim-public-access-disabled.yaml index 7c3764fc753..94725f1538b 100644 --- a/cloud/azure/apimanagement/azure-apim-public-access-disabled.yaml +++ b/cloud/azure/apimanagement/azure-apim-public-access-disabled.yaml @@ -11,7 +11,7 @@ info: Disable public network access for Azure API Management services that are configured with a private endpoint to ensure they are only accessible via Azure Private Link within the private network. reference: - https://docs.microsoft.com/en-us/azure/api-management/api-management-howto-protect-backend-with-private-link - tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/apimanagement/azure-apim-resource-logs-not-configured.yaml b/cloud/azure/apimanagement/azure-apim-resource-logs-not-configured.yaml index eea6d6f8ee2..d0fc656e97d 100644 --- a/cloud/azure/apimanagement/azure-apim-resource-logs-not-configured.yaml +++ b/cloud/azure/apimanagement/azure-apim-resource-logs-not-configured.yaml @@ -11,7 +11,7 @@ info: Ensure that resource logs are enabled by setting up diagnostic settings for each Azure API Management service instance. This should include capturing all logs related to API operations and errors. reference: - https://docs.microsoft.com/en-us/azure/api-management/api-management-howto-use-diagnostic-logs - tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/apimanagement/azure-apim-system-assigned-identity-unconfigured.yaml b/cloud/azure/apimanagement/azure-apim-system-assigned-identity-unconfigured.yaml index f23ae0de2a8..f662071c7c9 100644 --- a/cloud/azure/apimanagement/azure-apim-system-assigned-identity-unconfigured.yaml +++ b/cloud/azure/apimanagement/azure-apim-system-assigned-identity-unconfigured.yaml @@ -11,7 +11,7 @@ info: Enable system-assigned managed identities for your Azure API Management service instances through the Azure portal or by configuring the ARM template of your instance to include a system-assigned identity. reference: - https://docs.microsoft.com/en-us/azure/api-management/api-management-howto-use-managed-service-identity - tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/apimanagement/azure-apim-tls-config-weak.yaml b/cloud/azure/apimanagement/azure-apim-tls-config-weak.yaml index d581962cd21..c7551a2a6f7 100644 --- a/cloud/azure/apimanagement/azure-apim-tls-config-weak.yaml +++ b/cloud/azure/apimanagement/azure-apim-tls-config-weak.yaml @@ -11,7 +11,7 @@ info: Update the Azure API Management gateway configurations to disable TLS 1.0 and TLS 1.1, ensuring only the latest TLS protocols are used. Refer to the Azure documentation on updating API gateway configurations. reference: - https://docs.microsoft.com/en-us/azure/api-management/api-management-howto-configure-protocols - tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/apimanagement/azure-apim-user-assigned-id-not-used.yaml b/cloud/azure/apimanagement/azure-apim-user-assigned-id-not-used.yaml index 0b20ce6b95a..a886ede49f9 100644 --- a/cloud/azure/apimanagement/azure-apim-user-assigned-id-not-used.yaml +++ b/cloud/azure/apimanagement/azure-apim-user-assigned-id-not-used.yaml @@ -11,7 +11,7 @@ info: Configure user-assigned managed identities for your Azure API Management service instances to ensure only the necessary permissions are granted to each service. reference: - https://docs.microsoft.com/en-us/azure/api-management/how-to-use-managed-service-identity - tags: cloud,devops,azure,microsoft,apim,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,apim,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-always-on-disabled.yaml b/cloud/azure/appservice/azure-appservice-always-on-disabled.yaml index 9c29a81f3f7..9822e94b84a 100644 --- a/cloud/azure/appservice/azure-appservice-always-on-disabled.yaml +++ b/cloud/azure/appservice/azure-appservice-always-on-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the Always On feature for your Azure App Services web applications to ensure they remain active and responsive at all times. reference: - https://docs.microsoft.com/en-us/azure/app-service/configure-common - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-auth-disabled.yaml b/cloud/azure/appservice/azure-appservice-auth-disabled.yaml index 41ee72f542d..249470ffc47 100644 --- a/cloud/azure/appservice/azure-appservice-auth-disabled.yaml +++ b/cloud/azure/appservice/azure-appservice-auth-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the App Service Authentication feature for Azure App Services to ensure an additional layer of security for your web applications. reference: - https://docs.microsoft.com/en-us/azure/app-service/overview-authentication-authorization - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-backup-not-enabled.yaml b/cloud/azure/appservice/azure-appservice-backup-not-enabled.yaml index 9e61fbd6e69..8998f28df76 100644 --- a/cloud/azure/appservice/azure-appservice-backup-not-enabled.yaml +++ b/cloud/azure/appservice/azure-appservice-backup-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable and configure the Backup and Restore feature for Azure App Services applications through the Azure portal or Azure CLI to ensure compliance and data integrity. reference: - https://docs.microsoft.com/en-us/azure/app-service/manage-backup - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-backup-retention-missing.yaml b/cloud/azure/appservice/azure-appservice-backup-retention-missing.yaml index 2be116e251b..9198e9fd994 100644 --- a/cloud/azure/appservice/azure-appservice-backup-retention-missing.yaml +++ b/cloud/azure/appservice/azure-appservice-backup-retention-missing.yaml @@ -11,7 +11,7 @@ info: Configure the daily backup retention period for Azure App Services applications in the Cloud Conformity account dashboard to meet security and compliance requirements. reference: - https://docs.microsoft.com/en-us/azure/app-service/manage-backup - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-client-cert-disabled.yaml b/cloud/azure/appservice/azure-appservice-client-cert-disabled.yaml index 95b92f5c051..3dadeee442a 100644 --- a/cloud/azure/appservice/azure-appservice-client-cert-disabled.yaml +++ b/cloud/azure/appservice/azure-appservice-client-cert-disabled.yaml @@ -11,7 +11,7 @@ info: Configure Azure App Services to require SSL certificates for incoming requests to enhance security and compliance with regulations. reference: - https://docs.microsoft.com/en-us/azure/app-service/configure-ssl-certificate#require-incoming-certificate - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-entra-id-missing.yaml b/cloud/azure/appservice/azure-appservice-entra-id-missing.yaml index 6e52dc51218..a3317477414 100644 --- a/cloud/azure/appservice/azure-appservice-entra-id-missing.yaml +++ b/cloud/azure/appservice/azure-appservice-entra-id-missing.yaml @@ -11,7 +11,7 @@ info: Enable the Microsoft Entra ID for Azure App Services to ensure secure connectivity to other Azure services without manual credential handling. reference: - https://docs.microsoft.com/en-us/azure/app-service/overview-managed-identity - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-ftp-deployment-disabled.yaml b/cloud/azure/appservice/azure-appservice-ftp-deployment-disabled.yaml index 02f9f384825..135fa4011b9 100644 --- a/cloud/azure/appservice/azure-appservice-ftp-deployment-disabled.yaml +++ b/cloud/azure/appservice/azure-appservice-ftp-deployment-disabled.yaml @@ -11,7 +11,7 @@ info: Configure the Azure App Services to disable FTP deployment or to use FTPS, ensuring encrypted and secure file transfers. reference: - https://docs.microsoft.com/en-us/azure/app-service/deploy-ftp - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-ftps-only-not-enabled.yaml b/cloud/azure/appservice/azure-appservice-ftps-only-not-enabled.yaml index 40e56db3078..8a98a75db08 100644 --- a/cloud/azure/appservice/azure-appservice-ftps-only-not-enabled.yaml +++ b/cloud/azure/appservice/azure-appservice-ftps-only-not-enabled.yaml @@ -11,7 +11,7 @@ info: Configure the Azure App Services to enforce FTPS-only access in the Azure portal or use Azure CLI commands to modify the FTPS settings. reference: - https://docs.microsoft.com/en-us/azure/app-service/configure-ftp - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-http2-not-enabled.yaml b/cloud/azure/appservice/azure-appservice-http2-not-enabled.yaml index 414c1b9bcdc..824e2ef4bfd 100644 --- a/cloud/azure/appservice/azure-appservice-http2-not-enabled.yaml +++ b/cloud/azure/appservice/azure-appservice-http2-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable HTTP/2 on your Azure App Service web applications to improve their performance and adhere to modern web standards. reference: - https://docs.microsoft.com/en-us/azure/app-service/configure-language-http2 - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-https-only-not-enforced.yaml b/cloud/azure/appservice/azure-appservice-https-only-not-enforced.yaml index 2c02a716edd..0d466a62086 100644 --- a/cloud/azure/appservice/azure-appservice-https-only-not-enforced.yaml +++ b/cloud/azure/appservice/azure-appservice-https-only-not-enforced.yaml @@ -11,7 +11,7 @@ info: Enable the HTTPS-only feature on all Azure App Services to enforce all traffic to be encrypted and secure. reference: - https://docs.microsoft.com/en-us/azure/app-service/configure-ssl-bindings#enforce-https - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-insights-not-enabled.yaml b/cloud/azure/appservice/azure-appservice-insights-not-enabled.yaml index 534c2d013f1..fdc477ff98b 100644 --- a/cloud/azure/appservice/azure-appservice-insights-not-enabled.yaml +++ b/cloud/azure/appservice/azure-appservice-insights-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable Application Insights for Azure App Services applications through the Azure portal or by using the Azure CLI to ensure comprehensive monitoring and management of application performance. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/app/app-insights-overview - tags: cloud,devops,azure,microsoft,application-insights,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,application-insights,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-remote-debugging-enabled.yaml b/cloud/azure/appservice/azure-appservice-remote-debugging-enabled.yaml index 20854a6a76d..de069266edf 100644 --- a/cloud/azure/appservice/azure-appservice-remote-debugging-enabled.yaml +++ b/cloud/azure/appservice/azure-appservice-remote-debugging-enabled.yaml @@ -11,7 +11,7 @@ info: Disable remote debugging for Azure App Services web applications through the Azure portal or using Azure CLI commands to enhance application security. reference: - https://docs.microsoft.com/en-us/azure/app-service/troubleshoot-remote-debug - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/appservice/azure-appservice-tls-latest-version-missing.yaml b/cloud/azure/appservice/azure-appservice-tls-latest-version-missing.yaml index 01459d0bf53..6025bc1878c 100644 --- a/cloud/azure/appservice/azure-appservice-tls-latest-version-missing.yaml +++ b/cloud/azure/appservice/azure-appservice-tls-latest-version-missing.yaml @@ -11,7 +11,7 @@ info: Configure the minimum TLS version to "1.2" in the Azure App Service settings to ensure data is encrypted with the latest security standards. reference: - https://docs.microsoft.com/en-us/azure/app-service/configure-ssl-bindings#enforce-https - tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/azure-env.yaml b/cloud/azure/azure-env.yaml index f176ef4a01d..a3637d12af8 100644 --- a/cloud/azure/azure-env.yaml +++ b/cloud/azure/azure-env.yaml @@ -9,7 +9,7 @@ info: - https://portal.azure.com/ metadata: max-request: 2 - tags: cloud,devops,microsoft,azure,azure-cloud-config,vuln + tags: cloud,devops,microsoft,azure,azure-cloud-config self-contained: true code: diff --git a/cloud/azure/cosmosdb/azure-cosmosdb-auto-failover-missing.yaml b/cloud/azure/cosmosdb/azure-cosmosdb-auto-failover-missing.yaml index cc6f0778ca5..4f8670cf1a2 100644 --- a/cloud/azure/cosmosdb/azure-cosmosdb-auto-failover-missing.yaml +++ b/cloud/azure/cosmosdb/azure-cosmosdb-auto-failover-missing.yaml @@ -11,7 +11,7 @@ info: Enable the Automatic Failover feature on your Azure Cosmos DB accounts to ensure high availability and fault tolerance across multiple regions. reference: - https://docs.microsoft.com/en-us/azure/cosmos-db/high-availability - tags: cloud,devops,azure,microsoft,cosmosdb,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,cosmosdb,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/cosmosdb/azure-cosmosdb-default-network-access-unrestricted.yaml b/cloud/azure/cosmosdb/azure-cosmosdb-default-network-access-unrestricted.yaml index a8215d23c01..59be171fa07 100644 --- a/cloud/azure/cosmosdb/azure-cosmosdb-default-network-access-unrestricted.yaml +++ b/cloud/azure/cosmosdb/azure-cosmosdb-default-network-access-unrestricted.yaml @@ -11,7 +11,7 @@ info: Update the firewall settings and enable Virtual Network filtering on your Azure Cosmos DB accounts to restrict access to trusted networks and IP addresses only. reference: - https://docs.microsoft.com/en-us/azure/cosmos-db/how-to-configure-firewall-vnet - tags: cloud,devops,azure,microsoft,cosmosdb,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,cosmosdb,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/functions/azure-functionapp-access-keys-missing.yaml b/cloud/azure/functions/azure-functionapp-access-keys-missing.yaml index 3eea5b89a44..c1f8406dc4c 100644 --- a/cloud/azure/functions/azure-functionapp-access-keys-missing.yaml +++ b/cloud/azure/functions/azure-functionapp-access-keys-missing.yaml @@ -11,7 +11,7 @@ info: Configure access keys for HTTP-triggered functions in Azure Function App to enforce secure and authorized function invocations. reference: - https://docs.microsoft.com/en-us/azure/azure-functions/functions-bindings-http-webhook-trigger?tabs=csharp - tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/functions/azure-functionapp-admin-privileges.yaml b/cloud/azure/functions/azure-functionapp-admin-privileges.yaml index 7dd8ed181b5..88eb399442c 100644 --- a/cloud/azure/functions/azure-functionapp-admin-privileges.yaml +++ b/cloud/azure/functions/azure-functionapp-admin-privileges.yaml @@ -11,7 +11,7 @@ info: Review and restrict the roles assigned to function apps to ensure they only have permissions necessary for their operation. Modify the roles through Azure portal or Azure CLI. reference: - https://docs.microsoft.com/en-us/azure/azure-functions/functions-reference - tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/functions/azure-functionapp-appinsights-missing.yaml b/cloud/azure/functions/azure-functionapp-appinsights-missing.yaml index ac62421472a..2766f066687 100644 --- a/cloud/azure/functions/azure-functionapp-appinsights-missing.yaml +++ b/cloud/azure/functions/azure-functionapp-appinsights-missing.yaml @@ -11,7 +11,7 @@ info: Configure your Azure Function Apps to integrate with Application Insights to enable detailed monitoring and analytics capabilities. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/app/app-insights-overview - tags: cloud,devops,azure,microsoft,application-insights,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,application-insights,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/functions/azure-functionapp-public-exposure.yaml b/cloud/azure/functions/azure-functionapp-public-exposure.yaml index fb32d08d736..cf1df8bf46d 100644 --- a/cloud/azure/functions/azure-functionapp-public-exposure.yaml +++ b/cloud/azure/functions/azure-functionapp-public-exposure.yaml @@ -11,7 +11,7 @@ info: Configure Azure Functions to restrict access from the public network by setting the 'publicNetworkAccess' to 'Disabled'. reference: - https://docs.microsoft.com/en-us/azure/azure-functions/functions-networking-options - tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/functions/azure-functionapp-system-assigned-missing.yaml b/cloud/azure/functions/azure-functionapp-system-assigned-missing.yaml index 64db57b78f9..bb5b4b3f132 100644 --- a/cloud/azure/functions/azure-functionapp-system-assigned-missing.yaml +++ b/cloud/azure/functions/azure-functionapp-system-assigned-missing.yaml @@ -11,7 +11,7 @@ info: Enable system-assigned managed identities for your Azure Function Apps to enhance security and simplify the management of resource access. reference: - https://docs.microsoft.com/en-us/azure/app-service/overview-managed-identity - tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/functions/azure-functionapp-user-assigned-id-missing.yaml b/cloud/azure/functions/azure-functionapp-user-assigned-id-missing.yaml index c0f7a4f2b55..45d9aee0b60 100644 --- a/cloud/azure/functions/azure-functionapp-user-assigned-id-missing.yaml +++ b/cloud/azure/functions/azure-functionapp-user-assigned-id-missing.yaml @@ -11,7 +11,7 @@ info: Configure user-assigned managed identities for your Azure Function Apps to gain more granular control over permissions and reduce potential security risks. reference: - https://docs.microsoft.com/en-us/azure/app-service/overview-managed-identity - tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/functions/azure-functionapp-vnet-integration-missing.yaml b/cloud/azure/functions/azure-functionapp-vnet-integration-missing.yaml index b15c8ca8c88..3d0cabb67fe 100644 --- a/cloud/azure/functions/azure-functionapp-vnet-integration-missing.yaml +++ b/cloud/azure/functions/azure-functionapp-vnet-integration-missing.yaml @@ -11,7 +11,7 @@ info: Enable Virtual Network integration for your Azure Function Apps to secure connections to trusted Virtual Networks. reference: - https://docs.microsoft.com/en-us/azure/azure-functions/functions-networking-options - tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,functionapp,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-app-tier-cmk-untagged.yaml b/cloud/azure/keyvault/azure-app-tier-cmk-untagged.yaml index c731c707658..90b7698b219 100644 --- a/cloud/azure/keyvault/azure-app-tier-cmk-untagged.yaml +++ b/cloud/azure/keyvault/azure-app-tier-cmk-untagged.yaml @@ -11,7 +11,7 @@ info: Ensure all Customer-Managed Keys used in the application tier are properly tagged according to organizational policies. Update the key's metadata through the Azure portal or Azure CLI. reference: - https://docs.microsoft.com/en-us/azure/key-vault/keys/about-keys-details - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-database-tier-cmk-absent.yaml b/cloud/azure/keyvault/azure-database-tier-cmk-absent.yaml index d4fa6479a78..733cfe72123 100644 --- a/cloud/azure/keyvault/azure-database-tier-cmk-absent.yaml +++ b/cloud/azure/keyvault/azure-database-tier-cmk-absent.yaml @@ -11,7 +11,7 @@ info: Configure a Customer-Managed Key for your Azure database tier by setting the appropriate policies through Azure portal or using Azure CLI. reference: - https://docs.microsoft.com/en-us/azure/key-vault/keys/about-keys - tags: cloud,devops,azure,microsoft,azure-key-vault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-key-vault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-keyvault-audit-not-enabled.yaml b/cloud/azure/keyvault/azure-keyvault-audit-not-enabled.yaml index 697d7e8f26b..a43a569159c 100644 --- a/cloud/azure/keyvault/azure-keyvault-audit-not-enabled.yaml +++ b/cloud/azure/keyvault/azure-keyvault-audit-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable the AuditEvent logging for Azure Key Vaults to ensure all access and operations are logged, enhancing security and compliance. reference: - https://docs.microsoft.com/en-us/azure/key-vault/general/overview-security - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-keyvault-cert-keytype-unapproved.yaml b/cloud/azure/keyvault/azure-keyvault-cert-keytype-unapproved.yaml index 91069a5af54..bf1d2e00856 100644 --- a/cloud/azure/keyvault/azure-keyvault-cert-keytype-unapproved.yaml +++ b/cloud/azure/keyvault/azure-keyvault-cert-keytype-unapproved.yaml @@ -11,7 +11,7 @@ info: Review and update the certificate key types for your Azure Key Vault SSL/TLS certificates to align with approved key types through the Azure portal or Azure CLI. reference: - https://docs.microsoft.com/en-us/azure/key-vault/certificates/about-certificates - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-keyvault-cert-transparency-missing.yaml b/cloud/azure/keyvault/azure-keyvault-cert-transparency-missing.yaml index df6f07ac182..336f32c925d 100644 --- a/cloud/azure/keyvault/azure-keyvault-cert-transparency-missing.yaml +++ b/cloud/azure/keyvault/azure-keyvault-cert-transparency-missing.yaml @@ -11,7 +11,7 @@ info: Enable Certificate Transparency for all Azure Key Vault SSL/TLS certificates through the Azure portal or Azure CLI to meet the standards enforced by the Certification Authority Browser Forum (CA/Browser Forum). reference: - https://docs.microsoft.com/en-us/azure/key-vault/certificates/how-to-enable-certificate-transparency - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-keyvault-certificate-insufficient-autorenew.yaml b/cloud/azure/keyvault/azure-keyvault-certificate-insufficient-autorenew.yaml index c1b4afa61ee..d71c572e9d8 100644 --- a/cloud/azure/keyvault/azure-keyvault-certificate-insufficient-autorenew.yaml +++ b/cloud/azure/keyvault/azure-keyvault-certificate-insufficient-autorenew.yaml @@ -11,7 +11,7 @@ info: Configure SSL certificates within Azure Key Vaults to have an auto-renewal period that aligns with your organization's security and compliance requirements to ensure timely and effective renewal. reference: - https://docs.microsoft.com/en-us/azure/key-vault/certificates/about-certificates - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-keyvault-network-unrestricted.yaml b/cloud/azure/keyvault/azure-keyvault-network-unrestricted.yaml index b14194e046f..bf4f4f73dc1 100644 --- a/cloud/azure/keyvault/azure-keyvault-network-unrestricted.yaml +++ b/cloud/azure/keyvault/azure-keyvault-network-unrestricted.yaml @@ -11,7 +11,7 @@ info: Modify Key Vault network settings to deny access from all networks by default. Configure network rules to allow access only from specific trusted IPs or networks. reference: - https://docs.microsoft.com/en-us/azure/key-vault/general/network-security - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-keyvault-recoverability-unconfigured.yaml b/cloud/azure/keyvault/azure-keyvault-recoverability-unconfigured.yaml index 82153b2d675..64d7646477a 100644 --- a/cloud/azure/keyvault/azure-keyvault-recoverability-unconfigured.yaml +++ b/cloud/azure/keyvault/azure-keyvault-recoverability-unconfigured.yaml @@ -11,7 +11,7 @@ info: Enable "Soft Delete" and "Do Not Purge" on all Azure Key Vaults to ensure they are recoverable and protected against permanent deletion. reference: - https://docs.microsoft.com/en-us/azure/key-vault/general/soft-delete-overview - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-keyvault-ssl-autorenewal-missing.yaml b/cloud/azure/keyvault/azure-keyvault-ssl-autorenewal-missing.yaml index 38575699596..32e8ce03beb 100644 --- a/cloud/azure/keyvault/azure-keyvault-ssl-autorenewal-missing.yaml +++ b/cloud/azure/keyvault/azure-keyvault-ssl-autorenewal-missing.yaml @@ -11,7 +11,7 @@ info: Configure SSL certificates in Azure Key Vaults to automatically renew by setting the correct policies in the Azure portal or through Azure CLI. reference: - https://docs.microsoft.com/en-us/azure/key-vault/certificates/how-to-renew-certificate - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/keyvault/azure-keyvault-trusted-ms-unrestricted.yaml b/cloud/azure/keyvault/azure-keyvault-trusted-ms-unrestricted.yaml index e9140a2d309..1470e1c78af 100644 --- a/cloud/azure/keyvault/azure-keyvault-trusted-ms-unrestricted.yaml +++ b/cloud/azure/keyvault/azure-keyvault-trusted-ms-unrestricted.yaml @@ -11,7 +11,7 @@ info: Enable the "Allow trusted Microsoft services to bypass this firewall" setting in your Key Vault network configuration to allow trusted services access. reference: - https://docs.microsoft.com/en-us/azure/key-vault/general/network-security - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/locks/azure-keyvault-resource-lock-check.yaml b/cloud/azure/locks/azure-keyvault-resource-lock-check.yaml index 5e28cde6eeb..8ef08fa6381 100644 --- a/cloud/azure/locks/azure-keyvault-resource-lock-check.yaml +++ b/cloud/azure/locks/azure-keyvault-resource-lock-check.yaml @@ -11,7 +11,7 @@ info: Apply resource locks to all critical Azure resources, particularly Key Vaults. Use either the "ReadOnly" or "CanNotDelete" lock levels to prevent unwanted changes or deletions. reference: - https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/lock-resources - tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,keyvault,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/monitor/azure-diag-logs-not-enabled.yaml b/cloud/azure/monitor/azure-diag-logs-not-enabled.yaml index 59672d53c19..1d41de104d9 100644 --- a/cloud/azure/monitor/azure-diag-logs-not-enabled.yaml +++ b/cloud/azure/monitor/azure-diag-logs-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable Diagnostic Logs for all Azure resources and ensure logs are sent to a storage account and Log Analytics Workspace or an equivalent system. Logs should be kept in accessible storage for at least one year, then moved to cold storage. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/logs/diagnostic-logs-overview - tags: cloud,devops,azure,microsoft,diagnostic-logs,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,diagnostic-logs,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/monitor/azure-diagnostic-categories-misconfigured.yaml b/cloud/azure/monitor/azure-diagnostic-categories-misconfigured.yaml index 435d3eaa2b2..390887afe5c 100644 --- a/cloud/azure/monitor/azure-diagnostic-categories-misconfigured.yaml +++ b/cloud/azure/monitor/azure-diagnostic-categories-misconfigured.yaml @@ -11,7 +11,7 @@ info: Configure diagnostic settings for each Azure resource to log necessary activities from the control/management plane, ensuring that all important events are captured and reviewed regularly for anomalies. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/essentials/diagnostic-settings - tags: cloud,devops,azure,microsoft,diagnostic,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,diagnostic,azure-cloud-config self-contained: true code: diff --git a/cloud/azure/monitor/azure-log-profile-all-activities.yaml b/cloud/azure/monitor/azure-log-profile-all-activities.yaml index e070e88b7af..f8d9aa299eb 100644 --- a/cloud/azure/monitor/azure-log-profile-all-activities.yaml +++ b/cloud/azure/monitor/azure-log-profile-all-activities.yaml @@ -11,7 +11,7 @@ info: Configure the Azure Log Profile to include all necessary activity categories such as "Write", "Delete", and "Action" to ensure comprehensive logging and compliance with security policies. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/platform/activity-log-collect - tags: cloud,devops,azure,microsoft,log-profile,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,log-profile,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/monitor/azure-monitor-diagnostic-unrestricted.yaml b/cloud/azure/monitor/azure-monitor-diagnostic-unrestricted.yaml index d5b07bd9c00..ad3b581c67f 100644 --- a/cloud/azure/monitor/azure-monitor-diagnostic-unrestricted.yaml +++ b/cloud/azure/monitor/azure-monitor-diagnostic-unrestricted.yaml @@ -11,7 +11,7 @@ info: Configure Azure Monitor Diagnostic Settings to export activity logs. Refer to the Azure documentation on how to set up diagnostic settings for activity log export. reference: - https://docs.microsoft.com/en-us/azure/azure-monitor/essentials/activity-log - tags: cloud,devops,azure,microsoft,monitor,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,monitor,azure-cloud-config self-contained: true code: diff --git a/cloud/azure/network/azure-network-watcher.yaml b/cloud/azure/network/azure-network-watcher.yaml index 23ff6d3b5d6..2fb18eef7e4 100644 --- a/cloud/azure/network/azure-network-watcher.yaml +++ b/cloud/azure/network/azure-network-watcher.yaml @@ -11,7 +11,7 @@ info: Enable Azure Network Watcher in all regions of your Microsoft Azure subscription. Refer to Azure documentation on how to enable and manage Azure Network Watcher. reference: - https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-monitoring-overview - tags: cloud,devops,azure,microsoft,network-watcher,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,network-watcher,azure-cloud-config self-contained: true code: diff --git a/cloud/azure/network/azure-nic-ip-forwarding-check.yaml b/cloud/azure/network/azure-nic-ip-forwarding-check.yaml index 2b5651e60f6..0e2809464b8 100644 --- a/cloud/azure/network/azure-nic-ip-forwarding-check.yaml +++ b/cloud/azure/network/azure-nic-ip-forwarding-check.yaml @@ -11,7 +11,7 @@ info: Regularly review and validate the necessity of IP forwarding settings on Azure NICs. Ensure that only authorized and secure virtual appliances use this feature. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/ip-forwarding - tags: cloud,devops,azure,microsoft,nic,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nic,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-cifs-unrestricted.yaml b/cloud/azure/network/azure-nsg-cifs-unrestricted.yaml index be037251c24..9a02b82504d 100644 --- a/cloud/azure/network/azure-nsg-cifs-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-cifs-unrestricted.yaml @@ -11,7 +11,7 @@ info: Modify NSG rules to restrict access on TCP port 445. Only allow known IPs, and consider implementing stronger security measures for sensitive file transfers. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-dns-unrestricted.yaml b/cloud/azure/network/azure-nsg-dns-unrestricted.yaml index 35ef5662614..197e0d95683 100644 --- a/cloud/azure/network/azure-nsg-dns-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-dns-unrestricted.yaml @@ -11,7 +11,7 @@ info: Restrict access to DNS services by configuring NSG rules to only allow trusted sources and necessary traffic on TCP and UDP port 53. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-ftp-unrestricted.yaml b/cloud/azure/network/azure-nsg-ftp-unrestricted.yaml index 891108b2f6e..f52bf9a092e 100644 --- a/cloud/azure/network/azure-nsg-ftp-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-ftp-unrestricted.yaml @@ -11,7 +11,7 @@ info: Update NSG rules to restrict FTP access by allowing only IP addresses that require FTP services on TCP ports 20 and 21. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-http-unrestricted.yaml b/cloud/azure/network/azure-nsg-http-unrestricted.yaml index 884650e2297..8f67901e66f 100644 --- a/cloud/azure/network/azure-nsg-http-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-http-unrestricted.yaml @@ -11,7 +11,7 @@ info: Modify NSG rules to restrict access on TCP port 80. Ensure that only known IPs are allowed, or implement additional authentication methods to protect against unauthorized access. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-https-unrestricted.yaml b/cloud/azure/network/azure-nsg-https-unrestricted.yaml index f1694f3b852..77fa490e227 100644 --- a/cloud/azure/network/azure-nsg-https-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-https-unrestricted.yaml @@ -11,7 +11,7 @@ info: Modify NSG rules to restrict access on TCP port 443. Only allow known IPs, and consider using advanced security measures such as Web Application Firewalls. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-icmp-unrestricted.yaml b/cloud/azure/network/azure-nsg-icmp-unrestricted.yaml index 42aa0eddb5f..e5b4f01dbee 100644 --- a/cloud/azure/network/azure-nsg-icmp-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-icmp-unrestricted.yaml @@ -11,7 +11,7 @@ info: Configure NSG rules to restrict ICMP traffic. Only allow necessary ICMP types and codes and monitor ICMP activity to detect unusual patterns. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-mongodb-unrestricted.yaml b/cloud/azure/network/azure-nsg-mongodb-unrestricted.yaml index b0d2c7c0a4f..e06e736dc7a 100644 --- a/cloud/azure/network/azure-nsg-mongodb-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-mongodb-unrestricted.yaml @@ -11,7 +11,7 @@ info: Modify NSG rules to restrict access on TCP ports 27017, 27018, and 27019. Only allow known IPs and implement database encryption and other security measures. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-mssql-unrestricted.yaml b/cloud/azure/network/azure-nsg-mssql-unrestricted.yaml index 0559edba660..159852f646a 100644 --- a/cloud/azure/network/azure-nsg-mssql-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-mssql-unrestricted.yaml @@ -11,7 +11,7 @@ info: Restrict access to MS SQL Server by configuring NSG rules to only allow trusted sources to connect on TCP port 1433. Implement robust monitoring and alerting mechanisms to detect unauthorized access attempts. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-mysql-unrestricted.yaml b/cloud/azure/network/azure-nsg-mysql-unrestricted.yaml index d7eabdc8301..84b770d334c 100644 --- a/cloud/azure/network/azure-nsg-mysql-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-mysql-unrestricted.yaml @@ -11,7 +11,7 @@ info: Modify NSG rules to restrict access on TCP port 3306. Allow connections only from trusted and necessary IP addresses to secure the MySQL databases against unauthorized access. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-netbios-unrestricted.yaml b/cloud/azure/network/azure-nsg-netbios-unrestricted.yaml index 320ad9f0755..48669cd2631 100644 --- a/cloud/azure/network/azure-nsg-netbios-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-netbios-unrestricted.yaml @@ -11,7 +11,7 @@ info: Update NSG rules to limit NetBIOS access to only necessary and secure sources, thereby enhancing the overall security posture of your network infrastructure. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-oracle-db-unrestricted.yaml b/cloud/azure/network/azure-nsg-oracle-db-unrestricted.yaml index 5794aa12972..5a5970a0646 100644 --- a/cloud/azure/network/azure-nsg-oracle-db-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-oracle-db-unrestricted.yaml @@ -11,7 +11,7 @@ info: Modify NSG rules to restrict access on TCP port 1521. Implement strict access controls and monitor connections to ensure only authorized access. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-postgresql-unrestricted.yaml b/cloud/azure/network/azure-nsg-postgresql-unrestricted.yaml index 7cd88b9547f..1dd53277f92 100644 --- a/cloud/azure/network/azure-nsg-postgresql-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-postgresql-unrestricted.yaml @@ -11,7 +11,7 @@ info: Implement strict NSG rules to restrict access on TCP port 5432 to only trusted IPs. Consider using additional layers of security, such as VPNs or Azure Private Link, to enhance database security. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-rdp-unrestricted.yaml b/cloud/azure/network/azure-nsg-rdp-unrestricted.yaml index 39ab10510ce..0f74c513265 100644 --- a/cloud/azure/network/azure-nsg-rdp-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-rdp-unrestricted.yaml @@ -11,7 +11,7 @@ info: Configure NSG rules to restrict RDP access to only trusted IP addresses. Consider using VPNs or other secure methods for remote access. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-rpc-unrestricted.yaml b/cloud/azure/network/azure-nsg-rpc-unrestricted.yaml index 8715b0b73c5..ce4578c77d1 100644 --- a/cloud/azure/network/azure-nsg-rpc-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-rpc-unrestricted.yaml @@ -11,7 +11,7 @@ info: Configure NSG rules to restrict access on TCP port 135. Ensure only necessary systems can initiate RPC, and apply strict monitoring and logging to detect unusual activities. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-smtp-unrestricted.yaml b/cloud/azure/network/azure-nsg-smtp-unrestricted.yaml index e19bccf4d64..3738fc6ac97 100644 --- a/cloud/azure/network/azure-nsg-smtp-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-smtp-unrestricted.yaml @@ -11,7 +11,7 @@ info: Configure NSG rules to restrict access to SMTP services on TCP port 25. Allow only trusted IP addresses to send emails and implement proper email authentication mechanisms. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-ssh-unrestricted.yaml b/cloud/azure/network/azure-nsg-ssh-unrestricted.yaml index 8bb6f656d07..c78b8a84587 100644 --- a/cloud/azure/network/azure-nsg-ssh-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-ssh-unrestricted.yaml @@ -11,7 +11,7 @@ info: Modify NSG rules to restrict SSH access by allowing only specific, trusted IP addresses to connect on TCP port 22. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-telnet-unrestricted.yaml b/cloud/azure/network/azure-nsg-telnet-unrestricted.yaml index 148061588e1..d46d8007c19 100644 --- a/cloud/azure/network/azure-nsg-telnet-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-telnet-unrestricted.yaml @@ -11,7 +11,7 @@ info: Modify NSG rules to restrict access on TCP port 23. Only allow access from secure, authenticated sources and consider using more secure alternatives like SSH. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-udp-unrestricted.yaml b/cloud/azure/network/azure-nsg-udp-unrestricted.yaml index 9a206ec529b..780d20ee1f8 100644 --- a/cloud/azure/network/azure-nsg-udp-unrestricted.yaml +++ b/cloud/azure/network/azure-nsg-udp-unrestricted.yaml @@ -11,7 +11,7 @@ info: Restrict access to UDP ports by configuring NSG rules to only allow trusted sources and necessary traffic. Implement additional security measures where possible. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-nsg-unrestricted-port-range.yaml b/cloud/azure/network/azure-nsg-unrestricted-port-range.yaml index 5f47763b2ed..366a361b3c1 100644 --- a/cloud/azure/network/azure-nsg-unrestricted-port-range.yaml +++ b/cloud/azure/network/azure-nsg-unrestricted-port-range.yaml @@ -11,7 +11,7 @@ info: Modify the NSG rules to only allow inbound traffic on necessary ports specific to your application requirements. This practice minimizes potential attack vectors. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview - tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/network/azure-vnet-ddos-protection.yaml b/cloud/azure/network/azure-vnet-ddos-protection.yaml index e97e2216856..da9638cb439 100644 --- a/cloud/azure/network/azure-vnet-ddos-protection.yaml +++ b/cloud/azure/network/azure-vnet-ddos-protection.yaml @@ -11,7 +11,7 @@ info: Enable DDoS Standard Protection for all security-critical virtual networks in your Microsoft Azure subscription to mitigate the risks associated with DDoS attacks. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/ddos-protection-overview - tags: cloud,devops,azure,microsoft,ddos,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,ddos,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgres-allow-azure-services-disabled.yaml b/cloud/azure/postgresql/azure-postgres-allow-azure-services-disabled.yaml index 715b859f5c9..67856028557 100644 --- a/cloud/azure/postgresql/azure-postgres-allow-azure-services-disabled.yaml +++ b/cloud/azure/postgresql/azure-postgres-allow-azure-services-disabled.yaml @@ -11,7 +11,7 @@ info: Configure firewall rules to disable the "Allow access to Azure services" setting for Azure PostgreSQL Database servers to restrict access to trusted sources only. reference: - https://docs.microsoft.com/en-us/azure/postgresql/concepts-firewall-rules - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgres-connection-throttling-disabled.yaml b/cloud/azure/postgresql/azure-postgres-connection-throttling-disabled.yaml index 17573eda63f..5004bac1bd3 100644 --- a/cloud/azure/postgresql/azure-postgres-connection-throttling-disabled.yaml +++ b/cloud/azure/postgresql/azure-postgres-connection-throttling-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the "connection_throttling" server parameter on your Azure PostgreSQL servers to prevent excessive failed login attempts and mitigate potential attacks. reference: - https://docs.microsoft.com/en-us/azure/postgresql/concepts-server-parameters - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgres-double-encryption-disabled.yaml b/cloud/azure/postgresql/azure-postgres-double-encryption-disabled.yaml index 8f8c44c71bd..bf9edcfa832 100644 --- a/cloud/azure/postgresql/azure-postgres-double-encryption-disabled.yaml +++ b/cloud/azure/postgresql/azure-postgres-double-encryption-disabled.yaml @@ -11,7 +11,7 @@ info: Enable infrastructure double encryption on all your Azure PostgreSQL Single Server databases to ensure an additional layer of security. reference: - https://docs.microsoft.com/en-us/azure/postgresql/concepts-data-security-encryption - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgres-log-checkpoints-disabled.yaml b/cloud/azure/postgresql/azure-postgres-log-checkpoints-disabled.yaml index 4616c5157da..70a50c0b743 100644 --- a/cloud/azure/postgresql/azure-postgres-log-checkpoints-disabled.yaml +++ b/cloud/azure/postgresql/azure-postgres-log-checkpoints-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the "log_checkpoints" parameter for your Azure PostgreSQL flexible servers to ensure critical operational events are logged. reference: - https://docs.microsoft.com/en-us/azure/postgresql/flexible-server/concepts-server-parameters - tags: cloud,devops,azure,microsoft,postgres,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgres,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgres-log-connections-disabled.yaml b/cloud/azure/postgresql/azure-postgres-log-connections-disabled.yaml index c9835feee8a..1129adfecba 100644 --- a/cloud/azure/postgresql/azure-postgres-log-connections-disabled.yaml +++ b/cloud/azure/postgresql/azure-postgres-log-connections-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the "log_connections" server parameter for all Azure PostgreSQL servers to ensure that all connection attempts are logged, enhancing security monitoring capabilities. reference: - https://docs.microsoft.com/en-us/azure/postgresql/concepts-server-logs - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgres-log-disconnections-disabled.yaml b/cloud/azure/postgresql/azure-postgres-log-disconnections-disabled.yaml index 4a6ed701442..6d4e9315f93 100644 --- a/cloud/azure/postgresql/azure-postgres-log-disconnections-disabled.yaml +++ b/cloud/azure/postgresql/azure-postgres-log-disconnections-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the "log_disconnections" parameter for your Azure PostgreSQL servers to enhance security and auditing capabilities. This change must be made by an Azure account admin at the session start. reference: - https://docs.microsoft.com/en-us/azure/postgresql/concepts-server-logs - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgres-log-duration-disabled.yaml b/cloud/azure/postgresql/azure-postgres-log-duration-disabled.yaml index 7e5c97f8225..e393644c5fe 100644 --- a/cloud/azure/postgresql/azure-postgres-log-duration-disabled.yaml +++ b/cloud/azure/postgresql/azure-postgres-log-duration-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the "log_duration" parameter in Azure PostgreSQL server configurations to ensure comprehensive logging of query durations for security and performance analysis. reference: - https://docs.microsoft.com/en-us/azure/postgresql/concepts-server-logs - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgresql-geo-backup-disabled.yaml b/cloud/azure/postgresql/azure-postgresql-geo-backup-disabled.yaml index a775f0e12bf..aabc41ca685 100644 --- a/cloud/azure/postgresql/azure-postgresql-geo-backup-disabled.yaml +++ b/cloud/azure/postgresql/azure-postgresql-geo-backup-disabled.yaml @@ -11,7 +11,7 @@ info: Enable geo-redundant backups in the Azure portal or use Azure CLI to update your PostgreSQL server's backup configuration to enable geo-redundancy. reference: - https://docs.microsoft.com/en-us/azure/postgresql/concepts-backup - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgresql-ssl-enforcement.yaml b/cloud/azure/postgresql/azure-postgresql-ssl-enforcement.yaml index 3792b638e5f..b6f74d7e722 100644 --- a/cloud/azure/postgresql/azure-postgresql-ssl-enforcement.yaml +++ b/cloud/azure/postgresql/azure-postgresql-ssl-enforcement.yaml @@ -11,7 +11,7 @@ info: Enable SSL enforcement on all Azure PostgreSQL servers to ensure that data is encrypted in transit and protected from unauthorized access. reference: - https://docs.microsoft.com/en-us/azure/postgresql/concepts-ssl-connection-security - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/postgresql/azure-postgresql-storage-autogrow-disabled.yaml b/cloud/azure/postgresql/azure-postgresql-storage-autogrow-disabled.yaml index a17df8ca939..6606f830cc0 100644 --- a/cloud/azure/postgresql/azure-postgresql-storage-autogrow-disabled.yaml +++ b/cloud/azure/postgresql/azure-postgresql-storage-autogrow-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the Storage Auto-Growth feature on your Azure PostgreSQL servers to prevent potential disruptions and ensure continuous database operation. reference: - https://docs.microsoft.com/en-us/azure/postgresql/concepts-storage - tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/redis/azure-redis-nonssl-port-disabled.yaml b/cloud/azure/redis/azure-redis-nonssl-port-disabled.yaml index b94afc1f6c8..2bb1fe8d49a 100644 --- a/cloud/azure/redis/azure-redis-nonssl-port-disabled.yaml +++ b/cloud/azure/redis/azure-redis-nonssl-port-disabled.yaml @@ -11,7 +11,7 @@ info: Enable SSL on your Azure Redis Cache servers and ensure the non-SSL port (6379) is disabled to enforce encryption in transit. reference: - https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-configure#ssl-ports - tags: cloud,devops,azure,microsoft,redis,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,redis,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/redis/azure-redis-tls-version-outdated.yaml b/cloud/azure/redis/azure-redis-tls-version-outdated.yaml index 3b561270618..df251b53ae3 100644 --- a/cloud/azure/redis/azure-redis-tls-version-outdated.yaml +++ b/cloud/azure/redis/azure-redis-tls-version-outdated.yaml @@ -11,7 +11,7 @@ info: Upgrade the TLS version of your Azure Redis Cache servers to the latest version supported by Microsoft Azure to enhance security and compliance with industry standards. reference: - https://docs.microsoft.com/en-us/azure/redis-cache/ - tags: cloud,devops,azure,microsoft,redis,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,redis,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/search/azure-search-service-managed-identity-disabled.yaml b/cloud/azure/search/azure-search-service-managed-identity-disabled.yaml index 03246111eb1..584a935f2b8 100644 --- a/cloud/azure/search/azure-search-service-managed-identity-disabled.yaml +++ b/cloud/azure/search/azure-search-service-managed-identity-disabled.yaml @@ -11,7 +11,7 @@ info: Enable system-assigned managed identities on your Azure Search Service instances to secure access to Azure resources. reference: - https://docs.microsoft.com/en-us/azure/search/search-managed-identities - tags: cloud,devops,azure,microsoft,azure-search,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-search,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/securitycenter/azure-defender-auto-provisioning-disabled.yaml b/cloud/azure/securitycenter/azure-defender-auto-provisioning-disabled.yaml index 00c8453165e..2b4fc30425e 100644 --- a/cloud/azure/securitycenter/azure-defender-auto-provisioning-disabled.yaml +++ b/cloud/azure/securitycenter/azure-defender-auto-provisioning-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the automatic provisioning feature within Microsoft Defender for Cloud to ensure that all necessary security agents are automatically deployed across your Azure resources. reference: - https://docs.microsoft.com/en-us/azure/security-center/security-center-auto-provisioning - tags: cloud,devops,azure,microsoft,defender-for-cloud,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,defender-for-cloud,azure-cloud-config self-contained: true code: diff --git a/cloud/azure/servicebus/azure-servicebus-public-access-disabled.yaml b/cloud/azure/servicebus/azure-servicebus-public-access-disabled.yaml index 520a8b127d4..bc2fa7bed0a 100644 --- a/cloud/azure/servicebus/azure-servicebus-public-access-disabled.yaml +++ b/cloud/azure/servicebus/azure-servicebus-public-access-disabled.yaml @@ -11,7 +11,7 @@ info: Disable public network access to all your Azure Service Bus namespaces to ensure that they are only accessible through authorized private networks. reference: - https://docs.microsoft.com/en-us/azure/service-bus-messaging/service-bus-networking - tags: cloud,devops,azure,microsoft,service-bus,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,service-bus,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/servicebus/azure-servicebus-tls-version-outdated.yaml b/cloud/azure/servicebus/azure-servicebus-tls-version-outdated.yaml index 9b6f1f66229..38fb6555022 100644 --- a/cloud/azure/servicebus/azure-servicebus-tls-version-outdated.yaml +++ b/cloud/azure/servicebus/azure-servicebus-tls-version-outdated.yaml @@ -11,7 +11,7 @@ info: Update your Azure Service Bus namespaces to use the latest supported TLS version, TLS 1.2, to ensure improved security and data protection. reference: - https://docs.microsoft.com/en-us/azure/service-bus-messaging/service-bus-tls - tags: cloud,devops,azure,microsoft,servicebus,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,servicebus,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/sql/azure-sql-auditing-disabled.yaml b/cloud/azure/sql/azure-sql-auditing-disabled.yaml index f49a5545e44..aed9805ffc3 100644 --- a/cloud/azure/sql/azure-sql-auditing-disabled.yaml +++ b/cloud/azure/sql/azure-sql-auditing-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the "Auditing" feature in Azure SQL server settings to ensure comprehensive monitoring and compliance across all databases. reference: - https://docs.microsoft.com/en-us/azure/azure-sql/database/auditing-overview - tags: cloud,devops,azure,microsoft,sql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,sql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/sql/azure-sql-failover-not-enabled.yaml b/cloud/azure/sql/azure-sql-failover-not-enabled.yaml index 978c400eb0e..6b8a7715f19 100644 --- a/cloud/azure/sql/azure-sql-failover-not-enabled.yaml +++ b/cloud/azure/sql/azure-sql-failover-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable auto-failover groups on your Azure SQL database servers to ensure high availability and automatic failover capabilities are in place. reference: - https://docs.microsoft.com/en-us/azure/azure-sql/database/auto-failover-group-overview - tags: cloud,devops,azure,microsoft,azure-sql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-sql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/sql/azure-sql-mi-tde-cmk-not-enabled.yaml b/cloud/azure/sql/azure-sql-mi-tde-cmk-not-enabled.yaml index 5a0ab4803ee..28d0d826157 100644 --- a/cloud/azure/sql/azure-sql-mi-tde-cmk-not-enabled.yaml +++ b/cloud/azure/sql/azure-sql-mi-tde-cmk-not-enabled.yaml @@ -11,7 +11,7 @@ info: Configure Transparent Data Encryption to use Customer-Managed Keys by setting the TDE protector to use a key from your Azure key vault for your SQL managed instances. reference: - https://docs.microsoft.com/en-us/azure/azure-sql/database/transparent-data-encryption-tde-overview - tags: cloud,devops,azure,microsoft,sql-managed-instance,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,sql-managed-instance,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/sql/azure-sql-mi-tls-version-outdated.yaml b/cloud/azure/sql/azure-sql-mi-tls-version-outdated.yaml index b510a744173..8114fb9b78b 100644 --- a/cloud/azure/sql/azure-sql-mi-tls-version-outdated.yaml +++ b/cloud/azure/sql/azure-sql-mi-tls-version-outdated.yaml @@ -11,7 +11,7 @@ info: Update the TLS configuration of your Azure SQL managed instances to use TLS 1.2, ensuring enhanced security and compliance with industry best practices. reference: - https://docs.microsoft.com/en-us/azure/azure-sql/managed-instance/transact-sql-tls-configuration - tags: cloud,devops,azure,microsoft,azure-sql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-sql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/sql/azure-sql-tde-cmk-not-used.yaml b/cloud/azure/sql/azure-sql-tde-cmk-not-used.yaml index 5e85af5fc99..46f0008b052 100644 --- a/cloud/azure/sql/azure-sql-tde-cmk-not-used.yaml +++ b/cloud/azure/sql/azure-sql-tde-cmk-not-used.yaml @@ -11,7 +11,7 @@ info: Configure the Transparent Data Encryption (TDE) feature of your Azure SQL server to use a Customer-Managed Key (CMK) from your own Azure Key Vault. reference: - https://docs.microsoft.com/en-us/azure/azure-sql/database/transparent-data-encryption-byok-azure-sql-configure - tags: cloud,devops,azure,microsoft,sql,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,sql,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/sql/azure-sql-tde-not-enabled.yaml b/cloud/azure/sql/azure-sql-tde-not-enabled.yaml index 249c0af3be6..e9d4c9a4b11 100644 --- a/cloud/azure/sql/azure-sql-tde-not-enabled.yaml +++ b/cloud/azure/sql/azure-sql-tde-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable Transparent Data Encryption on all your Azure SQL databases to protect data at rest using encryption. reference: - https://docs.microsoft.com/en-us/azure/azure-sql/database/transparent-data-encryption-tde-overview - tags: cloud,devops,azure,microsoft,sql-database,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,sql-database,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/sql/azure-sql-va-emails-unconfigured.yaml b/cloud/azure/sql/azure-sql-va-emails-unconfigured.yaml index 40afdc05bf2..68baf376aeb 100644 --- a/cloud/azure/sql/azure-sql-va-emails-unconfigured.yaml +++ b/cloud/azure/sql/azure-sql-va-emails-unconfigured.yaml @@ -11,7 +11,7 @@ info: Configure the email addresses for vulnerability assessment notifications in your SQL server settings to ensure alerts and reports are received by the appropriate stakeholders. reference: - https://docs.microsoft.com/en-us/azure/azure-sql/database/security-overview - tags: cloud,devops,azure,microsoft,sql-server,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,sql-server,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-blob-anonymous-access-disabled.yaml b/cloud/azure/storageaccounts/azure-blob-anonymous-access-disabled.yaml index 6029245a0b8..c60a6104b39 100644 --- a/cloud/azure/storageaccounts/azure-blob-anonymous-access-disabled.yaml +++ b/cloud/azure/storageaccounts/azure-blob-anonymous-access-disabled.yaml @@ -11,7 +11,7 @@ info: Disable public (anonymous) access to all blob containers in Azure storage accounts to protect your data against unauthorized access. reference: - https://docs.microsoft.com/en-us/azure/storage/blobs/anonymous-read-access-prevent - tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-blob-immutable-not-enabled.yaml b/cloud/azure/storageaccounts/azure-blob-immutable-not-enabled.yaml index 404e707bb24..ea4e3d9be41 100644 --- a/cloud/azure/storageaccounts/azure-blob-immutable-not-enabled.yaml +++ b/cloud/azure/storageaccounts/azure-blob-immutable-not-enabled.yaml @@ -11,7 +11,7 @@ info: Apply an appropriate time-based immutability policy or a legal hold policy to your Azure Storage blob containers to protect sensitive and business-critical data from being modified or deleted. reference: - https://docs.microsoft.com/en-us/azure/storage/blobs/immutable-storage - tags: cloud,devops,azure,microsoft,azure-blob-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-blob-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-blob-lifecycle-not-enabled.yaml b/cloud/azure/storageaccounts/azure-blob-lifecycle-not-enabled.yaml index 56059faebc7..8a00b98c27d 100644 --- a/cloud/azure/storageaccounts/azure-blob-lifecycle-not-enabled.yaml +++ b/cloud/azure/storageaccounts/azure-blob-lifecycle-not-enabled.yaml @@ -11,7 +11,7 @@ info: Configure a lifecycle management policy for your Azure Blob Storage accounts to enable automatic transitioning or expiration of data as appropriate. reference: - https://docs.microsoft.com/en-us/azure/storage/blobs/storage-lifecycle-management-concepts - tags: cloud,devops,azure,microsoft,blob-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,blob-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-blob-service-logging-disabled.yaml b/cloud/azure/storageaccounts/azure-blob-service-logging-disabled.yaml index 30997d9475f..5342e7a2d8d 100644 --- a/cloud/azure/storageaccounts/azure-blob-service-logging-disabled.yaml +++ b/cloud/azure/storageaccounts/azure-blob-service-logging-disabled.yaml @@ -11,7 +11,7 @@ info: Enable logging for the Azure Storage Blob service by setting the 'read', 'write', and 'delete' attributes to true in the storage account settings. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-analytics-logging - tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-blob-soft-delete-disabled.yaml b/cloud/azure/storageaccounts/azure-blob-soft-delete-disabled.yaml index 009d855262c..2fbe7f6a209 100644 --- a/cloud/azure/storageaccounts/azure-blob-soft-delete-disabled.yaml +++ b/cloud/azure/storageaccounts/azure-blob-soft-delete-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the Soft Delete feature for all blob storage accounts via the Azure Portal or using Azure CLI commands to ensure data is recoverable even after deletion or overwriting. reference: - https://docs.microsoft.com/en-us/azure/storage/blobs/soft-delete-overview - tags: cloud,devops,azure,microsoft,blob-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,blob-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-blob-public-access.yaml b/cloud/azure/storageaccounts/azure-storage-blob-public-access.yaml index f81a845f37b..d23c70fc9c3 100644 --- a/cloud/azure/storageaccounts/azure-storage-blob-public-access.yaml +++ b/cloud/azure/storageaccounts/azure-storage-blob-public-access.yaml @@ -11,7 +11,7 @@ info: Disable public access to all storage accounts containing blob containers to prevent unauthorized data access. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-disallow-access - tags: cloud,devops,azure,microsoft,storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-byok-not-used.yaml b/cloud/azure/storageaccounts/azure-storage-byok-not-used.yaml index 2438ad74e72..90f194e343f 100644 --- a/cloud/azure/storageaccounts/azure-storage-byok-not-used.yaml +++ b/cloud/azure/storageaccounts/azure-storage-byok-not-used.yaml @@ -11,7 +11,7 @@ info: Configure your Azure Storage accounts to use customer-managed keys (BYOK) for data encryption to ensure compliance and enhanced security. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-encryption-keys-manage - tags: cloud,devops,azure,microsoft,storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-cmk-not-used.yaml b/cloud/azure/storageaccounts/azure-storage-cmk-not-used.yaml index 9785864ce9d..c90fbe69b85 100644 --- a/cloud/azure/storageaccounts/azure-storage-cmk-not-used.yaml +++ b/cloud/azure/storageaccounts/azure-storage-cmk-not-used.yaml @@ -11,7 +11,7 @@ info: Configure your Azure Storage accounts to use Customer Managed Keys for data encryption to enhance security and control. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-encryption-keys-manage?tabs=portal - tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-cross-tenant-replication-disabled.yaml b/cloud/azure/storageaccounts/azure-storage-cross-tenant-replication-disabled.yaml index 64b1de62084..26b5d778f63 100644 --- a/cloud/azure/storageaccounts/azure-storage-cross-tenant-replication-disabled.yaml +++ b/cloud/azure/storageaccounts/azure-storage-cross-tenant-replication-disabled.yaml @@ -11,7 +11,7 @@ info: Disable the Cross-Tenant Replication feature for Azure Storage accounts to ensure data is not replicated across different Microsoft Entra tenants without authorization. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-redundancy - tags: cloud,devops,azure,microsoft,storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-encryption-missing.yaml b/cloud/azure/storageaccounts/azure-storage-encryption-missing.yaml index 974d8e0aa3b..1b720ccf7a7 100644 --- a/cloud/azure/storageaccounts/azure-storage-encryption-missing.yaml +++ b/cloud/azure/storageaccounts/azure-storage-encryption-missing.yaml @@ -11,7 +11,7 @@ info: Enable Infrastructure Encryption on your Azure Storage accounts to ensure data is encrypted at both software and hardware levels, enhancing the security posture. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-service-encryption - tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-min-tls-version.yaml b/cloud/azure/storageaccounts/azure-storage-min-tls-version.yaml index abedb5c414e..68b0a986b5e 100644 --- a/cloud/azure/storageaccounts/azure-storage-min-tls-version.yaml +++ b/cloud/azure/storageaccounts/azure-storage-min-tls-version.yaml @@ -11,7 +11,7 @@ info: Configure all Azure Storage accounts to use TLS version 1.2 as the minimum required version for connections to ensure compliance with industry standards and enhanced security. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-security-guide - tags: cloud,devops,azure,microsoft,storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-network-unrestricted.yaml b/cloud/azure/storageaccounts/azure-storage-network-unrestricted.yaml index 46c6f7a5ceb..8aaeeba7ca3 100644 --- a/cloud/azure/storageaccounts/azure-storage-network-unrestricted.yaml +++ b/cloud/azure/storageaccounts/azure-storage-network-unrestricted.yaml @@ -11,7 +11,7 @@ info: Configure the network access rule for Azure Storage accounts to "Deny" to restrict access to selected networks only, enhancing security by preventing unwanted or unauthorized access. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security - tags: cloud,devops,azure,microsoft,storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-overly-permissive-sap.yaml b/cloud/azure/storageaccounts/azure-storage-overly-permissive-sap.yaml index e38612976a2..38e33a132c8 100644 --- a/cloud/azure/storageaccounts/azure-storage-overly-permissive-sap.yaml +++ b/cloud/azure/storageaccounts/azure-storage-overly-permissive-sap.yaml @@ -11,7 +11,7 @@ info: Review and restrict the permissions in your stored access policies to ensure they align with the principle of least privilege. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-sas-overview - tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-private-endpoint-unconfigured.yaml b/cloud/azure/storageaccounts/azure-storage-private-endpoint-unconfigured.yaml index 48e6d74e282..db178fcc02d 100644 --- a/cloud/azure/storageaccounts/azure-storage-private-endpoint-unconfigured.yaml +++ b/cloud/azure/storageaccounts/azure-storage-private-endpoint-unconfigured.yaml @@ -11,7 +11,7 @@ info: Configure private endpoints for your Azure Storage accounts to ensure secure access via Private Link. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-private-endpoints - tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-public-access.yaml b/cloud/azure/storageaccounts/azure-storage-public-access.yaml index a05902bfe04..27edfa69540 100644 --- a/cloud/azure/storageaccounts/azure-storage-public-access.yaml +++ b/cloud/azure/storageaccounts/azure-storage-public-access.yaml @@ -11,7 +11,7 @@ info: Ensure that the Azure storage containers storing activity log files are configured to deny public access. Review and modify the public access settings of your storage accounts to protect sensitive data. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-account-overview - tags: cloud,devops,azure,microsoft,storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-queue-logging-disabled.yaml b/cloud/azure/storageaccounts/azure-storage-queue-logging-disabled.yaml index 844085811ea..8eb87fa46c6 100644 --- a/cloud/azure/storageaccounts/azure-storage-queue-logging-disabled.yaml +++ b/cloud/azure/storageaccounts/azure-storage-queue-logging-disabled.yaml @@ -11,7 +11,7 @@ info: Enable logging for read, write, and delete requests in Azure Storage Queue service to ensure compliance and improve security monitoring. reference: - https://docs.microsoft.com/en-us/azure/storage/queues/storage-queues-introduction - tags: cloud,devops,azure,microsoft,storage-queue,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage-queue,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-secure-transfer.yaml b/cloud/azure/storageaccounts/azure-storage-secure-transfer.yaml index d3988940620..e8e61cd1980 100644 --- a/cloud/azure/storageaccounts/azure-storage-secure-transfer.yaml +++ b/cloud/azure/storageaccounts/azure-storage-secure-transfer.yaml @@ -11,7 +11,7 @@ info: Enable "Secure transfer required" in your Azure Storage account settings to enforce HTTPS traffic only, ensuring all data in transit is encrypted. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-require-secure-transfer - tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-static-website-review.yaml b/cloud/azure/storageaccounts/azure-storage-static-website-review.yaml index 2a9e4fe7b6f..4fcbd4e941d 100644 --- a/cloud/azure/storageaccounts/azure-storage-static-website-review.yaml +++ b/cloud/azure/storageaccounts/azure-storage-static-website-review.yaml @@ -11,7 +11,7 @@ info: Regularly review your Azure Storage accounts that host static websites and ensure they comply with security and data protection standards. reference: - https://docs.microsoft.com/en-us/azure/storage/blobs/storage-blob-static-website - tags: cloud,devops,azure,microsoft,storage-account,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage-account,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-table-logging-disabled.yaml b/cloud/azure/storageaccounts/azure-storage-table-logging-disabled.yaml index c29394de5df..5fefe14777c 100644 --- a/cloud/azure/storageaccounts/azure-storage-table-logging-disabled.yaml +++ b/cloud/azure/storageaccounts/azure-storage-table-logging-disabled.yaml @@ -11,7 +11,7 @@ info: Enable logging for read, write, and delete requests in the Azure Storage Table service through the Azure portal or using the Azure CLI. reference: - https://docs.microsoft.com/en-us/azure/storage/tables/table-storage-overview - tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/storageaccounts/azure-storage-trusted-access-disabled.yaml b/cloud/azure/storageaccounts/azure-storage-trusted-access-disabled.yaml index 9ca82deab60..21bdf2e912d 100644 --- a/cloud/azure/storageaccounts/azure-storage-trusted-access-disabled.yaml +++ b/cloud/azure/storageaccounts/azure-storage-trusted-access-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the "Allow trusted Microsoft services to access this storage account" exception in the Azure portal under Storage account settings. reference: - https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security - tags: cloud,devops,azure,microsoft,storage,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,storage,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/subscriptions/azure-budget-alerts-missing.yaml b/cloud/azure/subscriptions/azure-budget-alerts-missing.yaml index c2176441a05..79db74fc08e 100644 --- a/cloud/azure/subscriptions/azure-budget-alerts-missing.yaml +++ b/cloud/azure/subscriptions/azure-budget-alerts-missing.yaml @@ -11,7 +11,7 @@ info: Create and configure budget alerts in your Azure account to monitor and manage cloud expenditures effectively. reference: - https://docs.microsoft.com/en-us/azure/cost-management-billing/costs/tutorial-acm-create-budgets - tags: cloud,devops,azure,microsoft,budget,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,budget,azure-cloud-config self-contained: true code: diff --git a/cloud/azure/subscriptions/azure-policy-not-allowed-types-unassigned.yaml b/cloud/azure/subscriptions/azure-policy-not-allowed-types-unassigned.yaml index 6b134229825..e345f771ab1 100644 --- a/cloud/azure/subscriptions/azure-policy-not-allowed-types-unassigned.yaml +++ b/cloud/azure/subscriptions/azure-policy-not-allowed-types-unassigned.yaml @@ -11,7 +11,7 @@ info: Assign the "Not Allowed Resource Types" policy to your Azure subscriptions to ensure compliance with corporate standards and prevent unauthorized resource deployment. reference: - https://docs.microsoft.com/en-us/azure/governance/policy/concepts/definition-structure - tags: cloud,devops,azure,microsoft,azure-policy,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-policy,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/synapse/azure-synapse-sqlpool-tde-disabled.yaml b/cloud/azure/synapse/azure-synapse-sqlpool-tde-disabled.yaml index c341e93df69..48dc100574f 100644 --- a/cloud/azure/synapse/azure-synapse-sqlpool-tde-disabled.yaml +++ b/cloud/azure/synapse/azure-synapse-sqlpool-tde-disabled.yaml @@ -11,7 +11,7 @@ info: Enable Transparent Data Encryption (TDE) for all Azure Synapse Analytics dedicated SQL pools to ensure your data at rest is encrypted and secure. reference: - https://docs.microsoft.com/en-us/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is - tags: cloud,devops,azure,microsoft,synapse,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,synapse,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/tags/azure-vm-tags-schema-noncompliant.yaml b/cloud/azure/tags/azure-vm-tags-schema-noncompliant.yaml index 2c23c2d45e1..7690fa722d6 100644 --- a/cloud/azure/tags/azure-vm-tags-schema-noncompliant.yaml +++ b/cloud/azure/tags/azure-vm-tags-schema-noncompliant.yaml @@ -8,7 +8,7 @@ info: impact: | Not using the recommended tagging schema can lead to difficulties in managing and organizing cloud resources effectively, potentially leading to operational inefficiencies and increased costs. remediation: | - Update the tagging schema of your Azure virtual machines to include the recommended tags: Name, Role, Environment, and Owner to ensure effective resource management and billing.,vuln + Update the tagging schema of your Azure virtual machines to include the recommended tags: Name, Role, Environment, and Owner to ensure effective resource management and billing. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/tagging tags: cloud,devops,azure,microsoft,azure-vm,azure-cloud-config diff --git a/cloud/azure/virtualmachines/azure-app-tier-vm-disk-unencrypted.yaml b/cloud/azure/virtualmachines/azure-app-tier-vm-disk-unencrypted.yaml index 096c202e46f..376efcc4682 100644 --- a/cloud/azure/virtualmachines/azure-app-tier-vm-disk-unencrypted.yaml +++ b/cloud/azure/virtualmachines/azure-app-tier-vm-disk-unencrypted.yaml @@ -11,7 +11,7 @@ info: Enable disk encryption on all Azure virtual machine disk volumes within the application tier by using Azure Disk Encryption. reference: - https://docs.microsoft.com/en-us/azure/security/fundamentals/encryption-atrest - tags: cloud,devops,azure,microsoft,vm-disk,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vm-disk,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-disk-encryption-unattached-volumes.yaml b/cloud/azure/virtualmachines/azure-disk-encryption-unattached-volumes.yaml index 899eaecaa74..e1bc9996370 100644 --- a/cloud/azure/virtualmachines/azure-disk-encryption-unattached-volumes.yaml +++ b/cloud/azure/virtualmachines/azure-disk-encryption-unattached-volumes.yaml @@ -11,7 +11,7 @@ info: Encrypt all unattached disk volumes using Azure Disk Encryption integrated with Azure Key Vault to ensure data is protected even when disks are detached. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/disks-enable-host-based-encryption-cli - tags: cloud,devops,azure,microsoft,disk-encryption,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,disk-encryption,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-lb-unused.yaml b/cloud/azure/virtualmachines/azure-lb-unused.yaml index a1a400734ba..b6a3fad4c16 100644 --- a/cloud/azure/virtualmachines/azure-lb-unused.yaml +++ b/cloud/azure/virtualmachines/azure-lb-unused.yaml @@ -11,7 +11,7 @@ info: Review and remove unused load balancers that do not have any backend pool instances. reference: - https://docs.microsoft.com/en-us/azure/load-balancer/load-balancer-overview - tags: cloud,devops,azure,microsoft,load-balancer,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,load-balancer,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-accelerated-networking-disabled.yaml b/cloud/azure/virtualmachines/azure-vm-accelerated-networking-disabled.yaml index 30c46eaf28d..cb2956b34d9 100644 --- a/cloud/azure/virtualmachines/azure-vm-accelerated-networking-disabled.yaml +++ b/cloud/azure/virtualmachines/azure-vm-accelerated-networking-disabled.yaml @@ -11,7 +11,7 @@ info: Enable Accelerated Networking on all compatible Azure VMs to ensure optimal network performance. This can be done through the Azure portal or using Azure CLI commands. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-accelerated-networking-cli - tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-accelerated-networking-not-enabled.yaml b/cloud/azure/virtualmachines/azure-vm-accelerated-networking-not-enabled.yaml index 9b7c97d8461..b6752b87ab9 100644 --- a/cloud/azure/virtualmachines/azure-vm-accelerated-networking-not-enabled.yaml +++ b/cloud/azure/virtualmachines/azure-vm-accelerated-networking-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable Accelerated Networking on all Azure VMs that support this feature to ensure optimal networking performance. reference: - https://docs.microsoft.com/en-us/azure/virtual-network/create-vm-accelerated-networking-cli - tags: cloud,devops,azure,microsoft,vm,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vm,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-boot-diagnostics-not-enabled.yaml b/cloud/azure/virtualmachines/azure-vm-boot-diagnostics-not-enabled.yaml index e9c2222bcb5..d56ee3047c8 100644 --- a/cloud/azure/virtualmachines/azure-vm-boot-diagnostics-not-enabled.yaml +++ b/cloud/azure/virtualmachines/azure-vm-boot-diagnostics-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable Boot Diagnostics for all your Azure VMs to facilitate effective troubleshooting and ensure quick recovery from startup-related issues. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/troubleshooting/boot-diagnostics - tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-boot-disk-unencrypted.yaml b/cloud/azure/virtualmachines/azure-vm-boot-disk-unencrypted.yaml index ace82c55649..48719539d63 100644 --- a/cloud/azure/virtualmachines/azure-vm-boot-disk-unencrypted.yaml +++ b/cloud/azure/virtualmachines/azure-vm-boot-disk-unencrypted.yaml @@ -11,7 +11,7 @@ info: Enable Azure Disk Encryption for VM boot volumes using Azure Key Vault to manage encryption keys and ensure data security. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/linux/encrypt-disks - tags: cloud,devops,azure,microsoft,vm-disk-encryption,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vm-disk-encryption,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-byok-disk-volumes-not-enabled.yaml b/cloud/azure/virtualmachines/azure-vm-byok-disk-volumes-not-enabled.yaml index dcd31d5e289..c0564319d3f 100644 --- a/cloud/azure/virtualmachines/azure-vm-byok-disk-volumes-not-enabled.yaml +++ b/cloud/azure/virtualmachines/azure-vm-byok-disk-volumes-not-enabled.yaml @@ -11,7 +11,7 @@ info: Configure your VM disk volumes to use customer-managed keys (BYOK) to ensure better security and control over your data encryption and decryption processes. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/disks-enable-customer-managed-keys - tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-endpoint-protection-missing.yaml b/cloud/azure/virtualmachines/azure-vm-endpoint-protection-missing.yaml index 4c63c608630..cbbf6ee3917 100644 --- a/cloud/azure/virtualmachines/azure-vm-endpoint-protection-missing.yaml +++ b/cloud/azure/virtualmachines/azure-vm-endpoint-protection-missing.yaml @@ -11,7 +11,7 @@ info: Install an approved endpoint protection solution on your Azure VMs to mitigate the risk of malware and maintain compliance with organizational security policies. reference: - https://docs.microsoft.com/en-us/azure/security-center/security-center-intro - tags: cloud,devops,azure,microsoft,endpoint-protection,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,endpoint-protection,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-entra-id-unenabled.yaml b/cloud/azure/virtualmachines/azure-vm-entra-id-unenabled.yaml index 7ad61bfdb6a..cd59725268d 100644 --- a/cloud/azure/virtualmachines/azure-vm-entra-id-unenabled.yaml +++ b/cloud/azure/virtualmachines/azure-vm-entra-id-unenabled.yaml @@ -11,7 +11,7 @@ info: Ensure the Microsoft Entra ID authentication extensions, "AADLoginForWindows" or "AADLoginForLinux", are installed and enabled on your Azure VMs for secure access management. reference: - https://docs.microsoft.com/en-us/azure/active-directory/develop/ - tags: cloud,devops,azure,microsoft,entra-id,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,entra-id,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-guest-diagnostics-unenabled.yaml b/cloud/azure/virtualmachines/azure-vm-guest-diagnostics-unenabled.yaml index d2e2ef3774e..8840241d6b0 100644 --- a/cloud/azure/virtualmachines/azure-vm-guest-diagnostics-unenabled.yaml +++ b/cloud/azure/virtualmachines/azure-vm-guest-diagnostics-unenabled.yaml @@ -11,7 +11,7 @@ info: Enable Guest-Level Diagnostics on your Azure virtual machines to ensure comprehensive data collection and enhance monitoring capabilities. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/windows/diagnostics - tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machines,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-jit-access-not-enabled.yaml b/cloud/azure/virtualmachines/azure-vm-jit-access-not-enabled.yaml index 6b9d8e8fe7d..44deaa1da72 100644 --- a/cloud/azure/virtualmachines/azure-vm-jit-access-not-enabled.yaml +++ b/cloud/azure/virtualmachines/azure-vm-jit-access-not-enabled.yaml @@ -11,7 +11,7 @@ info: Enable Just-in-Time access for your Azure VMs to control inbound traffic and improve security. reference: - https://docs.microsoft.com/en-us/azure/security-center/security-center-just-in-time - tags: cloud,devops,azure,microsoft,security-center,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,security-center,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-managed-identity-unassigned.yaml b/cloud/azure/virtualmachines/azure-vm-managed-identity-unassigned.yaml index 31d91f4ced9..a2657e8c8f1 100644 --- a/cloud/azure/virtualmachines/azure-vm-managed-identity-unassigned.yaml +++ b/cloud/azure/virtualmachines/azure-vm-managed-identity-unassigned.yaml @@ -11,7 +11,7 @@ info: Enable system-assigned managed identities on all Azure VMs to ensure secure access to other Azure services. reference: - https://docs.microsoft.com/en-us/azure/active-directory/managed-identities-azure-resources/overview - tags: cloud,devops,azure,microsoft,vm,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vm,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-performance-diagnostics-unenabled.yaml b/cloud/azure/virtualmachines/azure-vm-performance-diagnostics-unenabled.yaml index 2fb515b0776..ddf8250d66c 100644 --- a/cloud/azure/virtualmachines/azure-vm-performance-diagnostics-unenabled.yaml +++ b/cloud/azure/virtualmachines/azure-vm-performance-diagnostics-unenabled.yaml @@ -11,7 +11,7 @@ info: Enable the Performance Diagnostics feature by installing the AzurePerformanceDiagnostics extension through Azure Portal or Azure CLI commands to mitigate performance issues and ensure optimal VM operation. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/performance-diagnostics - tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-ssh-auth-type.yaml b/cloud/azure/virtualmachines/azure-vm-ssh-auth-type.yaml index 0136e8fa7cb..60fe32596be 100644 --- a/cloud/azure/virtualmachines/azure-vm-ssh-auth-type.yaml +++ b/cloud/azure/virtualmachines/azure-vm-ssh-auth-type.yaml @@ -11,7 +11,7 @@ info: Configure all Azure virtual machines to use SSH keys for authentication. Disable password authentication to enhance the security of your virtual machines. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/linux/ssh-from-windows - tags: cloud,devops,azure,microsoft,vm,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vm,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-standard-ssd-required.yaml b/cloud/azure/virtualmachines/azure-vm-standard-ssd-required.yaml index 3fda86b598e..8edff049858 100644 --- a/cloud/azure/virtualmachines/azure-vm-standard-ssd-required.yaml +++ b/cloud/azure/virtualmachines/azure-vm-standard-ssd-required.yaml @@ -11,7 +11,7 @@ info: Convert any Premium SSD volumes to Standard SSD unless the workload requires high performance disk specifications. This can be achieved through Azure's portal or via CLI commands. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/disks-types - tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-trusted-launch-disabled.yaml b/cloud/azure/virtualmachines/azure-vm-trusted-launch-disabled.yaml index 001bc00aca7..5e449aa8c60 100644 --- a/cloud/azure/virtualmachines/azure-vm-trusted-launch-disabled.yaml +++ b/cloud/azure/virtualmachines/azure-vm-trusted-launch-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the Trusted Launch feature on your Azure VMs to utilize security enhancements such as Secure Boot and vTPM to protect against sophisticated attacks. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/trusted-launch - tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-unapproved-image.yaml b/cloud/azure/virtualmachines/azure-vm-unapproved-image.yaml index 37bb3fe07c8..9f9d62e8039 100644 --- a/cloud/azure/virtualmachines/azure-vm-unapproved-image.yaml +++ b/cloud/azure/virtualmachines/azure-vm-unapproved-image.yaml @@ -11,7 +11,7 @@ info: Ensure all Azure VM instances are launched from approved machine images. Update any instances that are not using the approved images. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/windows/overview - tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-unmanaged-disk-volumes.yaml b/cloud/azure/virtualmachines/azure-vm-unmanaged-disk-volumes.yaml index b335dc13086..306417202b6 100644 --- a/cloud/azure/virtualmachines/azure-vm-unmanaged-disk-volumes.yaml +++ b/cloud/azure/virtualmachines/azure-vm-unmanaged-disk-volumes.yaml @@ -11,7 +11,7 @@ info: Configure your Azure VMs to use managed disks for better reliability and simplified management of disk resources. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/managed-disks-overview - tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,virtual-machine,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vm-web-tier-disk-unencrypted.yaml b/cloud/azure/virtualmachines/azure-vm-web-tier-disk-unencrypted.yaml index 9fe639edf85..4a11a7cfb8e 100644 --- a/cloud/azure/virtualmachines/azure-vm-web-tier-disk-unencrypted.yaml +++ b/cloud/azure/virtualmachines/azure-vm-web-tier-disk-unencrypted.yaml @@ -11,7 +11,7 @@ info: Enable encryption for all disk volumes attached to VMs within the Azure web tier to enhance data security and comply with regulatory requirements. reference: - https://docs.microsoft.com/en-us/azure/virtual-machines/linux/encrypt-disks - tags: cloud,devops,azure,microsoft,azure-vm,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,azure-vm,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vmss-auto-os-upgrade-missing.yaml b/cloud/azure/virtualmachines/azure-vmss-auto-os-upgrade-missing.yaml index 03666768762..071b9ddd503 100644 --- a/cloud/azure/virtualmachines/azure-vmss-auto-os-upgrade-missing.yaml +++ b/cloud/azure/virtualmachines/azure-vmss-auto-os-upgrade-missing.yaml @@ -11,7 +11,7 @@ info: Enable automatic OS upgrades in Azure VMSS settings to ensure all instances are updated automatically with the latest OS image version, thereby improving security and reducing manual maintenance overhead. reference: - https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-automatic-upgrade - tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vmss-auto-repairs-disabled.yaml b/cloud/azure/virtualmachines/azure-vmss-auto-repairs-disabled.yaml index 389244b7a6d..e6b82af503e 100644 --- a/cloud/azure/virtualmachines/azure-vmss-auto-repairs-disabled.yaml +++ b/cloud/azure/virtualmachines/azure-vmss-auto-repairs-disabled.yaml @@ -11,7 +11,7 @@ info: Enable the Automatic Instance Repairs feature for Azure VMSS to ensure high availability and resilience of your applications. reference: - https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-automatic-instance-repairs - tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vmss-empty-unattached.yaml b/cloud/azure/virtualmachines/azure-vmss-empty-unattached.yaml index 433cbe0ad6d..e5a584ac1be 100644 --- a/cloud/azure/virtualmachines/azure-vmss-empty-unattached.yaml +++ b/cloud/azure/virtualmachines/azure-vmss-empty-unattached.yaml @@ -11,7 +11,7 @@ info: Regularly check and remove any VM scale sets that do not contain any VM instances and are not associated with any load balancers. reference: - https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/ - tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vmss-health-monitoring-missing.yaml b/cloud/azure/virtualmachines/azure-vmss-health-monitoring-missing.yaml index 63795e8480f..95ba9afeb5e 100644 --- a/cloud/azure/virtualmachines/azure-vmss-health-monitoring-missing.yaml +++ b/cloud/azure/virtualmachines/azure-vmss-health-monitoring-missing.yaml @@ -11,7 +11,7 @@ info: Enable the Application Health extension in your Azure VMSS instances to ensure continuous health monitoring and eligibility for necessary upgrades and repairs. reference: - https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-health-extension - tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vmss-load-balancer-unassociated.yaml b/cloud/azure/virtualmachines/azure-vmss-load-balancer-unassociated.yaml index e6b52aa4d12..963df547e7b 100644 --- a/cloud/azure/virtualmachines/azure-vmss-load-balancer-unassociated.yaml +++ b/cloud/azure/virtualmachines/azure-vmss-load-balancer-unassociated.yaml @@ -11,7 +11,7 @@ info: Ensure each Azure virtual machine scale set is integrated with a load balancer to distribute incoming traffic effectively among instances. reference: - https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-load-balancer - tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vmss-public-ip-disabled.yaml b/cloud/azure/virtualmachines/azure-vmss-public-ip-disabled.yaml index f76f59be240..d82e7fbe586 100644 --- a/cloud/azure/virtualmachines/azure-vmss-public-ip-disabled.yaml +++ b/cloud/azure/virtualmachines/azure-vmss-public-ip-disabled.yaml @@ -11,7 +11,7 @@ info: Configure your VMSS to disable public IP address assignments to its instances. Ensure that all networking is handled through internal networking resources. reference: - https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-networking - tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vmss-termination-notif-disabled.yaml b/cloud/azure/virtualmachines/azure-vmss-termination-notif-disabled.yaml index 1f918e2abe6..2f81a2704cd 100644 --- a/cloud/azure/virtualmachines/azure-vmss-termination-notif-disabled.yaml +++ b/cloud/azure/virtualmachines/azure-vmss-termination-notif-disabled.yaml @@ -11,7 +11,7 @@ info: Configure the termination notification feature for all your Azure VM scale sets to receive proper alerts and set a reasonable delay for the termination events. reference: - https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-terminate-notification - tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config flow: | code(1); diff --git a/cloud/azure/virtualmachines/azure-vmss-zone-redundancy-missing.yaml b/cloud/azure/virtualmachines/azure-vmss-zone-redundancy-missing.yaml index 01317e0c6a1..3f9073cda2a 100644 --- a/cloud/azure/virtualmachines/azure-vmss-zone-redundancy-missing.yaml +++ b/cloud/azure/virtualmachines/azure-vmss-zone-redundancy-missing.yaml @@ -11,7 +11,7 @@ info: Configure your VMSS to use zone-redundant availability configurations to ensure high availability and fault tolerance across multiple data centers. reference: - https://docs.microsoft.com/en-us/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-design-overview - tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config,vuln + tags: cloud,devops,azure,microsoft,vmss,azure-cloud-config flow: | code(1); diff --git a/cloud/gcp/api/gcloud-api-key-restrictions-missing.yaml b/cloud/gcp/api/gcloud-api-key-restrictions-missing.yaml index f2f623911ba..aaf6c55bc05 100644 --- a/cloud/gcp/api/gcloud-api-key-restrictions-missing.yaml +++ b/cloud/gcp/api/gcloud-api-key-restrictions-missing.yaml @@ -12,7 +12,7 @@ info: Apply API restrictions to each Google Cloud API key to limit their usage to specific APIs. This can be managed through the Google Cloud Console or using the gcloud command-line tool. reference: - https://cloud.google.com/api-keys/docs/restricting-api-keys - tags: cloud,devops,gcp,gcloud,api-keys,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,api-keys,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/api/gcloud-api-key-unrestricted.yaml b/cloud/gcp/api/gcloud-api-key-unrestricted.yaml index 47d387948c0..0263233ed2d 100644 --- a/cloud/gcp/api/gcloud-api-key-unrestricted.yaml +++ b/cloud/gcp/api/gcloud-api-key-unrestricted.yaml @@ -12,7 +12,7 @@ info: Apply restrictions to all production API keys to specify the allowed websites, IP addresses, or mobile applications that can use each key, to mitigate potential abuse. reference: - https://cloud.google.com/docs/authentication/api-keys#restricting_api_keys - tags: cloud,devops,gcp,gcloud,api-keys,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,api-keys,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/api/gcloud-api-keys-inactive-services.yaml b/cloud/gcp/api/gcloud-api-keys-inactive-services.yaml index 9918f09d461..f98433cbcff 100644 --- a/cloud/gcp/api/gcloud-api-keys-inactive-services.yaml +++ b/cloud/gcp/api/gcloud-api-keys-inactive-services.yaml @@ -12,7 +12,7 @@ info: Review and ensure that API keys are only configured for active services. Delete or disable API keys associated with inactive or unnecessary services to minimize security risks. reference: - https://cloud.google.com/docs/authentication/api-keys - tags: cloud,devops,gcp,gcloud,api-keys,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,api-keys,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/api/gcloud-critical-service-apis-disabled.yaml b/cloud/gcp/api/gcloud-critical-service-apis-disabled.yaml index 408f640cb7b..c8a535e9980 100644 --- a/cloud/gcp/api/gcloud-critical-service-apis-disabled.yaml +++ b/cloud/gcp/api/gcloud-critical-service-apis-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the necessary service APIs via the GCP Console or the gcloud command-line tool for each project where they are found to be disabled. reference: - https://cloud.google.com/service-usage/docs/enable-disable - tags: cloud,devops,gcp,gcloud,api-management,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,api-management,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/api/gcloud-security-center-api-disabled.yaml b/cloud/gcp/api/gcloud-security-center-api-disabled.yaml index dddb78e73fd..a04952a9737 100644 --- a/cloud/gcp/api/gcloud-security-center-api-disabled.yaml +++ b/cloud/gcp/api/gcloud-security-center-api-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the Security Command Center API for each Google Cloud project to maintain proper security monitoring and threat detection capabilities. This can be done through the Google Cloud Console or using the `gcloud services enable securitycenter.googleapis.com` command. reference: - https://cloud.google.com/security-command-center/docs/reference/rest - tags: cloud,devops,gcp,gcloud,security-center,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,security-center,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/api/gcloud-vm-os-config-disabled.yaml b/cloud/gcp/api/gcloud-vm-os-config-disabled.yaml index b9c7cf02c8f..3005c95cfc5 100644 --- a/cloud/gcp/api/gcloud-vm-os-config-disabled.yaml +++ b/cloud/gcp/api/gcloud-vm-os-config-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the Google Cloud Asset Inventory by activating the Cloud Asset API in each GCP project through the Google Cloud Console or using the `gcloud services enable cloudasset.googleapis.com --project ` command. reference: - https://cloud.google.com/asset-inventory/docs - tags: cloud,devops,gcp,gcloud,cloud-asset,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,cloud-asset,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/artifactregistry/gcloud-artifact-registry-public.yaml b/cloud/gcp/artifactregistry/gcloud-artifact-registry-public.yaml index bd13766ce21..0ca7bf52931 100644 --- a/cloud/gcp/artifactregistry/gcloud-artifact-registry-public.yaml +++ b/cloud/gcp/artifactregistry/gcloud-artifact-registry-public.yaml @@ -12,7 +12,7 @@ info: Update the IAM policies for each Artifact Registry repository to remove "allUsers" and "allAuthenticatedUsers". This action will ensure that repositories are not exposed to any user on the internet or authenticated users not explicitly granted permission. reference: - https://cloud.google.com/artifact-registry/docs/managing/access-control - tags: cloud,devops,gcp,gcloud,artifact-registry,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,artifact-registry,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/artifactregistry/gcloud-vuln-scan-missing.yaml b/cloud/gcp/artifactregistry/gcloud-vuln-scan-missing.yaml index 2f018f1b3f8..9516551e5d8 100644 --- a/cloud/gcp/artifactregistry/gcloud-vuln-scan-missing.yaml +++ b/cloud/gcp/artifactregistry/gcloud-vuln-scan-missing.yaml @@ -12,7 +12,7 @@ info: Enable the Container Scanning API for each Artifact Registry by visiting the API & services page in the Google Cloud Console and enabling `containerscanning.googleapis.com`. reference: - https://cloud.google.com/artifact-registry/docs/vulnerability-scanning - tags: cloud,devops,gcp,gcloud,artifact-registry,container-scanning,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,artifact-registry,container-scanning,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/bigquery/gcloud-bigquery-cmek-not-enabled.yaml b/cloud/gcp/bigquery/gcloud-bigquery-cmek-not-enabled.yaml index a661da88465..fc0d1171740 100644 --- a/cloud/gcp/bigquery/gcloud-bigquery-cmek-not-enabled.yaml +++ b/cloud/gcp/bigquery/gcloud-bigquery-cmek-not-enabled.yaml @@ -12,7 +12,7 @@ info: Update the encryption configuration of your BigQuery datasets to use Customer-Managed Encryption Keys. This can be done by setting the 'defaultEncryptionConfiguration' property of each dataset to use a 'kmsKeyName' that you manage. reference: - https://cloud.google.com/bigquery/docs/customer-managed-encryption - tags: cloud,devops,gcp,gcloud,bigquery,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,bigquery,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/bigquery/gcloud-bigquery-cmk-not-enabled.yaml b/cloud/gcp/bigquery/gcloud-bigquery-cmk-not-enabled.yaml index 3a44d94fecc..68b43a3921c 100644 --- a/cloud/gcp/bigquery/gcloud-bigquery-cmk-not-enabled.yaml +++ b/cloud/gcp/bigquery/gcloud-bigquery-cmk-not-enabled.yaml @@ -12,7 +12,7 @@ info: Configure BigQuery dataset tables to use Customer-Managed Keys (CMKs) for encryption. This can be done in the dataset settings where you specify the encryption key managed in Google Cloud KMS. reference: - https://cloud.google.com/bigquery/docs/encryption-customer-managed-keys - tags: cloud,devops,gcp,gcloud,bigquery,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,bigquery,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/bigquery/gcloud-bigquery-public-datasets.yaml b/cloud/gcp/bigquery/gcloud-bigquery-public-datasets.yaml index 58b56e9e975..d3445700359 100644 --- a/cloud/gcp/bigquery/gcloud-bigquery-public-datasets.yaml +++ b/cloud/gcp/bigquery/gcloud-bigquery-public-datasets.yaml @@ -12,7 +12,7 @@ info: Update the IAM policies for each BigQuery dataset to remove "allUsers" and "allAuthenticatedUsers". This action will ensure that datasets are not exposed to any user on the internet or authenticated users not explicitly granted permission. reference: - https://cloud.google.com/bigquery/docs/managing-dataset-access - tags: cloud,devops,gcp,gcloud,bigquery,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,bigquery,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/cdn/gcloud-backend-bucket-missing-storage.yaml b/cloud/gcp/cdn/gcloud-backend-bucket-missing-storage.yaml index 5d13e76f1b5..dd18beee733 100644 --- a/cloud/gcp/cdn/gcloud-backend-bucket-missing-storage.yaml +++ b/cloud/gcp/cdn/gcloud-backend-bucket-missing-storage.yaml @@ -12,7 +12,7 @@ info: Verify that each backend bucket is referencing an existing storage bucket. Update the Cloud CDN backend bucket configuration to point to valid and existing storage buckets. reference: - https://cloud.google.com/cdn/docs/backends - tags: cloud,devops,gcp,gcloud,cdn,cloud-cdn,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,cdn,cloud-cdn,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/cdn/gcloud-cdn-backend-bucket.yaml b/cloud/gcp/cdn/gcloud-cdn-backend-bucket.yaml index 74e338c4793..47cc58eef8c 100644 --- a/cloud/gcp/cdn/gcloud-cdn-backend-bucket.yaml +++ b/cloud/gcp/cdn/gcloud-cdn-backend-bucket.yaml @@ -12,7 +12,7 @@ info: Reconfigure the Cloud CDN origin to point to a backend bucket instead of a backend service by modifying the associated Google Cloud load balancer's URL map. reference: - https://cloud.google.com/cdn/docs/using-cdn - tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/cdn/gcloud-cdn-origin-auth-unconfigured.yaml b/cloud/gcp/cdn/gcloud-cdn-origin-auth-unconfigured.yaml index b8f1a0d280e..bc1527491ce 100644 --- a/cloud/gcp/cdn/gcloud-cdn-origin-auth-unconfigured.yaml +++ b/cloud/gcp/cdn/gcloud-cdn-origin-auth-unconfigured.yaml @@ -12,7 +12,7 @@ info: Configure your Cloud CDN origins to use signed cookies and URLs by adding signed request keys to your backend services. This will enforce authentication on CDN-cached content, preventing unauthorized access. reference: - https://cloud.google.com/cdn/docs/using-signed-urls - tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/cdn/gcloud-cdn-ssl-enforcement.yaml b/cloud/gcp/cdn/gcloud-cdn-ssl-enforcement.yaml index 4c151fd5b42..62325a0a77b 100644 --- a/cloud/gcp/cdn/gcloud-cdn-ssl-enforcement.yaml +++ b/cloud/gcp/cdn/gcloud-cdn-ssl-enforcement.yaml @@ -12,7 +12,7 @@ info: Configure SSL/TLS certificates for Cloud CDN backend bucket origins and ensure all traffic is served over HTTPS by adjusting the forwarding rules and url-maps. reference: - https://cloud.google.com/cdn/docs/using-https - tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/cdn/gcloud-cdn-tls-unenforced.yaml b/cloud/gcp/cdn/gcloud-cdn-tls-unenforced.yaml index 26c57a6ec7b..3e4dcf61f03 100644 --- a/cloud/gcp/cdn/gcloud-cdn-tls-unenforced.yaml +++ b/cloud/gcp/cdn/gcloud-cdn-tls-unenforced.yaml @@ -12,7 +12,7 @@ info: Configure SSL/TLS certificates for your Cloud CDN backend service origins to enforce HTTPS and ensure that all communications are securely encrypted. reference: - https://cloud.google.com/cdn/docs/using-https - tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/certificatemanager/gcloud-certificate-validity-exceeded.yaml b/cloud/gcp/certificatemanager/gcloud-certificate-validity-exceeded.yaml index 9161fff66dd..5b2dcb58352 100644 --- a/cloud/gcp/certificatemanager/gcloud-certificate-validity-exceeded.yaml +++ b/cloud/gcp/certificatemanager/gcloud-certificate-validity-exceeded.yaml @@ -12,7 +12,7 @@ info: Review and adjust the renewal configurations for SSL certificates to ensure their validity periods do not exceed 398 days. reference: - https://cloud.google.com/certificate-manager/docs - tags: cloud,devops,gcp,gcloud,certificate-manager,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,certificate-manager,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-disk-image-public-access.yaml b/cloud/gcp/compute/gcloud-disk-image-public-access.yaml index 81d7d6960cc..14d84c94318 100644 --- a/cloud/gcp/compute/gcloud-disk-image-public-access.yaml +++ b/cloud/gcp/compute/gcloud-disk-image-public-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/publicly-shared-disk-images.html - https://cloud.google.com/compute/docs/images/managing-access-custom-images - tags: cloud,devops,gcp,gcloud,compute,security,storage,disk-images,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,storage,disk-images,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-instance-group-autohealing-disabled.yaml b/cloud/gcp/compute/gcloud-instance-group-autohealing-disabled.yaml index 1108e918fef..1530b395425 100644 --- a/cloud/gcp/compute/gcloud-instance-group-autohealing-disabled.yaml +++ b/cloud/gcp/compute/gcloud-instance-group-autohealing-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/enable-instance-group-autohealing.html - https://cloud.google.com/compute/docs/instance-groups/autohealing-instances - tags: cloud,devops,gcp,gcloud,compute,reliability,instance-groups,autohealing,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,reliability,instance-groups,autohealing,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-mig-no-load-balancer.yaml b/cloud/gcp/compute/gcloud-mig-no-load-balancer.yaml index f63b38cff8f..1f8bb6b1da7 100644 --- a/cloud/gcp/compute/gcloud-mig-no-load-balancer.yaml +++ b/cloud/gcp/compute/gcloud-mig-no-load-balancer.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/mig-load-balancer-check.html - https://cloud.google.com/compute/docs/instance-groups/adding-an-instance-group-to-a-load-balancer - tags: cloud,devops,gcp,gcloud,compute,reliability,mig,load-balancer,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,reliability,mig,load-balancer,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-mig-single-zone.yaml b/cloud/gcp/compute/gcloud-mig-single-zone.yaml index 4e7ac4c18c3..b1ec8fd37ad 100644 --- a/cloud/gcp/compute/gcloud-mig-single-zone.yaml +++ b/cloud/gcp/compute/gcloud-mig-single-zone.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/mig-multiple-zones.html - https://cloud.google.com/compute/docs/instance-groups/distributing-instances-with-regional-instance-groups - tags: cloud,devops,gcp,gcloud,compute,reliability,mig,zones,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,reliability,mig,zones,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-oslogin-disabled.yaml b/cloud/gcp/compute/gcloud-oslogin-disabled.yaml index 1a0af9d5784..caa2c0de101 100644 --- a/cloud/gcp/compute/gcloud-oslogin-disabled.yaml +++ b/cloud/gcp/compute/gcloud-oslogin-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/enable-os-login.html - https://cloud.google.com/compute/docs/oslogin - tags: cloud,devops,gcp,gcloud,compute,security,ssh,oslogin,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,ssh,oslogin,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-persistent-disks-suspended-vms.yaml b/cloud/gcp/compute/gcloud-persistent-disks-suspended-vms.yaml index 5dd96272c04..34a23a8ccd0 100644 --- a/cloud/gcp/compute/gcloud-persistent-disks-suspended-vms.yaml +++ b/cloud/gcp/compute/gcloud-persistent-disks-suspended-vms.yaml @@ -12,7 +12,7 @@ info: Identify and detach persistent disks from suspended VMs, or delete the disks if they are no longer needed to optimize cloud resource costs. reference: - https://cloud.google.com/compute/docs/disks - tags: cloud,devops,gcp,gcloud,compute,storage,cost-optimization,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,storage,cost-optimization,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-automatic-restart-disabled.yaml b/cloud/gcp/compute/gcloud-vm-automatic-restart-disabled.yaml index e6e79e325d5..a7c23d55c66 100644 --- a/cloud/gcp/compute/gcloud-vm-automatic-restart-disabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-automatic-restart-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/enable-automatic-restart.html - https://cloud.google.com/compute/docs/instances/setting-instance-scheduling-options - tags: cloud,devops,gcp,gcloud,compute,reliability,automatic-restart,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,reliability,automatic-restart,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-confidential-computing-disabled.yaml b/cloud/gcp/compute/gcloud-vm-confidential-computing-disabled.yaml index ff47accf950..fc721084777 100644 --- a/cloud/gcp/compute/gcloud-vm-confidential-computing-disabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-confidential-computing-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/confidential-computing.html - https://cloud.google.com/compute/confidential-vm/docs/about-cvm - tags: cloud,devops,gcp,gcloud,compute,security,confidential-computing,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,confidential-computing,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-default-service-account-full-access.yaml b/cloud/gcp/compute/gcloud-vm-default-service-account-full-access.yaml index 910c36377b0..38c4751ee70 100644 --- a/cloud/gcp/compute/gcloud-vm-default-service-account-full-access.yaml +++ b/cloud/gcp/compute/gcloud-vm-default-service-account-full-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/default-service-accounts-with-full-access-in-use.html - https://cloud.google.com/compute/docs/access/service-accounts - tags: cloud,devops,gcp,gcloud,compute,security,iam,service-account,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,iam,service-account,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-default-service-account.yaml b/cloud/gcp/compute/gcloud-vm-default-service-account.yaml index caffd8bbf25..da417b92366 100644 --- a/cloud/gcp/compute/gcloud-vm-default-service-account.yaml +++ b/cloud/gcp/compute/gcloud-vm-default-service-account.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/default-service-accounts-in-use.html - https://cloud.google.com/compute/docs/access/service-accounts - tags: cloud,devops,gcp,gcloud,compute,security,iam,service-account,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,iam,service-account,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-deletion-protection-disabled.yaml b/cloud/gcp/compute/gcloud-vm-deletion-protection-disabled.yaml index b5cfdfbbc99..35be3501b09 100644 --- a/cloud/gcp/compute/gcloud-vm-deletion-protection-disabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-deletion-protection-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/enable-deletion-protection.html - https://cloud.google.com/compute/docs/instances/preventing-accidental-vm-deletion - tags: cloud,devops,gcp,gcloud,compute,security,deletion-protection,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,deletion-protection,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-disk-autodelete-enabled.yaml b/cloud/gcp/compute/gcloud-vm-disk-autodelete-enabled.yaml index 9de3643f36d..0ad6b1919f8 100644 --- a/cloud/gcp/compute/gcloud-vm-disk-autodelete-enabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-disk-autodelete-enabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/disable-auto-delete.html - https://cloud.google.com/compute/docs/disks/add-persistent-disk - tags: cloud,devops,gcp,gcloud,compute,security,storage,disk,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,storage,disk,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-disk-cmk-not-enabled.yaml b/cloud/gcp/compute/gcloud-vm-disk-cmk-not-enabled.yaml index db82adebe49..a467be9c4fc 100644 --- a/cloud/gcp/compute/gcloud-vm-disk-cmk-not-enabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-disk-cmk-not-enabled.yaml @@ -12,7 +12,7 @@ info: Configure your Compute Engine persistent disks to use Customer-Managed Keys (CMKs) for encryption by specifying a Cloud KMS key during disk creation or by updating existing disks. reference: - https://cloud.google.com/compute/docs/disks/customer-managed-encryption - tags: cloud,devops,gcp,gcloud,compute,encryption,cmk,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,encryption,cmk,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-disk-csek-disabled.yaml b/cloud/gcp/compute/gcloud-vm-disk-csek-disabled.yaml index be61534237e..93fb7f00987 100644 --- a/cloud/gcp/compute/gcloud-vm-disk-csek-disabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-disk-csek-disabled.yaml @@ -12,7 +12,7 @@ info: Enable Customer-Supplied Encryption Keys (CSEKs) for your VM disks by providing a valid encryption key during disk creation or instance launch. The key must be a 256-bit string encoded in RFC 4648 base64 format. reference: - https://cloud.google.com/compute/docs/disks/customer-supplied-encryption - tags: cloud,devops,gcp,gcloud,compute,encryption,csek,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,encryption,csek,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-disk-csek-not-enabled.yaml b/cloud/gcp/compute/gcloud-vm-disk-csek-not-enabled.yaml index e2e156db82d..ef8a08a4f9b 100644 --- a/cloud/gcp/compute/gcloud-vm-disk-csek-not-enabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-disk-csek-not-enabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/enable-encryption-with-csek.html - https://cloud.google.com/compute/docs/disks/customer-supplied-encryption - tags: cloud,devops,gcp,gcloud,compute,encryption,csek,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,encryption,csek,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-ip-forwarding-enabled.yaml b/cloud/gcp/compute/gcloud-vm-ip-forwarding-enabled.yaml index 0db2afe4867..7637aa6ed4d 100644 --- a/cloud/gcp/compute/gcloud-vm-ip-forwarding-enabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-ip-forwarding-enabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/disable-ip-forwarding.html - https://cloud.google.com/vpc/docs/using-routes - tags: cloud,devops,gcp,gcloud,compute,security,networking,ip-forwarding,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,networking,ip-forwarding,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-maintenance-terminate.yaml b/cloud/gcp/compute/gcloud-vm-maintenance-terminate.yaml index 898be6686ae..8ac41050d31 100644 --- a/cloud/gcp/compute/gcloud-vm-maintenance-terminate.yaml +++ b/cloud/gcp/compute/gcloud-vm-maintenance-terminate.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/configure-maintenance-behavior.html - https://cloud.google.com/compute/docs/instances/setting-instance-scheduling-options - tags: cloud,devops,gcp,gcloud,compute,reliability,maintenance,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,reliability,maintenance,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-oslogin-2fa-disabled.yaml b/cloud/gcp/compute/gcloud-vm-oslogin-2fa-disabled.yaml index ffcada00367..af59d0e617e 100644 --- a/cloud/gcp/compute/gcloud-vm-oslogin-2fa-disabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-oslogin-2fa-disabled.yaml @@ -12,7 +12,7 @@ info: Enable OS Login with 2FA authentication for all VM instances by setting the "enable-oslogin-2fa" metadata key to "TRUE". reference: - https://cloud.google.com/compute/docs/oslogin/set-up-oslogin - tags: cloud,devops,gcp,gcloud,compute,security,2fa,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,2fa,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-preemptible-enabled.yaml b/cloud/gcp/compute/gcloud-vm-preemptible-enabled.yaml index a6e3c663136..08ecc325202 100644 --- a/cloud/gcp/compute/gcloud-vm-preemptible-enabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-preemptible-enabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/disable-preemptibility.html - https://cloud.google.com/compute/docs/instances/preemptible - tags: cloud,devops,gcp,gcloud,compute,reliability,preemptible,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,reliability,preemptible,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-project-ssh-keys-enabled.yaml b/cloud/gcp/compute/gcloud-vm-project-ssh-keys-enabled.yaml index fba0f07002c..f32d6912347 100644 --- a/cloud/gcp/compute/gcloud-vm-project-ssh-keys-enabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-project-ssh-keys-enabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/enable-block-project-wide-ssh-keys.html - https://cloud.google.com/compute/docs/instances/adding-removing-ssh-keys - tags: cloud,devops,gcp,gcloud,compute,security,ssh,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,ssh,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-public-ip-enabled.yaml b/cloud/gcp/compute/gcloud-vm-public-ip-enabled.yaml index c9a06712528..7fbf877b28a 100644 --- a/cloud/gcp/compute/gcloud-vm-public-ip-enabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-public-ip-enabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/instances-with-public-ip-addresses.html - https://cloud.google.com/compute/docs/ip-addresses/reserve-static-external-ip-address - tags: cloud,devops,gcp,gcloud,compute,security,networking,public-ip,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,networking,public-ip,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-serial-console-enabled.yaml b/cloud/gcp/compute/gcloud-vm-serial-console-enabled.yaml index 7ca8dea8ade..74720423828 100644 --- a/cloud/gcp/compute/gcloud-vm-serial-console-enabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-serial-console-enabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/disable-interactive-serial-console-support.html - https://cloud.google.com/compute/docs/instances/interacting-with-serial-console - tags: cloud,devops,gcp,gcloud,compute,security,serial-console,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,serial-console,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/compute/gcloud-vm-shielded-disabled.yaml b/cloud/gcp/compute/gcloud-vm-shielded-disabled.yaml index 6b139d20866..90ad795a739 100644 --- a/cloud/gcp/compute/gcloud-vm-shielded-disabled.yaml +++ b/cloud/gcp/compute/gcloud-vm-shielded-disabled.yaml @@ -16,7 +16,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ComputeEngine/enable-shielded-vm.html - https://cloud.google.com/compute/docs/instances/modifying-shielded-vm - tags: cloud,devops,gcp,gcloud,compute,security,shielded-vm,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,compute,security,shielded-vm,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/dataproc/gcloud-dataproc-no-cmk.yaml b/cloud/gcp/dataproc/gcloud-dataproc-no-cmk.yaml index a0aa7bd24a1..34174b90718 100644 --- a/cloud/gcp/dataproc/gcloud-dataproc-no-cmk.yaml +++ b/cloud/gcp/dataproc/gcloud-dataproc-no-cmk.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/Dataproc/enable-encryption-with-cmks-for-dataproc-clusters.html - https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/customer-managed-encryption - tags: cloud,devops,gcp,gcloud,dataproc,security,encryption,cmk,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,dataproc,security,encryption,cmk,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/dataproc/gcloud-dataproc-public-access.yaml b/cloud/gcp/dataproc/gcloud-dataproc-public-access.yaml index 8119daff9dc..3c901062204 100644 --- a/cloud/gcp/dataproc/gcloud-dataproc-public-access.yaml +++ b/cloud/gcp/dataproc/gcloud-dataproc-public-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/Dataproc/publicly-accessible-dataproc-clusters.html - https://cloud.google.com/dataproc/docs/concepts/configuring-clusters/network - tags: cloud,devops,gcp,gcloud,dataproc,security,networking,public-access,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,dataproc,security,networking,public-access,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/filestore/gcloud-filestore-deletion-protection-disabled.yaml b/cloud/gcp/filestore/gcloud-filestore-deletion-protection-disabled.yaml index 79c4362cb23..ab8e6f32433 100644 --- a/cloud/gcp/filestore/gcloud-filestore-deletion-protection-disabled.yaml +++ b/cloud/gcp/filestore/gcloud-filestore-deletion-protection-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/Filestore/enable-deletion-protection.html - https://cloud.google.com/filestore/docs/prevent-deletion - tags: cloud,devops,gcp,gcloud,filestore,security,deletion-protection,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,filestore,security,deletion-protection,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/filestore/gcloud-filestore-no-backups.yaml b/cloud/gcp/filestore/gcloud-filestore-no-backups.yaml index e9df3278c6f..a4f21447722 100644 --- a/cloud/gcp/filestore/gcloud-filestore-no-backups.yaml +++ b/cloud/gcp/filestore/gcloud-filestore-no-backups.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/Filestore/backup-and-restore.html - https://cloud.google.com/filestore/docs/backup-restore - tags: cloud,devops,gcp,gcloud,filestore,security,backup,disaster-recovery,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,filestore,security,backup,disaster-recovery,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/filestore/gcloud-filestore-no-cmek.yaml b/cloud/gcp/filestore/gcloud-filestore-no-cmek.yaml index 4eb122fe7f1..78b22316835 100644 --- a/cloud/gcp/filestore/gcloud-filestore-no-cmek.yaml +++ b/cloud/gcp/filestore/gcloud-filestore-no-cmek.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/Filestore/instances-encrypted-with-cmeks.html - https://cloud.google.com/filestore/docs/encryption - tags: cloud,devops,gcp,gcloud,filestore,security,encryption,cmek,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,filestore,security,encryption,cmek,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/filestore/gcloud-filestore-no-vpc-controls.yaml b/cloud/gcp/filestore/gcloud-filestore-no-vpc-controls.yaml index 49867033386..ed7be347fff 100644 --- a/cloud/gcp/filestore/gcloud-filestore-no-vpc-controls.yaml +++ b/cloud/gcp/filestore/gcloud-filestore-no-vpc-controls.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/Filestore/use-vpc-service-controls.html - https://cloud.google.com/vpc-service-controls/docs/supported-products - tags: cloud,devops,gcp,gcloud,filestore,security,networking,vpc,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,filestore,security,networking,vpc,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/filestore/gcloud-filestore-unrestricted-access.yaml b/cloud/gcp/filestore/gcloud-filestore-unrestricted-access.yaml index a20f20fcc17..8402035782d 100644 --- a/cloud/gcp/filestore/gcloud-filestore-unrestricted-access.yaml +++ b/cloud/gcp/filestore/gcloud-filestore-unrestricted-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/Filestore/restrict-client-access.html - https://cloud.google.com/filestore/docs/access-control - tags: cloud,devops,gcp,gcloud,filestore,security,networking,access-control,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,filestore,security,networking,access-control,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-auto-runtime-updates-disabled.yaml b/cloud/gcp/function/gcloud-func-auto-runtime-updates-disabled.yaml index 91c2c612a9c..1d7b1574e65 100644 --- a/cloud/gcp/function/gcloud-func-auto-runtime-updates-disabled.yaml +++ b/cloud/gcp/function/gcloud-func-auto-runtime-updates-disabled.yaml @@ -12,7 +12,7 @@ info: Enable automatic runtime security updates for each Google Cloud function by setting the `serviceConfig.minInstanceCount` to a non-null value, ensuring functions are automatically updated with the latest security patches. reference: - https://cloud.google.com/functions/docs/securing/managing-security - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-cmek-not-used.yaml b/cloud/gcp/function/gcloud-func-cmek-not-used.yaml index ab036a3c1b3..e375cb46480 100644 --- a/cloud/gcp/function/gcloud-func-cmek-not-used.yaml +++ b/cloud/gcp/function/gcloud-func-cmek-not-used.yaml @@ -12,7 +12,7 @@ info: Configure your Google Cloud functions to use Customer-Managed Encryption Keys (CMEK) to ensure data encryption at rest is managed according to your compliance and security requirements. reference: - https://cloud.google.com/functions/docs/securing/managing-encryption-keys - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-inactive-svc-acc.yaml b/cloud/gcp/function/gcloud-func-inactive-svc-acc.yaml index 12b0110956c..0dd5836fb14 100644 --- a/cloud/gcp/function/gcloud-func-inactive-svc-acc.yaml +++ b/cloud/gcp/function/gcloud-func-inactive-svc-acc.yaml @@ -12,7 +12,7 @@ info: Verify and update the service accounts associated with your Google Cloud functions to ensure they are active and have the necessary permissions for function execution. reference: - https://cloud.google.com/functions/docs/securing/managing-access-iam - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-min-instances-unset.yaml b/cloud/gcp/function/gcloud-func-min-instances-unset.yaml index c2ae687920e..303c0c2187a 100644 --- a/cloud/gcp/function/gcloud-func-min-instances-unset.yaml +++ b/cloud/gcp/function/gcloud-func-min-instances-unset.yaml @@ -12,7 +12,7 @@ info: Configure the serviceConfig.minInstanceCount parameter for your Google Cloud Functions to an appropriate value that suits your workload demands. reference: - https://cloud.google.com/functions/docs/scaling#setting_a_minimum_number_of_instances - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-missing-labels.yaml b/cloud/gcp/function/gcloud-func-missing-labels.yaml index e25241d81f8..83bc123a1ce 100644 --- a/cloud/gcp/function/gcloud-func-missing-labels.yaml +++ b/cloud/gcp/function/gcloud-func-missing-labels.yaml @@ -12,7 +12,7 @@ info: Define and apply user-defined labels to all Google Cloud functions to enhance resource management capabilities and improve operational efficiency. reference: - https://cloud.google.com/resource-manager/docs/creating-managing-labels - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-no-vpc-access.yaml b/cloud/gcp/function/gcloud-func-no-vpc-access.yaml index ea9ca915726..45015852210 100644 --- a/cloud/gcp/function/gcloud-func-no-vpc-access.yaml +++ b/cloud/gcp/function/gcloud-func-no-vpc-access.yaml @@ -12,7 +12,7 @@ info: Configure Serverless VPC Access for your Google Cloud functions by setting the vpcConnector parameter to the name of an already configured VPC connector in your project settings. reference: - https://cloud.google.com/functions/docs/connecting-vpc - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-public-access.yaml b/cloud/gcp/function/gcloud-func-public-access.yaml index e9bab078b5e..b7bb85f0c40 100644 --- a/cloud/gcp/function/gcloud-func-public-access.yaml +++ b/cloud/gcp/function/gcloud-func-public-access.yaml @@ -12,7 +12,7 @@ info: Update the IAM policies of your Google Cloud functions to remove allUsers and allAuthenticatedUsers from the bindings to ensure that the functions are not publicly accessible. reference: - https://cloud.google.com/functions/docs/securing/managing-access-iam - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-pubsub-dlt-missing.yaml b/cloud/gcp/function/gcloud-func-pubsub-dlt-missing.yaml index 1d9407e7b13..5b29b105c76 100644 --- a/cloud/gcp/function/gcloud-func-pubsub-dlt-missing.yaml +++ b/cloud/gcp/function/gcloud-func-pubsub-dlt-missing.yaml @@ -12,7 +12,7 @@ info: Configure a Dead-Letter Topic for each Pub/Sub-triggered function by setting up the necessary Pub/Sub subscription settings. reference: - https://cloud.google.com/functions/docs/calling/pubsub#retry - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-secrets-unmanaged.yaml b/cloud/gcp/function/gcloud-func-secrets-unmanaged.yaml index b6855da1eac..4e11b2a5761 100644 --- a/cloud/gcp/function/gcloud-func-secrets-unmanaged.yaml +++ b/cloud/gcp/function/gcloud-func-secrets-unmanaged.yaml @@ -12,7 +12,7 @@ info: Refactor your Google Cloud Functions to use Secrets Manager for managing sensitive configuration settings instead of storing them directly in environment variables. reference: - https://cloud.google.com/functions/docs/securing/managing-secrets - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcloud-func-unrestricted-outbound.yaml b/cloud/gcp/function/gcloud-func-unrestricted-outbound.yaml index fc42269eddf..1c9576e29c6 100644 --- a/cloud/gcp/function/gcloud-func-unrestricted-outbound.yaml +++ b/cloud/gcp/function/gcloud-func-unrestricted-outbound.yaml @@ -12,7 +12,7 @@ info: Configure the VpcConnectorEgressSettings of your Google Cloud functions to PRIVATE_RANGES_ONLY to ensure all outgoing traffic is limited to internal IP ranges only. reference: - https://cloud.google.com/functions/docs/networking/network-settings - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcp-cloud-func-gen1-deprecated.yaml b/cloud/gcp/function/gcp-cloud-func-gen1-deprecated.yaml index f8dd5387c2f..8a4f86f9c64 100644 --- a/cloud/gcp/function/gcp-cloud-func-gen1-deprecated.yaml +++ b/cloud/gcp/function/gcp-cloud-func-gen1-deprecated.yaml @@ -12,7 +12,7 @@ info: Migrate all 1st generation Google Cloud functions to newer generation runtimes as recommended by Google to ensure continued support and access to the latest features and security enhancements. reference: - https://cloud.google.com/functions/docs/migrating - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/function/gcp-func-default-svc-acc.yaml b/cloud/gcp/function/gcp-func-default-svc-acc.yaml index 9f9099fbfbc..c6de28ac4bb 100644 --- a/cloud/gcp/function/gcp-func-default-svc-acc.yaml +++ b/cloud/gcp/function/gcp-func-default-svc-acc.yaml @@ -12,7 +12,7 @@ info: Configure your Google Cloud functions to use user-managed service accounts that have only the permissions necessary for the function to operate. reference: - https://cloud.google.com/functions/docs/securing/managing-access-iam - tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gcp-env.yaml b/cloud/gcp/gcp-env.yaml index 0fa7cfa1e0a..3d7cf4d6a43 100644 --- a/cloud/gcp/gcp-env.yaml +++ b/cloud/gcp/gcp-env.yaml @@ -8,7 +8,7 @@ info: Checks if Google Cloud CLI (gcloud) is set up and all necessary tools are installed on the environment. reference: - https://console.cloud.google.com/ - tags: cloud,devops,google,gcp,gcp-cloud-config,vuln + tags: cloud,devops,google,gcp,gcp-cloud-config self-contained: true code: diff --git a/cloud/gcp/gke/gcloud-gke-auto-repair-disabled.yaml b/cloud/gcp/gke/gcloud-gke-auto-repair-disabled.yaml index bb0b44f1301..851ec7fb643 100644 --- a/cloud/gcp/gke/gcloud-gke-auto-repair-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-auto-repair-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/node-auto-repair - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-auto-repair.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,reliability,maintenance,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,reliability,maintenance,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-auto-upgrade-disabled.yaml b/cloud/gcp/gke/gcloud-gke-auto-upgrade-disabled.yaml index 2a08b9376e1..5d31e0978da 100644 --- a/cloud/gcp/gke/gcloud-gke-auto-upgrade-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-auto-upgrade-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/node-auto-upgrades - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-auto-upgrade.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,updates,maintenance,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,updates,maintenance,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-backups-disabled.yaml b/cloud/gcp/gke/gcloud-gke-backups-disabled.yaml index 7347d2d5ffb..95270cb958e 100644 --- a/cloud/gcp/gke/gcloud-gke-backups-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-backups-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/backup-restore - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-cluster-backups.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,backup,disaster-recovery,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,backup,disaster-recovery,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-binary-authorization-disabled.yaml b/cloud/gcp/gke/gcloud-gke-binary-authorization-disabled.yaml index 7fcc7055197..0928ae07ea4 100644 --- a/cloud/gcp/gke/gcloud-gke-binary-authorization-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-binary-authorization-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/binary-authorization/docs/overview - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-binary-authorization.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,container,authorization,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,container,authorization,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-client-certificate-enabled.yaml b/cloud/gcp/gke/gcloud-gke-client-certificate-enabled.yaml index e11de28f930..1614ac519ad 100644 --- a/cloud/gcp/gke/gcloud-gke-client-certificate-enabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-client-certificate-enabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/disable-client-certificate.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,authentication,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,authentication,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-confidential-nodes-disabled.yaml b/cloud/gcp/gke/gcloud-gke-confidential-nodes-disabled.yaml index 48fe433b9a0..bac863fe288 100644 --- a/cloud/gcp/gke/gcloud-gke-confidential-nodes-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-confidential-nodes-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/confidential-gke-nodes - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-confidential-gke-nodes.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,encryption,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,encryption,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-cos-containerd-disabled.yaml b/cloud/gcp/gke/gcloud-gke-cos-containerd-disabled.yaml index 0db6161b884..8f3c6d56ae6 100644 --- a/cloud/gcp/gke/gcloud-gke-cos-containerd-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-cos-containerd-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/concepts/node-images - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/use-cos-containerd.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,containers,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,containers,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-cost-allocation-disabled.yaml b/cloud/gcp/gke/gcloud-gke-cost-allocation-disabled.yaml index 66434379810..bcb872da052 100644 --- a/cloud/gcp/gke/gcloud-gke-cost-allocation-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-cost-allocation-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/cluster-usage-metering - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-cost-allocation.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,cost,monitoring,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,cost,monitoring,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-default-service-account.yaml b/cloud/gcp/gke/gcloud-gke-default-service-account.yaml index 8685b4d7c01..4cf4edef66e 100644 --- a/cloud/gcp/gke/gcloud-gke-default-service-account.yaml +++ b/cloud/gcp/gke/gcloud-gke-default-service-account.yaml @@ -13,7 +13,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/hardening-your-cluster#use_least_privilege_sa - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/remove-default-service-account.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,iam,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,iam,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-integrity-monitoring-disabled.yaml b/cloud/gcp/gke/gcloud-gke-integrity-monitoring-disabled.yaml index 428c8e99eb5..5f86a781e6d 100644 --- a/cloud/gcp/gke/gcloud-gke-integrity-monitoring-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-integrity-monitoring-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/shielded-gke-nodes - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-integrity-monitoring.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,monitoring,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,monitoring,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-intranode-visibility-disabled.yaml b/cloud/gcp/gke/gcloud-gke-intranode-visibility-disabled.yaml index 0ef6b4cf525..66e87a5933f 100644 --- a/cloud/gcp/gke/gcloud-gke-intranode-visibility-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-intranode-visibility-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/intranode-visibility - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-intranode-visibility.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,networking,visibility,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,networking,visibility,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-labels-missing.yaml b/cloud/gcp/gke/gcloud-gke-labels-missing.yaml index bcf30d02525..53a4f6f9238 100644 --- a/cloud/gcp/gke/gcloud-gke-labels-missing.yaml +++ b/cloud/gcp/gke/gcloud-gke-labels-missing.yaml @@ -13,7 +13,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/creating-managing-labels - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/use-labels-for-resource-management.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,labels,management,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,labels,management,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-logging-disabled.yaml b/cloud/gcp/gke/gcloud-gke-logging-disabled.yaml index c7527f1092c..a7e96d032dc 100644 --- a/cloud/gcp/gke/gcloud-gke-logging-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-logging-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/logging - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-and-configure-logging.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,logging,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,logging,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-metadata-server-disabled.yaml b/cloud/gcp/gke/gcloud-gke-metadata-server-disabled.yaml index 46544a4c78b..f11f817dab7 100644 --- a/cloud/gcp/gke/gcloud-gke-metadata-server-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-metadata-server-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/protecting-cluster-metadata - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-metadata-server.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,metadata,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,metadata,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-monitoring-disabled.yaml b/cloud/gcp/gke/gcloud-gke-monitoring-disabled.yaml index 6a27212e277..88e464f8e2a 100644 --- a/cloud/gcp/gke/gcloud-gke-monitoring-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-monitoring-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/monitoring - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-and-configure-cloud-monitoring.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,monitoring,observability,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,monitoring,observability,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-notifications-disabled.yaml b/cloud/gcp/gke/gcloud-gke-notifications-disabled.yaml index c8bcdd79df5..c7d2d0a6267 100644 --- a/cloud/gcp/gke/gcloud-gke-notifications-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-notifications-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/concepts/cluster-notifications - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-notifications.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,monitoring,notifications,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,monitoring,notifications,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-private-nodes-disabled.yaml b/cloud/gcp/gke/gcloud-gke-private-nodes-disabled.yaml index bee61741bb7..12f6ebe7cda 100644 --- a/cloud/gcp/gke/gcloud-gke-private-nodes-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-private-nodes-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-private-nodes.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-public-endpoint-enabled.yaml b/cloud/gcp/gke/gcloud-gke-public-endpoint-enabled.yaml index 56954e8e192..459f29ed5e3 100644 --- a/cloud/gcp/gke/gcloud-gke-public-endpoint-enabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-public-endpoint-enabled.yaml @@ -11,7 +11,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/clusters-with-private-endpoints.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-release-channel-disabled.yaml b/cloud/gcp/gke/gcloud-gke-release-channel-disabled.yaml index 51685c0b1ac..6d9ad921ba3 100644 --- a/cloud/gcp/gke/gcloud-gke-release-channel-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-release-channel-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/concepts/release-channels - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/automate-version-upgrades.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,updates,maintenance,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,updates,maintenance,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-sandbox-disabled.yaml b/cloud/gcp/gke/gcloud-gke-sandbox-disabled.yaml index 84b5f26b32e..48651e03ca4 100644 --- a/cloud/gcp/gke/gcloud-gke-sandbox-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-sandbox-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/sandbox-pods - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-gke-sandbox-with-gvisor.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,sandbox,gvisor,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,sandbox,gvisor,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-secrets-encryption-disabled.yaml b/cloud/gcp/gke/gcloud-gke-secrets-encryption-disabled.yaml index 58db7a8a10f..02c0c8be565 100644 --- a/cloud/gcp/gke/gcloud-gke-secrets-encryption-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-secrets-encryption-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/encrypting-secrets - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-application-layer-secrets-encryption.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,encryption,secrets,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,encryption,secrets,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-secure-boot-disabled.yaml b/cloud/gcp/gke/gcloud-gke-secure-boot-disabled.yaml index b7ab343eb9a..478dd1f8676 100644 --- a/cloud/gcp/gke/gcloud-gke-secure-boot-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-secure-boot-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/shielded-gke-nodes - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-secure-boot.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,boot,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,boot,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-security-posture-disabled.yaml b/cloud/gcp/gke/gcloud-gke-security-posture-disabled.yaml index 4182f393e46..b34f95cef58 100644 --- a/cloud/gcp/gke/gcloud-gke-security-posture-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-security-posture-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/security-posture - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-and-configure-security-posture.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,monitoring,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,monitoring,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-shielded-nodes-disabled.yaml b/cloud/gcp/gke/gcloud-gke-shielded-nodes-disabled.yaml index 8eb46a15f86..811b7fab178 100644 --- a/cloud/gcp/gke/gcloud-gke-shielded-nodes-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-shielded-nodes-disabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/use-shielded-cluster-nodes.html - https://cloud.google.com/kubernetes-engine/docs/how-to/shielded-gke-nodes - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,shielded-nodes,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,shielded-nodes,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-transparent-encryption-disabled.yaml b/cloud/gcp/gke/gcloud-gke-transparent-encryption-disabled.yaml index 6466bde5768..05085cf2fc3 100644 --- a/cloud/gcp/gke/gcloud-gke-transparent-encryption-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-transparent-encryption-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/encrypt-in-transit - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-inter-node-transparent-encryption.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,encryption,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,encryption,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-vpc-native-disabled.yaml b/cloud/gcp/gke/gcloud-gke-vpc-native-disabled.yaml index cabfbbe9452..4519ce445ec 100644 --- a/cloud/gcp/gke/gcloud-gke-vpc-native-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-vpc-native-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/alias-ips - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-vpc-native-traffic-routing.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,networking,vpc,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,networking,vpc,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-vulnerability-scanning-disabled.yaml b/cloud/gcp/gke/gcloud-gke-vulnerability-scanning-disabled.yaml index 0822ffb61c2..b1843c526de 100644 --- a/cloud/gcp/gke/gcloud-gke-vulnerability-scanning-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-vulnerability-scanning-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/security-posture - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-workload-vulnerability-scanning.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,vulnerability,scanning,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,vulnerability,scanning,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/gke/gcloud-gke-workload-identity-disabled.yaml b/cloud/gcp/gke/gcloud-gke-workload-identity-disabled.yaml index 9a932eb7a95..9a0fa4aea1b 100644 --- a/cloud/gcp/gke/gcloud-gke-workload-identity-disabled.yaml +++ b/cloud/gcp/gke/gcloud-gke-workload-identity-disabled.yaml @@ -14,7 +14,7 @@ info: reference: - https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/GKE/enable-workload-identity.html - tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,iam,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,iam,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/iam/gcloud-access-approval-not-enabled.yaml b/cloud/gcp/iam/gcloud-access-approval-not-enabled.yaml index 493b7e24fb4..4ab19cc95e5 100644 --- a/cloud/gcp/iam/gcloud-access-approval-not-enabled.yaml +++ b/cloud/gcp/iam/gcloud-access-approval-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable Access Approval in your GCP projects to create a new control and logging layer that reveals who in your organization approved or denied access requests. reference: - https://cloud.google.com/access-approval/docs/quickstart - tags: cloud,devops,gcp,gcloud,google-cloud-platform,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-platform,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/iam/gcloud-api-keys-present.yaml b/cloud/gcp/iam/gcloud-api-keys-present.yaml index b5a8f743038..77235bf8a32 100644 --- a/cloud/gcp/iam/gcloud-api-keys-present.yaml +++ b/cloud/gcp/iam/gcloud-api-keys-present.yaml @@ -12,7 +12,7 @@ info: Remove all API keys and replace them with standard authentication methods to secure your applications. reference: - https://cloud.google.com/docs/authentication/api-keys - tags: cloud,devops,gcp,gcloud,google-cloud-api,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-api,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/iam/gcloud-iam-admin-roles.yaml b/cloud/gcp/iam/gcloud-iam-admin-roles.yaml index 25a91b302ce..51cc6356c0c 100644 --- a/cloud/gcp/iam/gcloud-iam-admin-roles.yaml +++ b/cloud/gcp/iam/gcloud-iam-admin-roles.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/IAM/roles-with-admin-permissions.html - https://cloud.google.com/iam/docs/understanding-roles - tags: cloud,devops,gcp,gcloud,iam,security,admin,permissions,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,iam,security,admin,permissions,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/iam/gcloud-iam-primitive-roles.yaml b/cloud/gcp/iam/gcloud-iam-primitive-roles.yaml index 20d8cf3bc3b..b6fbd4d7bfc 100644 --- a/cloud/gcp/iam/gcloud-iam-primitive-roles.yaml +++ b/cloud/gcp/iam/gcloud-iam-primitive-roles.yaml @@ -12,7 +12,7 @@ info: Replace primitive roles with predefined or custom roles tailored to the specific needs of the users and the minimum permissions they require to perform their tasks. reference: - https://cloud.google.com/iam/docs/understanding-roles - tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/iam/gcloud-iam-separation-duties.yaml b/cloud/gcp/iam/gcloud-iam-separation-duties.yaml index b8a6314b9f8..448ca256380 100644 --- a/cloud/gcp/iam/gcloud-iam-separation-duties.yaml +++ b/cloud/gcp/iam/gcloud-iam-separation-duties.yaml @@ -12,7 +12,7 @@ info: Review and modify the roles assigned to GCP service accounts ensuring that no service account has both the Service Account Admin and Service Account User roles assigned at the same time. reference: - https://cloud.google.com/iam/docs/understanding-roles - tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/iam/gcloud-iam-service-roles-project-level.yaml b/cloud/gcp/iam/gcloud-iam-service-roles-project-level.yaml index 28ceb019efc..928e227efbf 100644 --- a/cloud/gcp/iam/gcloud-iam-service-roles-project-level.yaml +++ b/cloud/gcp/iam/gcloud-iam-service-roles-project-level.yaml @@ -12,7 +12,7 @@ info: Ensure these roles are assigned directly to service accounts and not at the project level to enforce the principle of least privilege. reference: - https://cloud.google.com/iam/docs/understanding-roles - tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/iam/gcloud-iam-unrestricted-decryption.yaml b/cloud/gcp/iam/gcloud-iam-unrestricted-decryption.yaml index 97b1a243726..8dd43d69087 100644 --- a/cloud/gcp/iam/gcloud-iam-unrestricted-decryption.yaml +++ b/cloud/gcp/iam/gcloud-iam-unrestricted-decryption.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/IAM/decryption-with-all-keys-not-allowed.html - https://cloud.google.com/kms/docs/reference/permissions-and-roles - tags: cloud,devops,gcp,gcloud,iam,security,encryption,kms,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,iam,security,encryption,kms,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/iam/gcloud-service-account-admin-restriction.yaml b/cloud/gcp/iam/gcloud-service-account-admin-restriction.yaml index 31a80d18f40..af5436c2a57 100644 --- a/cloud/gcp/iam/gcloud-service-account-admin-restriction.yaml +++ b/cloud/gcp/iam/gcloud-service-account-admin-restriction.yaml @@ -12,7 +12,7 @@ info: Review and minimize the roles assigned to service accounts, ensuring no administrative privileges are granted unless absolutely necessary. reference: - https://cloud.google.com/iam/docs/understanding-roles - tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/iam/gcloud-service-account-user-keys.yaml b/cloud/gcp/iam/gcloud-service-account-user-keys.yaml index 2e43c70dd0a..4a0d1e74860 100644 --- a/cloud/gcp/iam/gcloud-service-account-user-keys.yaml +++ b/cloud/gcp/iam/gcloud-service-account-user-keys.yaml @@ -12,7 +12,7 @@ info: Transition to using GCP-managed keys for service accounts to ensure key management is handled by Google Cloud, thereby enhancing security and reducing the administrative burden of manual key management. reference: - https://cloud.google.com/iam/docs/managing-service-account-keys - tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/kms/gcloud-kms-public-access.yaml b/cloud/gcp/kms/gcloud-kms-public-access.yaml index a6f5bf4fedb..fbb20f659b7 100644 --- a/cloud/gcp/kms/gcloud-kms-public-access.yaml +++ b/cloud/gcp/kms/gcloud-kms-public-access.yaml @@ -12,7 +12,7 @@ info: Update the IAM policy for your KMS keys by removing any bindings that include "allUsers" or "allAuthenticatedUsers" to restrict access to authenticated and authorized users only. reference: - https://cloud.google.com/kms/docs/restricting-access - tags: cloud,devops,gcp,gcloud,google-kms,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-kms,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/loadbalancing/gcloud-alb-ssl-google-managed.yaml b/cloud/gcp/loadbalancing/gcloud-alb-ssl-google-managed.yaml index 7ef1c1ed73c..065ff87b878 100644 --- a/cloud/gcp/loadbalancing/gcloud-alb-ssl-google-managed.yaml +++ b/cloud/gcp/loadbalancing/gcloud-alb-ssl-google-managed.yaml @@ -12,7 +12,7 @@ info: Configure your Application Load Balancers to use Google-managed SSL certificates to ensure trust and proper security standards. reference: - https://cloud.google.com/load-balancing/docs/ssl-certificates - tags: cloud,devops,gcp,gcloud,google-cloud-load-balancing,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-load-balancing,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/loadbalancing/gcloud-approved-external-lb.yaml b/cloud/gcp/loadbalancing/gcloud-approved-external-lb.yaml index 7452e42322b..efbc1c1991a 100644 --- a/cloud/gcp/loadbalancing/gcloud-approved-external-lb.yaml +++ b/cloud/gcp/loadbalancing/gcloud-approved-external-lb.yaml @@ -12,7 +12,7 @@ info: Ensure all used external load balancers are approved in the Trend Cloud One™ – Conformity account console. Replace unapproved load balancers with approved ones. reference: - https://cloud.google.com/load-balancing/docs - tags: cloud,devops,gcp,gcloud,google-cloud-load-balancing,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-load-balancing,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/loadbalancing/gcloud-https-lb-logging-disabled.yaml b/cloud/gcp/loadbalancing/gcloud-https-lb-logging-disabled.yaml index dec66352455..c8251181051 100644 --- a/cloud/gcp/loadbalancing/gcloud-https-lb-logging-disabled.yaml +++ b/cloud/gcp/loadbalancing/gcloud-https-lb-logging-disabled.yaml @@ -12,7 +12,7 @@ info: Enable logging on all Google Cloud HTTP(S) load balancers by configuring the logConfig.enable setting to true in the backend services settings. reference: - https://cloud.google.com/load-balancing/docs/https - tags: cloud,devops,gcp,gcloud,google-cloud-load-balancing,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-load-balancing,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/loadbalancing/gcloud-lb-backend-unsecured.yaml b/cloud/gcp/loadbalancing/gcloud-lb-backend-unsecured.yaml index 705a9bc7ee9..a800910ffc1 100644 --- a/cloud/gcp/loadbalancing/gcloud-lb-backend-unsecured.yaml +++ b/cloud/gcp/loadbalancing/gcloud-lb-backend-unsecured.yaml @@ -12,7 +12,7 @@ info: Attach an edge security policy to your backend services via the Google Cloud Console or using the Cloud Armor APIs to enhance security at your network's edge. reference: - https://cloud.google.com/armor/docs/security-policy-overview - tags: cloud,devops,gcp,gcloud,google-cloud-load-balancer,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-load-balancer,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/loadbalancing/gcloud-ssl-policy-insecure-ciphers.yaml b/cloud/gcp/loadbalancing/gcloud-ssl-policy-insecure-ciphers.yaml index b26fdb42e1d..b4a4a0828f9 100644 --- a/cloud/gcp/loadbalancing/gcloud-ssl-policy-insecure-ciphers.yaml +++ b/cloud/gcp/loadbalancing/gcloud-ssl-policy-insecure-ciphers.yaml @@ -12,7 +12,7 @@ info: Ensure SSL policies use MODERN or RESTRICTED profiles, or a secure CUSTOM profile without weak ciphers. reference: - https://cloud.google.com/load-balancing/docs/ssl-policies - tags: cloud,devops,gcp,gcloud,google-cloud-load-balancing,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-load-balancing,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/logging/gcloud-enable-data-access-audit-logging.yaml b/cloud/gcp/logging/gcloud-enable-data-access-audit-logging.yaml index d94f8ba04e6..72c68b0baf5 100644 --- a/cloud/gcp/logging/gcloud-enable-data-access-audit-logging.yaml +++ b/cloud/gcp/logging/gcloud-enable-data-access-audit-logging.yaml @@ -12,7 +12,7 @@ info: Configure the IAM policy of your Google Cloud project to include the "auditConfigs" configuration object that enables data access audit logging for all critical APIs. reference: - https://cloud.google.com/logging/docs/audit/configure-data-access - tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-iam,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/logging/gcloud-global-logging-not-enabled.yaml b/cloud/gcp/logging/gcloud-global-logging-not-enabled.yaml index e2514092cad..79171f156ec 100644 --- a/cloud/gcp/logging/gcloud-global-logging-not-enabled.yaml +++ b/cloud/gcp/logging/gcloud-global-logging-not-enabled.yaml @@ -12,7 +12,7 @@ info: Update Cloud Logging buckets to use the global location scope to enable centralized logging across all regions. reference: - https://cloud.google.com/logging/docs/export/configure_export_v2 - tags: cloud,devops,gcp,gcloud,google-cloud-logging,logging-buckets,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-logging,logging-buckets,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/logging/gcloud-log-retention-period-insufficient.yaml b/cloud/gcp/logging/gcloud-log-retention-period-insufficient.yaml index 74f46e3ac91..7bf982e94e7 100644 --- a/cloud/gcp/logging/gcloud-log-retention-period-insufficient.yaml +++ b/cloud/gcp/logging/gcloud-log-retention-period-insufficient.yaml @@ -12,7 +12,7 @@ info: Update the retention period for your Cloud Logging buckets to 365 days or more using the Google Cloud CLI or the Console to ensure compliance with best practices. reference: - https://cloud.google.com/logging/docs/export/configure_storage - tags: cloud,devops,gcp,gcloud,google-cloud-logging,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-logging,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/logging/gcloud-logging-sink-not-configured.yaml b/cloud/gcp/logging/gcloud-logging-sink-not-configured.yaml index 995d8ac1f1d..c248ae28007 100644 --- a/cloud/gcp/logging/gcloud-logging-sink-not-configured.yaml +++ b/cloud/gcp/logging/gcloud-logging-sink-not-configured.yaml @@ -12,7 +12,7 @@ info: Create a log sink with a blank filter to export all log entries within the project. Ensure the export destination aligns with your organizational logging strategy. reference: - https://cloud.google.com/logging/docs/export/configure_export_v2 - tags: cloud,devops,gcp,gcloud,google-cloud-logging,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-logging,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/logging/gcloud-logs-router-cmek-not-enabled.yaml b/cloud/gcp/logging/gcloud-logs-router-cmek-not-enabled.yaml index b999b691cfc..d2a5a2fd054 100644 --- a/cloud/gcp/logging/gcloud-logs-router-cmek-not-enabled.yaml +++ b/cloud/gcp/logging/gcloud-logs-router-cmek-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable Customer-Managed Keys (CMKs) for Logs Router encryption within your GCP organization by configuring Cloud KMS keys and associating them with the Logs Router service. Ensure the CMKs are properly managed and rotated per compliance requirements. reference: - https://cloud.google.com/logging/docs/routing/managed-encryption - tags: cloud,devops,gcp,gcloud,google-cloud-logging,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-logging,gcp-cloud-config self-contained: true diff --git a/cloud/gcp/logging/gcloud-vpc-network-changes-monitoring-not-enabled.yaml b/cloud/gcp/logging/gcloud-vpc-network-changes-monitoring-not-enabled.yaml index e2688edae7e..1106bcfe09a 100644 --- a/cloud/gcp/logging/gcloud-vpc-network-changes-monitoring-not-enabled.yaml +++ b/cloud/gcp/logging/gcloud-vpc-network-changes-monitoring-not-enabled.yaml @@ -13,7 +13,7 @@ info: reference: - https://cloud.google.com/monitoring/alerts - https://cloud.google.com/logging/docs/audit - tags: cloud,devops,gcp,gcloud,vpc,google-cloud-monitoring,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,google-cloud-monitoring,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/nat/gcloud-iam-least-privilege-nat.yaml b/cloud/gcp/nat/gcloud-iam-least-privilege-nat.yaml index f5bf299d0d6..dd7e50944cb 100644 --- a/cloud/gcp/nat/gcloud-iam-least-privilege-nat.yaml +++ b/cloud/gcp/nat/gcloud-iam-least-privilege-nat.yaml @@ -13,7 +13,7 @@ info: reference: - https://cloud.google.com/iam/docs/understanding-roles - https://cloud.google.com/nat/docs/overview - tags: cloud,devops,gcp,gcloud,iam,cloud-nat,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,iam,cloud-nat,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/nat/gcloud-nat-logging-disabled.yaml b/cloud/gcp/nat/gcloud-nat-logging-disabled.yaml index 3896c7157c4..58b915e5a9e 100644 --- a/cloud/gcp/nat/gcloud-nat-logging-disabled.yaml +++ b/cloud/gcp/nat/gcloud-nat-logging-disabled.yaml @@ -12,7 +12,7 @@ info: Enable logging for your Google Cloud NAT gateways by setting the `logConfig.enable` parameter to `True`. This ensures that all NAT connection and error activities are logged appropriately. reference: - https://cloud.google.com/nat/docs/logging - tags: cloud,devops,gcp,gcloud,google-cloud-nat,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-nat,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/nat/gcloud-nat-private-subnet-disabled.yaml b/cloud/gcp/nat/gcloud-nat-private-subnet-disabled.yaml index 25abddabf53..3bec11ee1f1 100644 --- a/cloud/gcp/nat/gcloud-nat-private-subnet-disabled.yaml +++ b/cloud/gcp/nat/gcloud-nat-private-subnet-disabled.yaml @@ -12,7 +12,7 @@ info: Configure Cloud NAT for all private subnets that require outbound access. Use Compute Engine routers to define NAT configuration and associate them with your VPC subnets. reference: - https://cloud.google.com/nat/docs/overview - tags: cloud,devops,gcp,gcloud,google-cloud-nat,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-nat,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/nat/gcloud-nat-static-ip-unconfigured.yaml b/cloud/gcp/nat/gcloud-nat-static-ip-unconfigured.yaml index 1170586e94a..a084008dda4 100644 --- a/cloud/gcp/nat/gcloud-nat-static-ip-unconfigured.yaml +++ b/cloud/gcp/nat/gcloud-nat-static-ip-unconfigured.yaml @@ -12,7 +12,7 @@ info: Configure your Google Cloud NAT gateways to use static reserved external IPs by reserving external IPs and attaching them to the NAT configuration. reference: - https://cloud.google.com/nat/docs/using-nat - tags: cloud,devops,gcp,gcloud,google-cloud-nat,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-nat,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/nat/gcloud-nat-subnet-unrestricted.yaml b/cloud/gcp/nat/gcloud-nat-subnet-unrestricted.yaml index 83f0597ba88..cadaa8cb7f8 100644 --- a/cloud/gcp/nat/gcloud-nat-subnet-unrestricted.yaml +++ b/cloud/gcp/nat/gcloud-nat-subnet-unrestricted.yaml @@ -12,7 +12,7 @@ info: Restrict your Cloud NAT gateways to specific VPC subnets by defining subnet mappings in the NAT configuration settings. Review and update your network configurations to ensure adherence to your organization's security policies. reference: - https://cloud.google.com/nat/docs/using-nat - tags: cloud,devops,gcp,gcloud,google-cloud-nat,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-nat,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/pubsub/gcloud-pubsub-cmek-disabled.yaml b/cloud/gcp/pubsub/gcloud-pubsub-cmek-disabled.yaml index 6eda27a973b..21a2b5e1995 100644 --- a/cloud/gcp/pubsub/gcloud-pubsub-cmek-disabled.yaml +++ b/cloud/gcp/pubsub/gcloud-pubsub-cmek-disabled.yaml @@ -12,7 +12,7 @@ info: Configure your Pub/Sub topics to use Customer-Managed Encryption Keys (CMEKs) by specifying a Cloud KMS key during the topic creation or update process. reference: - https://cloud.google.com/pubsub/docs/encryption - tags: cloud,devops,gcp,gcloud,google-cloud-pubsub,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-pubsub,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/pubsub/gcloud-pubsub-crossproject-access.yaml b/cloud/gcp/pubsub/gcloud-pubsub-crossproject-access.yaml index 549e7a3deb2..34b6343baa4 100644 --- a/cloud/gcp/pubsub/gcloud-pubsub-crossproject-access.yaml +++ b/cloud/gcp/pubsub/gcloud-pubsub-crossproject-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://cloud.google.com/pubsub/docs/access-control - https://cloudone.trendmicro.com/docs/conformity - tags: cloud,devops,gcp,gcloud,google-cloud-pubsub,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-pubsub,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/pubsub/gcloud-pubsub-deadletter-disabled.yaml b/cloud/gcp/pubsub/gcloud-pubsub-deadletter-disabled.yaml index a7094998f0c..234826cd531 100644 --- a/cloud/gcp/pubsub/gcloud-pubsub-deadletter-disabled.yaml +++ b/cloud/gcp/pubsub/gcloud-pubsub-deadletter-disabled.yaml @@ -12,7 +12,7 @@ info: Configure a dead-letter topic for all Google Cloud Pub/Sub subscriptions to capture undeliverable messages. This ensures messages can be retained and addressed later. reference: - https://cloud.google.com/pubsub/docs/dead-letter-topics - tags: cloud,devops,gcp,gcloud,google-cloud-pubsub,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-pubsub,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/pubsub/gcloud-pubsub-publicly-accessible.yaml b/cloud/gcp/pubsub/gcloud-pubsub-publicly-accessible.yaml index c68c621ba79..a080779ab45 100644 --- a/cloud/gcp/pubsub/gcloud-pubsub-publicly-accessible.yaml +++ b/cloud/gcp/pubsub/gcloud-pubsub-publicly-accessible.yaml @@ -12,7 +12,7 @@ info: Remove "allUsers" and "allAuthenticatedUsers" from the IAM policy bindings of your Pub/Sub topics. This ensures only authorized identities have access to the topics. reference: - https://cloud.google.com/pubsub/docs/access-control - tags: cloud,devops,gcp,gcloud,google-cloud-pubsub,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-pubsub,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-allowed-apis.yaml b/cloud/gcp/resourcemanager/gcloud-org-allowed-apis.yaml index d36d6470d80..95776a53fe9 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-allowed-apis.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-allowed-apis.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/allowed-apis-and-services.html - https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - tags: cloud,devops,gcp,gcloud,resourcemanager,security,api,services,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,api,services,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-allowed-external-ips.yaml b/cloud/gcp/resourcemanager/gcloud-org-allowed-external-ips.yaml index 7e0ed4d25f2..edd214bfb3c 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-allowed-external-ips.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-allowed-external-ips.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/allowed-external-ips.html - https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,organization,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,organization,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-auto-iam-grants.yaml b/cloud/gcp/resourcemanager/gcloud-org-auto-iam-grants.yaml index 52555c1f53c..047b2ed5212 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-auto-iam-grants.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-auto-iam-grants.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/disable-automatic-role-grants.html - https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - tags: cloud,devops,gcp,gcloud,resourcemanager,security,iam,organization,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,iam,organization,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-default-network.yaml b/cloud/gcp/resourcemanager/gcloud-org-default-network.yaml index 883e17ab830..1096f8085eb 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-default-network.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-default-network.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/disable-default-network-creation.html - https://cloud.google.com/vpc/docs/vpc-network-overview - tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,vpc,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,vpc,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-detailed-audit-logging.yaml b/cloud/gcp/resourcemanager/gcloud-org-detailed-audit-logging.yaml index 977d0213d56..c5d67ce8e69 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-detailed-audit-logging.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-detailed-audit-logging.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/enable-detailed-audit-logging.html - https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - tags: cloud,devops,gcp,gcloud,resourcemanager,security,audit,logging,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,audit,logging,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-guest-attributes.yaml b/cloud/gcp/resourcemanager/gcloud-org-guest-attributes.yaml index 3467c26b759..4ce85d4f711 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-guest-attributes.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-guest-attributes.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/disable-using-guest-attributes.html - https://cloud.google.com/compute/docs/metadata/guest-attributes - tags: cloud,devops,gcp,gcloud,resourcemanager,security,compute,metadata,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,compute,metadata,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-ip-forwarding.yaml b/cloud/gcp/resourcemanager/gcloud-org-ip-forwarding.yaml index d3b2a9d02a2..d7e32f108b3 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-ip-forwarding.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-ip-forwarding.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/enable-ip-forwarding-restriction-policy.html - https://cloud.google.com/vpc/docs/using-instance-ip-forwarding - tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,ip-forwarding,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,ip-forwarding,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-load-balancer-types.yaml b/cloud/gcp/resourcemanager/gcloud-org-load-balancer-types.yaml index a62fdae5490..53c9e46db86 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-load-balancer-types.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-load-balancer-types.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/restrict-load-balancer-creation-based-on-type.html - https://cloud.google.com/load-balancing/docs/load-balancer-types - tags: cloud,devops,gcp,gcloud,resourcemanager,security,load-balancer,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,load-balancer,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-os-login.yaml b/cloud/gcp/resourcemanager/gcloud-org-os-login.yaml index 094a2ea43e7..4e5e8a0c8c9 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-os-login.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-os-login.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/enquire-os-login.html - https://cloud.google.com/compute/docs/oslogin - tags: cloud,devops,gcp,gcloud,resourcemanager,security,compute,ssh,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,compute,ssh,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-resource-locations.yaml b/cloud/gcp/resourcemanager/gcloud-org-resource-locations.yaml index 741cb674fb8..0f21eb2fc7a 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-resource-locations.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-resource-locations.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/resource-location-restriction.html - https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - tags: cloud,devops,gcp,gcloud,resourcemanager,security,compliance,location,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,compliance,location,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-service-account-creation.yaml b/cloud/gcp/resourcemanager/gcloud-org-service-account-creation.yaml index 49cb1d8ae16..b73c67275a4 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-service-account-creation.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-service-account-creation.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/prevent-service-account-creation.html - https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - tags: cloud,devops,gcp,gcloud,resourcemanager,security,iam,service-account,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,iam,service-account,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-service-account-key-creation.yaml b/cloud/gcp/resourcemanager/gcloud-org-service-account-key-creation.yaml index d87bf120bfa..12851f6fb66 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-service-account-key-creation.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-service-account-key-creation.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/disable-service-account-key-creation.html - https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - tags: cloud,devops,gcp,gcloud,resourcemanager,security,iam,service-account,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,iam,service-account,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-service-account-key-upload.yaml b/cloud/gcp/resourcemanager/gcloud-org-service-account-key-upload.yaml index c7a513de88c..1b1579a5704 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-service-account-key-upload.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-service-account-key-upload.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/disable-service-account-key-upload.html - https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - tags: cloud,devops,gcp,gcloud,resourcemanager,security,iam,service-account,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,iam,service-account,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-shared-vpc-subnets.yaml b/cloud/gcp/resourcemanager/gcloud-org-shared-vpc-subnets.yaml index fb7e720a384..8fc30dfef14 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-shared-vpc-subnets.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-shared-vpc-subnets.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/restrict-shared-vps-subnetworks.html - https://cloud.google.com/vpc/docs/shared-vpc - tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,vpc,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,vpc,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-sql-authorized-networks.yaml b/cloud/gcp/resourcemanager/gcloud-org-sql-authorized-networks.yaml index 1b4d9111629..ead44370f04 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-sql-authorized-networks.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-sql-authorized-networks.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/restrict-authorized-networks.html - https://cloud.google.com/sql/docs/mysql/authorize-networks - tags: cloud,devops,gcp,gcloud,resourcemanager,security,sql,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,sql,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-sql-default-encryption.yaml b/cloud/gcp/resourcemanager/gcloud-org-sql-default-encryption.yaml index b2988ccc01c..83da57b200d 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-sql-default-encryption.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-sql-default-encryption.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/restrict-default-encryption-for-sql-instances.html - https://cloud.google.com/sql/docs/mysql/customer-managed-encryption-keys - tags: cloud,devops,gcp,gcloud,resourcemanager,security,sql,encryption,cmk,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,sql,encryption,cmk,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-sql-public-ip.yaml b/cloud/gcp/resourcemanager/gcloud-org-sql-public-ip.yaml index 53819d3c282..46151bf6b43 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-sql-public-ip.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-sql-public-ip.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/restrict-public-ip-access-at-organization-level.html - https://cloud.google.com/sql/docs/mysql/configure-ip - tags: cloud,devops,gcp,gcloud,resourcemanager,security,sql,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,sql,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-trusted-images.yaml b/cloud/gcp/resourcemanager/gcloud-org-trusted-images.yaml index ddede5610e0..9916d65ad45 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-trusted-images.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-trusted-images.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/disk-image-restriction.html - https://cloud.google.com/compute/docs/images/restricting-image-access - tags: cloud,devops,gcp,gcloud,resourcemanager,security,compute,images,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,compute,images,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-uniform-bucket-access.yaml b/cloud/gcp/resourcemanager/gcloud-org-uniform-bucket-access.yaml index 922b39d143f..4c19e565f9c 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-uniform-bucket-access.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-uniform-bucket-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/enforce-uniform-bucket-level-access-constraint.html - https://cloud.google.com/storage/docs/uniform-bucket-level-access - tags: cloud,devops,gcp,gcloud,resourcemanager,security,storage,bucket,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,storage,bucket,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-vpc-peering.yaml b/cloud/gcp/resourcemanager/gcloud-org-vpc-peering.yaml index 013589e6a39..8d38dab29c2 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-vpc-peering.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-vpc-peering.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/restrict-vpc-peering-usage.html - https://cloud.google.com/vpc/docs/vpc-peering - tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,vpc,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,vpc,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-vpn-peer-ips.yaml b/cloud/gcp/resourcemanager/gcloud-org-vpn-peer-ips.yaml index 1e4cf6709ee..02d827c4da9 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-vpn-peer-ips.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-vpn-peer-ips.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/restrict-vpn-peer-ips.html - https://cloud.google.com/vpc/docs/using-vpn - tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,vpn,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,networking,vpn,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/resourcemanager/gcloud-org-workload-identity.yaml b/cloud/gcp/resourcemanager/gcloud-org-workload-identity.yaml index 74705f14e5d..49c9dff57d6 100644 --- a/cloud/gcp/resourcemanager/gcloud-org-workload-identity.yaml +++ b/cloud/gcp/resourcemanager/gcloud-org-workload-identity.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/ResourceManager/disable-workload-identity-cluster-creation.html - https://cloud.google.com/resource-manager/docs/organization-policy/org-policy-constraints - tags: cloud,devops,gcp,gcloud,resourcemanager,security,gke,kubernetes,workload-identity,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,resourcemanager,security,gke,kubernetes,workload-identity,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/run/gcloud-run-services-user-labels-missing.yaml b/cloud/gcp/run/gcloud-run-services-user-labels-missing.yaml index bd6b61a0484..889a625201d 100644 --- a/cloud/gcp/run/gcloud-run-services-user-labels-missing.yaml +++ b/cloud/gcp/run/gcloud-run-services-user-labels-missing.yaml @@ -12,7 +12,7 @@ info: Add user-defined labels to Cloud Run services to improve resource management. Ensure that the labels are meaningful and adhere to organizational standards for resource grouping. reference: - https://cloud.google.com/run/docs/configuring/labels - tags: cloud,devops,gcp,gcloud,google-cloud-run,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-run,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-mysql-local-infile-enabled.yaml b/cloud/gcp/sql/gcloud-mysql-local-infile-enabled.yaml index a25267ab80f..88ad4253a7c 100644 --- a/cloud/gcp/sql/gcloud-mysql-local-infile-enabled.yaml +++ b/cloud/gcp/sql/gcloud-mysql-local-infile-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the local_infile flag in your MySQL database instance configuration to enhance security and prevent potential misuse of the feature. reference: - https://cloud.google.com/sql/docs/mysql/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,mysql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,mysql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-mysql-pitr-disabled.yaml b/cloud/gcp/sql/gcloud-mysql-pitr-disabled.yaml index e709923cebb..29dfd1e1f2d 100644 --- a/cloud/gcp/sql/gcloud-mysql-pitr-disabled.yaml +++ b/cloud/gcp/sql/gcloud-mysql-pitr-disabled.yaml @@ -12,7 +12,7 @@ info: Enable binary logging and configure automated backups for your MySQL database instances to ensure that the PITR feature is enabled. reference: - https://cloud.google.com/sql/docs/mysql/backup-recovery/pitr - tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-mysql-slowquerylog-disabled.yaml b/cloud/gcp/sql/gcloud-mysql-slowquerylog-disabled.yaml index 248e697cf15..ba0dde23755 100644 --- a/cloud/gcp/sql/gcloud-mysql-slowquerylog-disabled.yaml +++ b/cloud/gcp/sql/gcloud-mysql-slowquerylog-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the "slow_query_log" flag for MySQL database instances in Google Cloud to log and analyze slow SQL queries, improving database performance and query efficiency. reference: - https://cloud.google.com/sql/docs/mysql/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-pg-log-error-verbosity-flag-not-configured.yaml b/cloud/gcp/sql/gcloud-pg-log-error-verbosity-flag-not-configured.yaml index 838d8cb58d5..2051ec4a8dc 100644 --- a/cloud/gcp/sql/gcloud-pg-log-error-verbosity-flag-not-configured.yaml +++ b/cloud/gcp/sql/gcloud-pg-log-error-verbosity-flag-not-configured.yaml @@ -12,7 +12,7 @@ info: Set the "log_error_verbosity" flag to DEFAULT or a stricter value (e.g., TERSE) to balance logging detail and performance, as per your organization's logging policy. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-pg-log-executor-stats-enabled.yaml b/cloud/gcp/sql/gcloud-pg-log-executor-stats-enabled.yaml index 03b359c534a..c4b4f19cec2 100644 --- a/cloud/gcp/sql/gcloud-pg-log-executor-stats-enabled.yaml +++ b/cloud/gcp/sql/gcloud-pg-log-executor-stats-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the log_executor_stats flag in your PostgreSQL database instance configuration to prevent performance issues caused by excessive logging. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-pg-log-min-duration-statement-enabled.yaml b/cloud/gcp/sql/gcloud-pg-log-min-duration-statement-enabled.yaml index 3edafa45e56..4059c904763 100644 --- a/cloud/gcp/sql/gcloud-pg-log-min-duration-statement-enabled.yaml +++ b/cloud/gcp/sql/gcloud-pg-log-min-duration-statement-enabled.yaml @@ -12,7 +12,7 @@ info: Set the log_min_duration_statement flag to -1 in your PostgreSQL database instance configuration to disable logging based on statement duration. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-pg-log-min-error-statement-flag-not-configured.yaml b/cloud/gcp/sql/gcloud-pg-log-min-error-statement-flag-not-configured.yaml index bb1bd182d45..40b06900ce3 100644 --- a/cloud/gcp/sql/gcloud-pg-log-min-error-statement-flag-not-configured.yaml +++ b/cloud/gcp/sql/gcloud-pg-log-min-error-statement-flag-not-configured.yaml @@ -12,7 +12,7 @@ info: Set the "log_min_error_statement" flag to the appropriate severity level (e.g., FATAL) as per your organization's logging policy to balance logging effectiveness and performance. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-pg-log-min-messages-flag-not-configured.yaml b/cloud/gcp/sql/gcloud-pg-log-min-messages-flag-not-configured.yaml index d49295417e3..f214a0ed87c 100644 --- a/cloud/gcp/sql/gcloud-pg-log-min-messages-flag-not-configured.yaml +++ b/cloud/gcp/sql/gcloud-pg-log-min-messages-flag-not-configured.yaml @@ -12,7 +12,7 @@ info: Set the "log_min_messages" flag to the appropriate severity level (e.g., ERROR) as per your organization's logging policy to balance logging effectiveness and performance. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-pg-log-parser-stats-enabled.yaml b/cloud/gcp/sql/gcloud-pg-log-parser-stats-enabled.yaml index d389ca820ed..dee3ca9f911 100644 --- a/cloud/gcp/sql/gcloud-pg-log-parser-stats-enabled.yaml +++ b/cloud/gcp/sql/gcloud-pg-log-parser-stats-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the "log_parser_stats" flag in your PostgreSQL database instance configuration to prevent performance issues caused by excessive logging. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-pg-log-planner-stats-enabled.yaml b/cloud/gcp/sql/gcloud-pg-log-planner-stats-enabled.yaml index 02001b2f745..b4a1640bb0f 100644 --- a/cloud/gcp/sql/gcloud-pg-log-planner-stats-enabled.yaml +++ b/cloud/gcp/sql/gcloud-pg-log-planner-stats-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the log_planner_stats flag in your PostgreSQL database instance configuration to prevent performance issues caused by excessive logging. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-pg-log-statement-flag-not-configured.yaml b/cloud/gcp/sql/gcloud-pg-log-statement-flag-not-configured.yaml index 810a9f79468..d4702e50c06 100644 --- a/cloud/gcp/sql/gcloud-pg-log-statement-flag-not-configured.yaml +++ b/cloud/gcp/sql/gcloud-pg-log-statement-flag-not-configured.yaml @@ -12,7 +12,7 @@ info: Set the "log_statement" flag to the appropriate value (e.g., mod) based on your organization's logging policy to balance performance and logging requirements. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-pg-log-statement-stats-enabled.yaml b/cloud/gcp/sql/gcloud-pg-log-statement-stats-enabled.yaml index f2df6a9f5da..ef9270b2344 100644 --- a/cloud/gcp/sql/gcloud-pg-log-statement-stats-enabled.yaml +++ b/cloud/gcp/sql/gcloud-pg-log-statement-stats-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the "log_statement_stats" flag in your PostgreSQL database instance configuration to prevent performance issues caused by excessive logging. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-postgresql-log-checkpoints-disabled.yaml b/cloud/gcp/sql/gcloud-postgresql-log-checkpoints-disabled.yaml index f21f670a7d8..7c2c2dff557 100644 --- a/cloud/gcp/sql/gcloud-postgresql-log-checkpoints-disabled.yaml +++ b/cloud/gcp/sql/gcloud-postgresql-log-checkpoints-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the "log_checkpoints" flag for all PostgreSQL database instances by updating the database configuration using the Google Cloud Console or gcloud CLI. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-postgresql-log-disconnections-unenabled.yaml b/cloud/gcp/sql/gcloud-postgresql-log-disconnections-unenabled.yaml index 5255bd9c367..282ad1f57b7 100644 --- a/cloud/gcp/sql/gcloud-postgresql-log-disconnections-unenabled.yaml +++ b/cloud/gcp/sql/gcloud-postgresql-log-disconnections-unenabled.yaml @@ -12,7 +12,7 @@ info: Enable the "log_disconnections" flag for all Google Cloud PostgreSQL database instances by updating the database flag in the configuration settings. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-postgresql-log-hostname-disabled.yaml b/cloud/gcp/sql/gcloud-postgresql-log-hostname-disabled.yaml index 8780b509bee..294ada20681 100644 --- a/cloud/gcp/sql/gcloud-postgresql-log-hostname-disabled.yaml +++ b/cloud/gcp/sql/gcloud-postgresql-log-hostname-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the "log_hostname" database flag for all PostgreSQL database instances in your Google Cloud environment to ensure proper logging and traceability. reference: - https://cloud.google.com/sql/docs/postgres/configure-instance-settings - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-postgresql-logtempfiles-disabled.yaml b/cloud/gcp/sql/gcloud-postgresql-logtempfiles-disabled.yaml index 4480bafd3ae..2f00ccf35e2 100644 --- a/cloud/gcp/sql/gcloud-postgresql-logtempfiles-disabled.yaml +++ b/cloud/gcp/sql/gcloud-postgresql-logtempfiles-disabled.yaml @@ -12,7 +12,7 @@ info: Set the "log_temp_files" database flag to 0 for your PostgreSQL database instances to ensure temporary file operations are logged. reference: - https://cloud.google.com/sql/docs/postgres/configure-database-flags - tags: cloud,devops,gcp,google-cloud-sql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,google-cloud-sql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-auto-storage-disabled.yaml b/cloud/gcp/sql/gcloud-sql-auto-storage-disabled.yaml index ea1dedd90f4..3d4cc62c474 100644 --- a/cloud/gcp/sql/gcloud-sql-auto-storage-disabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-auto-storage-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the Automatic Storage Increase feature for your Google Cloud SQL database instances to prevent storage exhaustion and ensure uninterrupted operations. reference: - https://cloud.google.com/sql/docs/overview#automatic-storage-increase - tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-auto-storage-limit-not-configured.yaml b/cloud/gcp/sql/gcloud-sql-auto-storage-limit-not-configured.yaml index 45bb8f1ef62..689602e68f8 100644 --- a/cloud/gcp/sql/gcloud-sql-auto-storage-limit-not-configured.yaml +++ b/cloud/gcp/sql/gcloud-sql-auto-storage-limit-not-configured.yaml @@ -12,7 +12,7 @@ info: Configure an appropriate limit for the Automatic Storage Increase feature in your Cloud SQL database instance settings to control costs and maintain predictability. reference: - https://cloud.google.com/sql/docs/configure-storage - tags: cloud,devops,gcp,gcloud,google-cloud-sql,storage,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,storage,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-backups-disabled.yaml b/cloud/gcp/sql/gcloud-sql-backups-disabled.yaml index ac0b7222388..216e6828b64 100644 --- a/cloud/gcp/sql/gcloud-sql-backups-disabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-backups-disabled.yaml @@ -12,7 +12,7 @@ info: Enable automated backups for all Cloud SQL database instances in your GCP account to ensure regular backups are taken to safeguard against data issues. reference: - https://cloud.google.com/sql/docs/mysql/backup-recovery/backups - tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-cmk-not-enabled.yaml b/cloud/gcp/sql/gcloud-sql-cmk-not-enabled.yaml index b44763b989f..f8acaf8bd2c 100644 --- a/cloud/gcp/sql/gcloud-sql-cmk-not-enabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-cmk-not-enabled.yaml @@ -12,7 +12,7 @@ info: Configure Cloud SQL instances to use Customer-Managed Keys (CMKs) for encryption by enabling encryption with Cloud KMS and specifying a key for each database instance. reference: - https://cloud.google.com/sql/docs/mysql/configure-cmek - tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-contained-db-authentication-enabled.yaml b/cloud/gcp/sql/gcloud-sql-contained-db-authentication-enabled.yaml index 190b34c897e..d70000c404a 100644 --- a/cloud/gcp/sql/gcloud-sql-contained-db-authentication-enabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-contained-db-authentication-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the "contained database authentication" flag in your SQL Server database instance configuration to enhance security and enforce centralized authentication. reference: - https://cloud.google.com/sql/docs/sqlserver/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-cross-db-ownership-chaining-enabled.yaml b/cloud/gcp/sql/gcloud-sql-cross-db-ownership-chaining-enabled.yaml index 1f6c5f78441..f909fb0e01a 100644 --- a/cloud/gcp/sql/gcloud-sql-cross-db-ownership-chaining-enabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-cross-db-ownership-chaining-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the "cross db ownership chaining" flag in your SQL Server database instance configuration to prevent unauthorized cross-database access. reference: - https://cloud.google.com/sql/docs/sqlserver/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-database-public-ip-configured.yaml b/cloud/gcp/sql/gcloud-sql-database-public-ip-configured.yaml index 3364b49ec22..89f086da160 100644 --- a/cloud/gcp/sql/gcloud-sql-database-public-ip-configured.yaml +++ b/cloud/gcp/sql/gcloud-sql-database-public-ip-configured.yaml @@ -12,7 +12,7 @@ info: Configure your Cloud SQL database instances to use private IP addresses to limit exposure to external networks and enhance security. reference: - https://cloud.google.com/sql/docs/mysql/configure-private-ip - tags: cloud,devops,gcp,gcloud,google-cloud-sql,networking,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,networking,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-external-scripts-enabled.yaml b/cloud/gcp/sql/gcloud-sql-external-scripts-enabled.yaml index 5aeaa3a3a32..5794ec12832 100644 --- a/cloud/gcp/sql/gcloud-sql-external-scripts-enabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-external-scripts-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the external scripts enabled flag in your SQL Server database instance configuration to enhance security and prevent potential misuse of the feature. reference: - https://cloud.google.com/sql/docs/sqlserver/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-ha-not-enabled.yaml b/cloud/gcp/sql/gcloud-sql-ha-not-enabled.yaml index a1a36577823..f2e25a9a1de 100644 --- a/cloud/gcp/sql/gcloud-sql-ha-not-enabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-ha-not-enabled.yaml @@ -12,7 +12,7 @@ info: Update the configuration of your Google Cloud SQL database instances to use High Availability (REGIONAL) instead of the default ZONAL configuration to enable automatic failover and ensure minimal downtime. reference: - https://cloud.google.com/sql/docs/mysql/high-availability - tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-log-checkpoints-disabled.yaml b/cloud/gcp/sql/gcloud-sql-log-checkpoints-disabled.yaml index 8a37b4bda8b..7042f4e5310 100644 --- a/cloud/gcp/sql/gcloud-sql-log-checkpoints-disabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-log-checkpoints-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the "log_checkpoints" flag for PostgreSQL database instances to ensure logging of checkpoints and restart points for better observability. reference: - https://cloud.google.com/sql/docs/postgres/configure-instance-settings - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-log-connections-disabled.yaml b/cloud/gcp/sql/gcloud-sql-log-connections-disabled.yaml index 14a46ae104f..e20bad54442 100644 --- a/cloud/gcp/sql/gcloud-sql-log-connections-disabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-log-connections-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the "log_connections" database flag for your PostgreSQL instances in Google Cloud. This can be done by updating the instance settings and applying the change. reference: - https://cloud.google.com/sql/docs/postgres/configure-database-flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-log-lock-waits-disabled.yaml b/cloud/gcp/sql/gcloud-sql-log-lock-waits-disabled.yaml index 4aa9db75af7..022f0e8b829 100644 --- a/cloud/gcp/sql/gcloud-sql-log-lock-waits-disabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-log-lock-waits-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the "log_lock_waits" database flag for all PostgreSQL database instances in your Google Cloud environment. This ensures better monitoring and identification of lock wait issues. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgreSQL,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgreSQL,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-pgaudit-not-enabled.yaml b/cloud/gcp/sql/gcloud-sql-pgaudit-not-enabled.yaml index 87962bffb40..3da36d4295d 100644 --- a/cloud/gcp/sql/gcloud-sql-pgaudit-not-enabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-pgaudit-not-enabled.yaml @@ -12,7 +12,7 @@ info: Configure your PostgreSQL instances with the "cloudsql.enable_pgaudit" flag set to "on" and the "pgaudit.log" flag set to "all". These settings enable enhanced auditing capabilities. reference: - https://cloud.google.com/sql/docs/postgres/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-publicly-accessible-instances.yaml b/cloud/gcp/sql/gcloud-sql-publicly-accessible-instances.yaml index 7e6fff44444..87384910e7b 100644 --- a/cloud/gcp/sql/gcloud-sql-publicly-accessible-instances.yaml +++ b/cloud/gcp/sql/gcloud-sql-publicly-accessible-instances.yaml @@ -12,7 +12,7 @@ info: Configure your Cloud SQL database instances to accept connections only from trusted IP addresses and networks by limiting access to known authorized networks. reference: - https://cloud.google.com/sql/docs/mysql/configure-ip - tags: cloud,devops,gcp,gcloud,google-cloud-sql,networking,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,networking,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-remote-access-enabled.yaml b/cloud/gcp/sql/gcloud-sql-remote-access-enabled.yaml index 5d615fee22a..6fb62be16fc 100644 --- a/cloud/gcp/sql/gcloud-sql-remote-access-enabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-remote-access-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the "remote access" database flag for all SQL Server database instances in Google Cloud Platform. Update the database configuration settings to ensure the flag is turned off. reference: - https://cloud.google.com/sql/docs/sqlserver/configure-instance-settings - tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-skip-show-database-disabled.yaml b/cloud/gcp/sql/gcloud-sql-skip-show-database-disabled.yaml index 0e0cef78865..b8a49d9d6cf 100644 --- a/cloud/gcp/sql/gcloud-sql-skip-show-database-disabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-skip-show-database-disabled.yaml @@ -12,7 +12,7 @@ info: Enable the "skip_show_database" flag for MySQL database instances in Google Cloud. This can be configured in the database settings under the databaseFlags section or through the gcloud CLI. reference: - https://cloud.google.com/sql/docs/mysql/configure-database-flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,mysql-database,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,mysql-database,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-ssl-not-enforced.yaml b/cloud/gcp/sql/gcloud-sql-ssl-not-enforced.yaml index e950df26b68..b748d560f8b 100644 --- a/cloud/gcp/sql/gcloud-sql-ssl-not-enforced.yaml +++ b/cloud/gcp/sql/gcloud-sql-ssl-not-enforced.yaml @@ -12,7 +12,7 @@ info: Enable SSL/TLS for all incoming connections to your Cloud SQL instances. Update the SSL_MODE configuration to allow only encrypted connections. reference: - https://cloud.google.com/sql/docs/mysql/configure-ssl-instance - tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-ssl-tls-connections-not-enforced.yaml b/cloud/gcp/sql/gcloud-sql-ssl-tls-connections-not-enforced.yaml index c29ed0dd915..b76e8006512 100644 --- a/cloud/gcp/sql/gcloud-sql-ssl-tls-connections-not-enforced.yaml +++ b/cloud/gcp/sql/gcloud-sql-ssl-tls-connections-not-enforced.yaml @@ -12,7 +12,7 @@ info: Set the SSL enforcement mode to "ENCRYPTED_ONLY" for all Cloud SQL database instances to ensure all incoming connections use SSL/TLS encryption. reference: - https://cloud.google.com/sql/docs/mysql/configure-ssl - tags: cloud,devops,gcp,gcloud,google-cloud-sql,networking,security,ssl,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,networking,security,ssl,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-trace-3625-enabled.yaml b/cloud/gcp/sql/gcloud-sql-trace-3625-enabled.yaml index 827f9b45320..c2049288852 100644 --- a/cloud/gcp/sql/gcloud-sql-trace-3625-enabled.yaml +++ b/cloud/gcp/sql/gcloud-sql-trace-3625-enabled.yaml @@ -12,7 +12,7 @@ info: Disable the 3625 trace flag in your SQL Server database instance configuration to enhance security and protect sensitive information. reference: - https://cloud.google.com/sql/docs/sqlserver/flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/sql/gcloud-sql-user-options.yaml b/cloud/gcp/sql/gcloud-sql-user-options.yaml index b1041026a05..444dd562631 100644 --- a/cloud/gcp/sql/gcloud-sql-user-options.yaml +++ b/cloud/gcp/sql/gcloud-sql-user-options.yaml @@ -12,7 +12,7 @@ info: Disable the "user options" database flag for your Google Cloud SQL Server instances to avoid global defaults for all database users. reference: - https://cloud.google.com/sql/docs/sqlserver/configure-database-flags - tags: cloud,devops,gcp,gcloud,google-cloud-sql,sql-database-flags,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-sql,sql-database-flags,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-bucket-lock-not-configured.yaml b/cloud/gcp/storage/gcloud-bucket-lock-not-configured.yaml index 4d4badeabe2..d2d0725b00b 100644 --- a/cloud/gcp/storage/gcloud-bucket-lock-not-configured.yaml +++ b/cloud/gcp/storage/gcloud-bucket-lock-not-configured.yaml @@ -12,7 +12,7 @@ info: Enable Bucket Lock on your Google Cloud log sink buckets to enforce retention policies and prevent changes to the data retention duration. reference: - https://cloud.google.com/storage/docs/bucket-lock - tags: cloud,devops,gcp,gcloud,google-cloud-logging,retention,bucket-lock,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-logging,retention,bucket-lock,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-bucket-policies-admin-permissions.yaml b/cloud/gcp/storage/gcloud-bucket-policies-admin-permissions.yaml index 0b8781e0f67..e6f6fac3314 100644 --- a/cloud/gcp/storage/gcloud-bucket-policies-admin-permissions.yaml +++ b/cloud/gcp/storage/gcloud-bucket-policies-admin-permissions.yaml @@ -12,7 +12,7 @@ info: Review and update IAM policies for your Google Cloud Storage buckets to remove roles such as roles/owner, roles/editor, or any roles containing "Admin" to adhere to the Principle of Least Privilege. reference: - https://cloud.google.com/storage/docs/access-control/iam - tags: cloud,devops,gcp,gcloud,google-cloud-storage,iam,security,polp,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,iam,security,polp,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-bucket-website-config-not-defined.yaml b/cloud/gcp/storage/gcloud-bucket-website-config-not-defined.yaml index aa4f3049f89..936e104a758 100644 --- a/cloud/gcp/storage/gcloud-bucket-website-config-not-defined.yaml +++ b/cloud/gcp/storage/gcloud-bucket-website-config-not-defined.yaml @@ -12,7 +12,7 @@ info: Define an index page suffix (e.g., index.html) and an error page (e.g., 404.html) in the static website configuration for your Cloud Storage buckets. reference: - https://cloud.google.com/storage/docs/hosting-static-website - tags: cloud,devops,gcp,gcloud,google-cloud-storage,website-config,static-website,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,website-config,static-website,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-data-access-audit-logs-not-enabled.yaml b/cloud/gcp/storage/gcloud-data-access-audit-logs-not-enabled.yaml index a464bb32f15..47bc22b6ea4 100644 --- a/cloud/gcp/storage/gcloud-data-access-audit-logs-not-enabled.yaml +++ b/cloud/gcp/storage/gcloud-data-access-audit-logs-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable Data Access audit logs for the "storage.googleapis.com" service in your project to monitor all read, write, and admin activities on Cloud Storage resources. reference: - https://cloud.google.com/logging/docs/audit - tags: cloud,devops,gcp,gcloud,google-cloud-storage,audit-logs,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,audit-logs,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-insufficient-data-retention-period.yaml b/cloud/gcp/storage/gcloud-insufficient-data-retention-period.yaml index 517df30f1c2..f32ddb51e1c 100644 --- a/cloud/gcp/storage/gcloud-insufficient-data-retention-period.yaml +++ b/cloud/gcp/storage/gcloud-insufficient-data-retention-period.yaml @@ -12,7 +12,7 @@ info: Configure a sufficient data retention period for your Google Cloud Storage buckets based on your organization's security and compliance policies. reference: - https://cloud.google.com/storage/docs/bucket-lock - tags: cloud,devops,gcp,gcloud,google-cloud-storage,retention,security,compliance,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,retention,security,compliance,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-lifecycle-management-not-enabled.yaml b/cloud/gcp/storage/gcloud-lifecycle-management-not-enabled.yaml index cea0aed9978..647cc8bde8f 100644 --- a/cloud/gcp/storage/gcloud-lifecycle-management-not-enabled.yaml +++ b/cloud/gcp/storage/gcloud-lifecycle-management-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable lifecycle management rules for your Cloud Storage buckets to automate actions like deleting or downgrading storage class of objects based on conditions. reference: - https://cloud.google.com/storage/docs/lifecycle - tags: cloud,devops,gcp,gcloud,google-cloud-storage,lifecycle-management,cost-optimization,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,lifecycle-management,cost-optimization,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-object-encryption-cmk-not-enabled.yaml b/cloud/gcp/storage/gcloud-object-encryption-cmk-not-enabled.yaml index 8e234a985e2..0ed40aecfd5 100644 --- a/cloud/gcp/storage/gcloud-object-encryption-cmk-not-enabled.yaml +++ b/cloud/gcp/storage/gcloud-object-encryption-cmk-not-enabled.yaml @@ -12,7 +12,7 @@ info: Configure your Cloud Storage buckets to use Customer-Managed Keys (CMKs) for encryption to enhance data security and comply with organizational policies. reference: - https://cloud.google.com/storage/docs/encryption/customer-managed-keys - tags: cloud,devops,gcp,gcloud,google-cloud-storage,encryption,cmk,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,encryption,cmk,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-object-versioning-not-enabled.yaml b/cloud/gcp/storage/gcloud-object-versioning-not-enabled.yaml index e3ba70b205b..e5bdda141a9 100644 --- a/cloud/gcp/storage/gcloud-object-versioning-not-enabled.yaml +++ b/cloud/gcp/storage/gcloud-object-versioning-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable object versioning for your Cloud Storage buckets to preserve object versions and allow for data recovery. reference: - https://cloud.google.com/storage/docs/object-versioning - tags: cloud,devops,gcp,gcloud,google-cloud-storage,object-versioning,backup,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,object-versioning,backup,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-public-access-prevention-not-enabled.yaml b/cloud/gcp/storage/gcloud-public-access-prevention-not-enabled.yaml index 3b4fcba08c4..784070129e3 100644 --- a/cloud/gcp/storage/gcloud-public-access-prevention-not-enabled.yaml +++ b/cloud/gcp/storage/gcloud-public-access-prevention-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable the Public Access Prevention feature for your Cloud Storage buckets to restrict public access and secure your data. reference: - https://cloud.google.com/storage/docs/public-access-prevention - tags: cloud,devops,gcp,gcloud,google-cloud-storage,security,public-access-prevention,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,security,public-access-prevention,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-publicly-accessible-storage-buckets.yaml b/cloud/gcp/storage/gcloud-publicly-accessible-storage-buckets.yaml index 381284adf91..2faf8cc750d 100644 --- a/cloud/gcp/storage/gcloud-publicly-accessible-storage-buckets.yaml +++ b/cloud/gcp/storage/gcloud-publicly-accessible-storage-buckets.yaml @@ -12,7 +12,7 @@ info: Update the IAM policy of your Google Cloud Storage buckets to remove bindings for "allUsers" and "allAuthenticatedUsers" members, restricting access to authorized users only. reference: - https://cloud.google.com/storage/docs/access-control/iam - tags: cloud,devops,gcp,gcloud,google-cloud-storage,iam,security,public-access,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,iam,security,public-access,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-secure-cors-configuration.yaml b/cloud/gcp/storage/gcloud-secure-cors-configuration.yaml index cf5b5038147..036e630160d 100644 --- a/cloud/gcp/storage/gcloud-secure-cors-configuration.yaml +++ b/cloud/gcp/storage/gcloud-secure-cors-configuration.yaml @@ -12,7 +12,7 @@ info: Update the CORS configuration for your Cloud Storage buckets to only allow trusted origins defined by your organization’s policy. reference: - https://cloud.google.com/storage/docs/configuring-cors - tags: cloud,devops,gcp,gcloud,google-cloud-storage,cors,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,cors,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-storage-logs-not-enabled.yaml b/cloud/gcp/storage/gcloud-storage-logs-not-enabled.yaml index 058dd204b32..6bf8234d0c5 100644 --- a/cloud/gcp/storage/gcloud-storage-logs-not-enabled.yaml +++ b/cloud/gcp/storage/gcloud-storage-logs-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable usage and storage logs for your Google Cloud Storage buckets to gain visibility into bucket activity and ensure audit compliance. reference: - https://cloud.google.com/storage/docs/access-logs - tags: cloud,devops,gcp,gcloud,google-cloud-storage,logging,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,logging,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-uniform-bucket-level-access-not-enabled.yaml b/cloud/gcp/storage/gcloud-uniform-bucket-level-access-not-enabled.yaml index b22b7842baa..80739994ccd 100644 --- a/cloud/gcp/storage/gcloud-uniform-bucket-level-access-not-enabled.yaml +++ b/cloud/gcp/storage/gcloud-uniform-bucket-level-access-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable uniform bucket-level access for your Google Cloud Storage buckets to manage permissions uniformly and improve security. reference: - https://cloud.google.com/storage/docs/uniform-bucket-level-access - tags: cloud,devops,gcp,gcloud,google-cloud-storage,security,access-control,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,security,access-control,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/storage/gcloud-vpc-service-controls-not-configured.yaml b/cloud/gcp/storage/gcloud-vpc-service-controls-not-configured.yaml index 41beb5ac407..a1c8c8b3545 100644 --- a/cloud/gcp/storage/gcloud-vpc-service-controls-not-configured.yaml +++ b/cloud/gcp/storage/gcloud-vpc-service-controls-not-configured.yaml @@ -12,7 +12,7 @@ info: Configure VPC Service Controls with a security perimeter that includes the Cloud Storage service (storage.googleapis.com) to protect your sensitive data. reference: - https://cloud.google.com/vpc-service-controls/docs/overview - tags: cloud,devops,gcp,gcloud,google-cloud-storage,vpc-service-controls,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-storage,vpc-service-controls,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vertexai/gcloud-vertexai-auto-upgrades.yaml b/cloud/gcp/vertexai/gcloud-vertexai-auto-upgrades.yaml index 69f9597c216..a4ccdf9fbf0 100644 --- a/cloud/gcp/vertexai/gcloud-vertexai-auto-upgrades.yaml +++ b/cloud/gcp/vertexai/gcloud-vertexai-auto-upgrades.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VertexAI/enable-auto-upgrades.html - https://cloud.google.com/vertex-ai/docs/workbench/user-managed/manage-instance - tags: cloud,devops,gcp,gcloud,vertexai,security,upgrades,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vertexai,security,upgrades,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vertexai/gcloud-vertexai-default-vpc.yaml b/cloud/gcp/vertexai/gcloud-vertexai-default-vpc.yaml index f78cbceddee..84a5dac8e90 100644 --- a/cloud/gcp/vertexai/gcloud-vertexai-default-vpc.yaml +++ b/cloud/gcp/vertexai/gcloud-vertexai-default-vpc.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VertexAI/default-vpc-in-use.html - https://cloud.google.com/vertex-ai/docs/workbench/user-managed/create-instance - tags: cloud,devops,gcp,gcloud,vertexai,networking,security,vpc,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vertexai,networking,security,vpc,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vertexai/gcloud-vertexai-external-ip.yaml b/cloud/gcp/vertexai/gcloud-vertexai-external-ip.yaml index 100cae437b7..82a3be87f0a 100644 --- a/cloud/gcp/vertexai/gcloud-vertexai-external-ip.yaml +++ b/cloud/gcp/vertexai/gcloud-vertexai-external-ip.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VertexAI/prevent-external-ip-usage.html - https://cloud.google.com/vertex-ai/docs/workbench/user-managed/manage-instance - tags: cloud,devops,gcp,gcloud,vertexai,security,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vertexai,security,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vertexai/gcloud-vertexai-idle-shutdown.yaml b/cloud/gcp/vertexai/gcloud-vertexai-idle-shutdown.yaml index 4d8a0c2eba9..0f7ee303313 100644 --- a/cloud/gcp/vertexai/gcloud-vertexai-idle-shutdown.yaml +++ b/cloud/gcp/vertexai/gcloud-vertexai-idle-shutdown.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VertexAI/enable-idle-shutdown.html - https://cloud.google.com/vertex-ai/docs/workbench/user-managed/manage-instance - tags: cloud,devops,gcp,gcloud,vertexai,cost-optimization,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vertexai,cost-optimization,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vertexai/gcloud-vertexai-integrity.yaml b/cloud/gcp/vertexai/gcloud-vertexai-integrity.yaml index 16e615775b1..3954b599003 100644 --- a/cloud/gcp/vertexai/gcloud-vertexai-integrity.yaml +++ b/cloud/gcp/vertexai/gcloud-vertexai-integrity.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VertexAI/enable-integrity-monitoring.html - https://cloud.google.com/vertex-ai/docs/workbench/user-managed/manage-instance - tags: cloud,devops,gcp,gcloud,vertexai,security,integrity,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vertexai,security,integrity,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vertexai/gcloud-vertexai-monitoring.yaml b/cloud/gcp/vertexai/gcloud-vertexai-monitoring.yaml index c7efd76cb1a..516c446c5b3 100644 --- a/cloud/gcp/vertexai/gcloud-vertexai-monitoring.yaml +++ b/cloud/gcp/vertexai/gcloud-vertexai-monitoring.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VertexAI/enable-cloud-monitoring.html - https://cloud.google.com/vertex-ai/docs/workbench/user-managed/manage-instance - tags: cloud,devops,gcp,gcloud,vertexai,security,monitoring,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vertexai,security,monitoring,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vertexai/gcloud-vertexai-root-access.yaml b/cloud/gcp/vertexai/gcloud-vertexai-root-access.yaml index df0a13b1cbc..3719a26a3d8 100644 --- a/cloud/gcp/vertexai/gcloud-vertexai-root-access.yaml +++ b/cloud/gcp/vertexai/gcloud-vertexai-root-access.yaml @@ -13,7 +13,7 @@ info: reference: - https://trendmicro.com/cloudoneconformity/knowledge-base/gcp/VertexAI/disable-root-access.html - https://cloud.google.com/vertex-ai/docs/workbench/user-managed/manage-instance - tags: cloud,devops,gcp,gcloud,vertexai,security,root-access,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vertexai,security,root-access,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vertexai/gcloud-vertexai-secure-boot.yaml b/cloud/gcp/vertexai/gcloud-vertexai-secure-boot.yaml index edcd20f652d..1ed7daabe53 100644 --- a/cloud/gcp/vertexai/gcloud-vertexai-secure-boot.yaml +++ b/cloud/gcp/vertexai/gcloud-vertexai-secure-boot.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VertexAI/enable-secure-boot.html - https://cloud.google.com/vertex-ai/docs/workbench/user-managed/manage-instance - tags: cloud,devops,gcp,gcloud,vertexai,security,secure-boot,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vertexai,security,secure-boot,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vertexai/gcloud-vertexai-vtpm.yaml b/cloud/gcp/vertexai/gcloud-vertexai-vtpm.yaml index 6af6132901e..1c882c3f006 100644 --- a/cloud/gcp/vertexai/gcloud-vertexai-vtpm.yaml +++ b/cloud/gcp/vertexai/gcloud-vertexai-vtpm.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VertexAI/enable-vtpm.html - https://cloud.google.com/vertex-ai/docs/workbench/user-managed/manage-instance - tags: cloud,devops,gcp,gcloud,vertexai,security,vtpm,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vertexai,security,vtpm,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-check-legacy-networks.yaml b/cloud/gcp/vpc/gcloud-check-legacy-networks.yaml index b6801e223f8..1a7836b8f9d 100644 --- a/cloud/gcp/vpc/gcloud-check-legacy-networks.yaml +++ b/cloud/gcp/vpc/gcloud-check-legacy-networks.yaml @@ -12,7 +12,7 @@ info: Migrate your GCP project from legacy networks to Virtual Private Cloud (VPC) networks to utilize the latest networking capabilities. reference: - https://cloud.google.com/vpc/docs/vpc - tags: cloud,devops,gcp,gcloud,vpc,networking,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,networking,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-default-vpc-in-use.yaml b/cloud/gcp/vpc/gcloud-default-vpc-in-use.yaml index a5b10b4ace4..49e8b570d6f 100644 --- a/cloud/gcp/vpc/gcloud-default-vpc-in-use.yaml +++ b/cloud/gcp/vpc/gcloud-default-vpc-in-use.yaml @@ -12,7 +12,7 @@ info: Delete the default VPC network and create custom VPC networks with tailored configurations to meet your organization's security and networking requirements. reference: - https://cloud.google.com/vpc/docs/vpc - tags: cloud,devops,gcp,gcloud,google-cloud-vpc,networking,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-vpc,networking,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-dns-logging-not-enabled.yaml b/cloud/gcp/vpc/gcloud-dns-logging-not-enabled.yaml index 8b90997ddc0..6c8d39e3299 100644 --- a/cloud/gcp/vpc/gcloud-dns-logging-not-enabled.yaml +++ b/cloud/gcp/vpc/gcloud-dns-logging-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable Cloud DNS logging for your VPC networks to monitor and analyze DNS query activity for better security and compliance. reference: - https://cloud.google.com/dns/docs/policies - tags: cloud,devops,gcp,gcloud,google-cloud-dns,logging,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-dns,logging,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-enable-vpc-flow-logs.yaml b/cloud/gcp/vpc/gcloud-enable-vpc-flow-logs.yaml index c3a99cbb5f1..2e5445dd737 100644 --- a/cloud/gcp/vpc/gcloud-enable-vpc-flow-logs.yaml +++ b/cloud/gcp/vpc/gcloud-enable-vpc-flow-logs.yaml @@ -12,7 +12,7 @@ info: Enable VPC Flow Logs for your VPC subnets to gain insights into network traffic and support network security, compliance, and operational monitoring. reference: - https://cloud.google.com/vpc/docs/using-flow-logs - tags: cloud,devops,gcp,gcloud,google-cloud-vpc,flow-logs,networking,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-vpc,flow-logs,networking,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-exclude-metadata-from-firewall-logging.yaml b/cloud/gcp/vpc/gcloud-exclude-metadata-from-firewall-logging.yaml index 30b2daaa22f..1703b9ce1fb 100644 --- a/cloud/gcp/vpc/gcloud-exclude-metadata-from-firewall-logging.yaml +++ b/cloud/gcp/vpc/gcloud-exclude-metadata-from-firewall-logging.yaml @@ -12,7 +12,7 @@ info: Update the VPC firewall logging configuration to exclude metadata from the logs and reduce storage costs while maintaining logging efficiency. reference: - https://cloud.google.com/vpc/docs/using-firewall-rules-logging - tags: cloud,devops,gcp,gcloud,google-cloud-vpc,firewall-logging,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-vpc,firewall-logging,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-firewall-rule-logging-not-enabled.yaml b/cloud/gcp/vpc/gcloud-firewall-rule-logging-not-enabled.yaml index c511369acfd..f2170cd895d 100644 --- a/cloud/gcp/vpc/gcloud-firewall-rule-logging-not-enabled.yaml +++ b/cloud/gcp/vpc/gcloud-firewall-rule-logging-not-enabled.yaml @@ -12,7 +12,7 @@ info: Enable logging for your VPC firewall rules to capture connection details, including traffic source, destination, and actions taken by the rules. reference: - https://cloud.google.com/vpc/docs/using-firewall-rules-logging - tags: cloud,devops,gcp,gcloud,google-cloud-vpc,firewall-logging,security,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,google-cloud-vpc,firewall-logging,security,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-dns-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-dns-access.yaml index b8bfec2a74f..18aa1ce0179 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-dns-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-dns-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow DNS traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,dns,security,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,dns,security,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-ftp-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-ftp-access.yaml index ce95c3ba9f8..02996a79db5 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-ftp-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-ftp-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow FTP traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,ftp,security,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,ftp,security,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-icmp-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-icmp-access.yaml index 02ae77a5599..3d6c9c1ae9c 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-icmp-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-icmp-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to restrict ICMP-based access to trusted IP addresses or ranges only. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,icmp,security,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,icmp,security,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-inbound-uncommon-ports.yaml b/cloud/gcp/vpc/gcloud-unrestricted-inbound-uncommon-ports.yaml index ffede7f62f6..2bf2830a052 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-inbound-uncommon-ports.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-inbound-uncommon-ports.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow traffic only to common ports required for your applications, and restrict access to uncommon ports. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-mysql-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-mysql-access.yaml index 0a96ad79c8d..8fbeeb449fe 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-mysql-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-mysql-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow MySQL traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,mysql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,mysql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-oracle-db-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-oracle-db-access.yaml index 9411b733ef1..fcf0ff9dd77 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-oracle-db-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-oracle-db-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow Oracle Database traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,oracle,db,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,oracle,db,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-outbound-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-outbound-access.yaml index 5e99a73d968..091d4f42306 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-outbound-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-outbound-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to restrict outbound traffic to trusted IP addresses and ports only. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-postgresql-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-postgresql-access.yaml index b70bf612241..0c2a256eb79 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-postgresql-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-postgresql-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow PostgreSQL traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,postgresql,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,postgresql,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-rdp-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-rdp-access.yaml index 2dcacb07464..3f8974d0a6a 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-rdp-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-rdp-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow RDP traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,rdp,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,rdp,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-rpc-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-rpc-access.yaml index 381ec67d6b4..b05ce34a8a5 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-rpc-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-rpc-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow RPC traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,rpc,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,rpc,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-smtp-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-smtp-access.yaml index 1308ef3216f..1e9fe4f8194 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-smtp-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-smtp-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow SMTP traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,smtp,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,smtp,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-sqlserver-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-sqlserver-access.yaml index b0ef92f9290..561d517931f 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-sqlserver-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-sqlserver-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow SQL Server traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,sqlserver,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,sqlserver,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-unrestricted-ssh-access.yaml b/cloud/gcp/vpc/gcloud-unrestricted-ssh-access.yaml index 98b30b1aa1d..61641366833 100644 --- a/cloud/gcp/vpc/gcloud-unrestricted-ssh-access.yaml +++ b/cloud/gcp/vpc/gcloud-unrestricted-ssh-access.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow SSH traffic only from trusted IP addresses or ranges. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,ssh,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,ssh,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-vpc-firewall-port-ranges.yaml b/cloud/gcp/vpc/gcloud-vpc-firewall-port-ranges.yaml index 3f9008344ab..8ac0993639b 100644 --- a/cloud/gcp/vpc/gcloud-vpc-firewall-port-ranges.yaml +++ b/cloud/gcp/vpc/gcloud-vpc-firewall-port-ranges.yaml @@ -12,7 +12,7 @@ info: Update your VPC firewall rules to allow only specific ports required for your applications, rather than a range of ports. reference: - https://cloud.google.com/vpc/docs/firewalls - tags: cloud,devops,gcp,gcloud,vpc,firewall,security,networking,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,firewall,security,networking,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-vpc-private-service-connect.yaml b/cloud/gcp/vpc/gcloud-vpc-private-service-connect.yaml index ac42d5f66bf..53dea34a225 100644 --- a/cloud/gcp/vpc/gcloud-vpc-private-service-connect.yaml +++ b/cloud/gcp/vpc/gcloud-vpc-private-service-connect.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VPC/vpc-with-private-service-connect-endpoints.html - https://cloud.google.com/vpc/docs/private-service-connect - tags: cloud,devops,gcp,gcloud,vpc,networking,security,psc,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,networking,security,psc,gcp-cloud-config flow: | code(1) diff --git a/cloud/gcp/vpc/gcloud-vpc-unattached-static-ips.yaml b/cloud/gcp/vpc/gcloud-vpc-unattached-static-ips.yaml index 9f9f6a7a937..20508468ed9 100644 --- a/cloud/gcp/vpc/gcloud-vpc-unattached-static-ips.yaml +++ b/cloud/gcp/vpc/gcloud-vpc-unattached-static-ips.yaml @@ -13,7 +13,7 @@ info: reference: - https://www.trendmicro.com/cloudoneconformity/knowledge-base/gcp/VPC/unattached-static-ip-address.html - https://cloud.google.com/compute/docs/ip-addresses/reserve-static-external-ip-address - tags: cloud,devops,gcp,gcloud,vpc,networking,cost-optimization,gcp-cloud-config,vuln + tags: cloud,devops,gcp,gcloud,vpc,networking,cost-optimization,gcp-cloud-config flow: | code(1) diff --git a/cloud/kubernetes/cves/2025/CVE-2025-1974-k8s.yaml b/cloud/kubernetes/cves/2025/CVE-2025-1974-k8s.yaml index 8c5cb102039..4b39a9b5f41 100644 --- a/cloud/kubernetes/cves/2025/CVE-2025-1974-k8s.yaml +++ b/cloud/kubernetes/cves/2025/CVE-2025-1974-k8s.yaml @@ -12,7 +12,7 @@ info: reference: - https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities - https://projectdiscovery.io/blog/ingressnightmare-unauth-rce-in-ingress-nginx - tags: cve,cve2025,cloud,devops,kubernetes,ingress,nginx,k8s,k8s-cluster-security,vuln + tags: cve,cve2025,cloud,devops,kubernetes,ingress,nginx,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-cpu-limits-not-set.yaml b/cloud/kubernetes/deployments/k8s-cpu-limits-not-set.yaml index ec26c487f63..05a4a29d35f 100644 --- a/cloud/kubernetes/deployments/k8s-cpu-limits-not-set.yaml +++ b/cloud/kubernetes/deployments/k8s-cpu-limits-not-set.yaml @@ -11,7 +11,7 @@ info: Set CPU limits for all containers in Kubernetes Deployments to ensure fair CPU resource distribution and prevent performance issues. reference: - https://kubernetes.io/docs/tasks/configure-pod-container/assign-cpu-resource/ - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-cpu-requests-not-set.yaml b/cloud/kubernetes/deployments/k8s-cpu-requests-not-set.yaml index b29fe93cd03..28d346dcb45 100644 --- a/cloud/kubernetes/deployments/k8s-cpu-requests-not-set.yaml +++ b/cloud/kubernetes/deployments/k8s-cpu-requests-not-set.yaml @@ -11,7 +11,7 @@ info: Set CPU requests for all containers in Kubernetes Deplayments to ensure efficient scheduling and resource allocation. reference: - https://kubernetes.io/docs/tasks/configure-pod-container/assign-cpu-resource/ - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-default-namespace-used.yaml b/cloud/kubernetes/deployments/k8s-default-namespace-used.yaml index c8d2a191c2a..93e3f79f686 100644 --- a/cloud/kubernetes/deployments/k8s-default-namespace-used.yaml +++ b/cloud/kubernetes/deployments/k8s-default-namespace-used.yaml @@ -11,7 +11,7 @@ info: Avoid using the default namespace for Kubernetes Deployments. Create and specify dedicated namespaces tailored to specific applications or teams to enhance security and manage resources effectively. reference: - https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/ - tags: cloud,devops,kubernetes,k8s,devsecops,namespaces,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,namespaces,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-host-ports-check.yaml b/cloud/kubernetes/deployments/k8s-host-ports-check.yaml index 632212f265d..61e7c185384 100644 --- a/cloud/kubernetes/deployments/k8s-host-ports-check.yaml +++ b/cloud/kubernetes/deployments/k8s-host-ports-check.yaml @@ -11,7 +11,7 @@ info: Avoid using host ports in Kubernetes Deployments. Use services or other networking mechanisms to expose container applications. reference: - https://kubernetes.io/docs/concepts/services-networking/service/ - tags: cloud,devops,kubernetes,devsecops,deployments,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,deployments,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-image-pull-policy-always.yaml b/cloud/kubernetes/deployments/k8s-image-pull-policy-always.yaml index 248d781717a..1110b11408f 100644 --- a/cloud/kubernetes/deployments/k8s-image-pull-policy-always.yaml +++ b/cloud/kubernetes/deployments/k8s-image-pull-policy-always.yaml @@ -10,7 +10,7 @@ info: remediation: Update the image pull policy in Kubernetes Deployments to 'Always' to ensure that the latest container images are always used. reference: - https://kubernetes.io/docs/concepts/containers/images/#updating-images - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,images,docker,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,images,docker,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-image-tag-not-fixed.yaml b/cloud/kubernetes/deployments/k8s-image-tag-not-fixed.yaml index 160257b38ab..686fae42b4a 100644 --- a/cloud/kubernetes/deployments/k8s-image-tag-not-fixed.yaml +++ b/cloud/kubernetes/deployments/k8s-image-tag-not-fixed.yaml @@ -11,7 +11,7 @@ info: Use specific image tags for all containers in Kubernetes Deployments to ensure reproducibility and stability of application deployments. reference: - https://kubernetes.io/docs/concepts/containers/images/ - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-liveness-probe-not-configured.yaml b/cloud/kubernetes/deployments/k8s-liveness-probe-not-configured.yaml index 248aff792c4..a5bd5b55255 100644 --- a/cloud/kubernetes/deployments/k8s-liveness-probe-not-configured.yaml +++ b/cloud/kubernetes/deployments/k8s-liveness-probe-not-configured.yaml @@ -10,7 +10,7 @@ info: remediation: Configure liveness probes for all containers in Kubernetes Deployments to ensure proper health checks and automatic restarts of failing containers reference: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-memory-limits-not-set.yaml b/cloud/kubernetes/deployments/k8s-memory-limits-not-set.yaml index 2d14a46afd2..1bf64ed0c83 100644 --- a/cloud/kubernetes/deployments/k8s-memory-limits-not-set.yaml +++ b/cloud/kubernetes/deployments/k8s-memory-limits-not-set.yaml @@ -10,7 +10,7 @@ info: remediation: Set memory limits for all containers in Kubernetes Deployments to ensure resource management and application stability reference: - https://kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/ - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-memory-requests-not-set.yaml b/cloud/kubernetes/deployments/k8s-memory-requests-not-set.yaml index 493b200d796..cba22bae273 100644 --- a/cloud/kubernetes/deployments/k8s-memory-requests-not-set.yaml +++ b/cloud/kubernetes/deployments/k8s-memory-requests-not-set.yaml @@ -10,7 +10,7 @@ info: remediation: Set memory requests for all containers in Kubernetes Deployments to ensure efficient pod scheduling and node resource utilization. reference: - https://kubernetes.io/docs/tasks/configure-pod-container/assign-memory-resource/ - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-minimize-added-capabilities.yaml b/cloud/kubernetes/deployments/k8s-minimize-added-capabilities.yaml index 3a00b2e9327..e02a2a9b5bd 100644 --- a/cloud/kubernetes/deployments/k8s-minimize-added-capabilities.yaml +++ b/cloud/kubernetes/deployments/k8s-minimize-added-capabilities.yaml @@ -11,7 +11,7 @@ info: Ensure that no unnecessary capabilities are added to containers within Kubernetes Deployments. Use security contexts to define the minimum necessary privileges. reference: - https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-privileged-container.yaml b/cloud/kubernetes/deployments/k8s-privileged-container.yaml index f37c6a36c58..ea8f558540c 100644 --- a/cloud/kubernetes/deployments/k8s-privileged-container.yaml +++ b/cloud/kubernetes/deployments/k8s-privileged-container.yaml @@ -11,7 +11,7 @@ info: Ensure that no container in Kubernetes Deployments runs in privileged mode, as the root user, or with privilege escalation enabled. Modify the security context for each container to set `privileged: false`, `runAsUser` appropriately, and `allowPrivilegeEscalation: false`. reference: - https://kubernetes.io/docs/concepts/policy/pod-security-policy/#privileged - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-readiness-probe-not-set.yaml b/cloud/kubernetes/deployments/k8s-readiness-probe-not-set.yaml index 7755f5d5a85..c9b0e12ca93 100644 --- a/cloud/kubernetes/deployments/k8s-readiness-probe-not-set.yaml +++ b/cloud/kubernetes/deployments/k8s-readiness-probe-not-set.yaml @@ -11,7 +11,7 @@ info: Define readiness probes in all containers within your Kubernetes Deployments to ensure that traffic is only routed to containers that are fully prepared to handle it. reference: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-liveness-readiness-startup-probes/ - tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-root-container-admission.yaml b/cloud/kubernetes/deployments/k8s-root-container-admission.yaml index 7ce83132db4..c8c6c4cc651 100644 --- a/cloud/kubernetes/deployments/k8s-root-container-admission.yaml +++ b/cloud/kubernetes/deployments/k8s-root-container-admission.yaml @@ -11,7 +11,7 @@ info: Configure security contexts for all pods to run containers with a non-root user. Use Pod Security Policies or OPA/Gatekeeper to enforce these configurations. reference: - https://kubernetes.io/docs/concepts/policy/pod-security-policy/#users-and-groups - tags: cloud,devops,kubernetes,devsecops,deployments,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,deployments,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/deployments/k8s-seccomp-profile-set.yaml b/cloud/kubernetes/deployments/k8s-seccomp-profile-set.yaml index e87336374ac..d006e5b8c60 100644 --- a/cloud/kubernetes/deployments/k8s-seccomp-profile-set.yaml +++ b/cloud/kubernetes/deployments/k8s-seccomp-profile-set.yaml @@ -11,7 +11,7 @@ info: Ensure that all containers in Kubernetes Deployments have a seccomp profile of docker/default or runtime/default set in their security contexts. reference: - https://kubernetes.io/docs/tutorials/clusters/seccomp/ - tags: cloud,devops,kubernetes,devsecops,containers,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,containers,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/kubernetes-code-env.yaml b/cloud/kubernetes/kubernetes-code-env.yaml index 1b2febf57f8..3bea919fa96 100644 --- a/cloud/kubernetes/kubernetes-code-env.yaml +++ b/cloud/kubernetes/kubernetes-code-env.yaml @@ -7,7 +7,7 @@ info: Checks if kubernetes CLI is set up and all necessary tools are installed on the environment. reference: - https://kubernetes.io/ - tags: cloud,devops,kubernetes,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,k8s-cluster-security self-contained: true code: diff --git a/cloud/kubernetes/kubernetes-exposing-docker-socket-hostpath.yaml b/cloud/kubernetes/kubernetes-exposing-docker-socket-hostpath.yaml index 2a740e5a95c..43599ad1886 100644 --- a/cloud/kubernetes/kubernetes-exposing-docker-socket-hostpath.yaml +++ b/cloud/kubernetes/kubernetes-exposing-docker-socket-hostpath.yaml @@ -14,7 +14,7 @@ info: - https://kubernetes.io/docs/concepts/policy/pod-security-policy/#volumes-and-file-systems - https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ - https://cheatsheetseries.owasp.org/cheatsheets/Docker_Security_Cheat_Sheet.html#rule-1-do-not-expose-the-docker-daemon-socket-even-to-the-containers - tags: cloud,devops,kubernetes,k8s,vuln + tags: cloud,devops,kubernetes,k8s flow: | code(1); diff --git a/cloud/kubernetes/network-policies/k8s-missing-network-policies.yaml b/cloud/kubernetes/network-policies/k8s-missing-network-policies.yaml index d972d07f381..d4559409c61 100644 --- a/cloud/kubernetes/network-policies/k8s-missing-network-policies.yaml +++ b/cloud/kubernetes/network-policies/k8s-missing-network-policies.yaml @@ -12,7 +12,7 @@ info: Define and apply network policies to manage ingress and egress traffic within namespaces effectively. Use `kubectl apply -f ` to enforce network boundaries. reference: - https://kubernetes.io/docs/concepts/services-networking/network-policies/ - tags: cloud,devops,kubernetes,devsecops,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,k8s,k8s-cluster-security self-contained: true diff --git a/cloud/kubernetes/network-policies/k8s-netpol-egress-rules.yaml b/cloud/kubernetes/network-policies/k8s-netpol-egress-rules.yaml index 731dfac0dc6..46f9f50d15c 100644 --- a/cloud/kubernetes/network-policies/k8s-netpol-egress-rules.yaml +++ b/cloud/kubernetes/network-policies/k8s-netpol-egress-rules.yaml @@ -10,7 +10,7 @@ info: remediation: Define egress rules in all network policies to control outbound traffic from your Kubernetes pods, thereby reducing security risks. reference: - https://kubernetes.io/docs/concepts/services-networking/network-policies/ - tags: cloud,devops,kubernetes,devsecops,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/network-policies/k8s-netpol-namespace.yaml b/cloud/kubernetes/network-policies/k8s-netpol-namespace.yaml index 7f335b16c1a..0bff44b0e81 100644 --- a/cloud/kubernetes/network-policies/k8s-netpol-namespace.yaml +++ b/cloud/kubernetes/network-policies/k8s-netpol-namespace.yaml @@ -11,7 +11,7 @@ info: Ensure that all Network Policies explicitly define a namespace to maintain proper network isolation and security boundaries. reference: - https://kubernetes.io/docs/concepts/services-networking/network-policies/ - tags: cloud,devops,kubernetes,devsecops,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/network-policies/k8s-network-ingress-rules.yaml b/cloud/kubernetes/network-policies/k8s-network-ingress-rules.yaml index ad7a53c29f8..67fb230760b 100644 --- a/cloud/kubernetes/network-policies/k8s-network-ingress-rules.yaml +++ b/cloud/kubernetes/network-policies/k8s-network-ingress-rules.yaml @@ -11,7 +11,7 @@ info: Define specific ingress rules in all network policies to control the flow of inbound traffic to pods, ensuring only authorized traffic can access cluster resources. reference: - https://kubernetes.io/docs/concepts/services-networking/network-policies/ - tags: cloud,devops,kubernetes,security,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,security,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/pods/k8s-allow-privilege-escalation-set.yaml b/cloud/kubernetes/pods/k8s-allow-privilege-escalation-set.yaml index 3034fbdb6c1..dd3e76b7584 100644 --- a/cloud/kubernetes/pods/k8s-allow-privilege-escalation-set.yaml +++ b/cloud/kubernetes/pods/k8s-allow-privilege-escalation-set.yaml @@ -10,7 +10,7 @@ info: remediation: Ensure that the allowPrivilegeEscalation flag is set to false in all container configurations to minimize security risks reference: - https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ - tags: cloud,devops,kubernetes,security,devsecops,containers,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,security,devsecops,containers,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/pods/k8s-containers-share-host-ipc.yaml b/cloud/kubernetes/pods/k8s-containers-share-host-ipc.yaml index d18d2f3ac79..0f4f074018a 100644 --- a/cloud/kubernetes/pods/k8s-containers-share-host-ipc.yaml +++ b/cloud/kubernetes/pods/k8s-containers-share-host-ipc.yaml @@ -10,7 +10,7 @@ info: remediation: Ensure that no container in Kubernetes Pods is set to share the host IPC namespace. Configure 'spec.hostIPC' to 'false' for all pods to isolate IPC namespaces. reference: - https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ - tags: cloud,devops,kubernetes,k8s,devsecops,pods,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,pods,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/pods/k8s-host-network-namespace-shared.yaml b/cloud/kubernetes/pods/k8s-host-network-namespace-shared.yaml index 8ba848d3367..c232d31e89c 100644 --- a/cloud/kubernetes/pods/k8s-host-network-namespace-shared.yaml +++ b/cloud/kubernetes/pods/k8s-host-network-namespace-shared.yaml @@ -11,7 +11,7 @@ info: Ensure that the 'hostNetwork' field is set to false in all Kubernetes Pods to prevent containers from sharing the host's network namespace. reference: - https://kubernetes.io/docs/concepts/policy/pod-security-policy/#host-namespaces - tags: cloud,devops,kubernetes,k8s,devsecops,namespace,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,namespace,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/pods/k8s-host-pid-namespace-sharing.yaml b/cloud/kubernetes/pods/k8s-host-pid-namespace-sharing.yaml index 32da8c7381b..b222d49a0c1 100644 --- a/cloud/kubernetes/pods/k8s-host-pid-namespace-sharing.yaml +++ b/cloud/kubernetes/pods/k8s-host-pid-namespace-sharing.yaml @@ -11,7 +11,7 @@ info: Ensure that the 'hostPID' field is set to 'false' in Kubernetes Pod specifications to prevent containers from sharing the host's PID namespace. reference: - https://kubernetes.io/docs/concepts/policy/pod-security-policy/#host-namespaces - tags: cloud,devops,kubernetes,k8s,devsecops,pods,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,pods,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/pods/k8s-readonly-fs.yaml b/cloud/kubernetes/pods/k8s-readonly-fs.yaml index b7ca880d89c..8873b8610d3 100644 --- a/cloud/kubernetes/pods/k8s-readonly-fs.yaml +++ b/cloud/kubernetes/pods/k8s-readonly-fs.yaml @@ -10,7 +10,7 @@ info: remediation: Configure containers to use read-only filesystems where possible to enhance security and minimize risk of unauthorized data modification reference: - https://kubernetes.io/docs/concepts/storage/volumes/#mount-propagation - tags: cloud,devops,kubernetes,k8s,devsecops,pods,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,k8s,devsecops,pods,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/pods/k8s-readonly-rootfs.yaml b/cloud/kubernetes/pods/k8s-readonly-rootfs.yaml index ceab310834e..4e02024cb80 100644 --- a/cloud/kubernetes/pods/k8s-readonly-rootfs.yaml +++ b/cloud/kubernetes/pods/k8s-readonly-rootfs.yaml @@ -11,7 +11,7 @@ info: Configure all pods and containers to have their root filesystem set to read-only mode. This can be achieved by setting the securityContext.readOnlyRootFilesystem parameter to true in the pod or container configuration. reference: - https://kubernetes.io/docs/concepts/policy/pod-security-policy/#volumes-and-file-systems - tags: cloud,devops,kubernetes,devsecops,pods,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,pods,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/pods/k8s-root-user-id.yaml b/cloud/kubernetes/pods/k8s-root-user-id.yaml index 7273f6a740a..92993086b78 100644 --- a/cloud/kubernetes/pods/k8s-root-user-id.yaml +++ b/cloud/kubernetes/pods/k8s-root-user-id.yaml @@ -10,7 +10,7 @@ info: remediation: Configure pods to run with a non-root user ID by setting the 'securityContext' for each container and the pod itself. reference: - https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ - tags: cloud,devops,kubernetes,devsecops,pods,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,pods,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/rbac/k8s-role-pod-create.yaml b/cloud/kubernetes/rbac/k8s-role-pod-create.yaml index 038e50c238b..869e551980b 100644 --- a/cloud/kubernetes/rbac/k8s-role-pod-create.yaml +++ b/cloud/kubernetes/rbac/k8s-role-pod-create.yaml @@ -11,7 +11,7 @@ info: reference: - https://kubernetes.io/docs/concepts/security/rbac-good-practices/#least-privilege - https://cloud.hacktricks.wiki/en/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes/index.html - tags: cloud,devops,kubernetes,devsecops,roles,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,roles,k8s,k8s-cluster-security flow: | code(1); diff --git a/cloud/kubernetes/security-compliance/k8s-apiserver-anonymous-access.yaml b/cloud/kubernetes/security-compliance/k8s-apiserver-anonymous-access.yaml index b1f91d57a3b..14bc9fb1c41 100644 --- a/cloud/kubernetes/security-compliance/k8s-apiserver-anonymous-access.yaml +++ b/cloud/kubernetes/security-compliance/k8s-apiserver-anonymous-access.yaml @@ -13,7 +13,7 @@ info: and ensure "--anonymous-auth=false" is present in the apiserver arguments. reference: - https://kubernetes.io/docs/reference/command-line-tools-reference/kube-apiserver/ - tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security variables: argument: "--anonymous-auth=false" diff --git a/cloud/kubernetes/security-compliance/k8s-apiserver-token-auth-file.yaml b/cloud/kubernetes/security-compliance/k8s-apiserver-token-auth-file.yaml index 110283dd398..a0268d3ade9 100644 --- a/cloud/kubernetes/security-compliance/k8s-apiserver-token-auth-file.yaml +++ b/cloud/kubernetes/security-compliance/k8s-apiserver-token-auth-file.yaml @@ -13,7 +13,7 @@ info: and managed securely. Prefer dynamic, short-lived service account tokens and RBAC. reference: - https://kubernetes.io/docs/reference/command-line-tools-reference/kube-apiserver/ - tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security variables: argument: "--token-auth-file" @@ -40,4 +40,4 @@ code: - type: dsl dsl: - '"kube-apiserver is configured with " + argument + ". Review and remove if unnecessary."' -# digest: 4a0a004730450220570c31f832b4f552d4a3638204241b460d3ed793f5873d3f76e1c5962c20c626022100f2ae478f1ab12d1a905c0a34a802a6edd1605a4d6b38e12096e68fb5dbe1c5f3:922c64590222798bb761d5b6d8e72950 \ No newline at end of file +# digest: 4b0a00483046022100eab0a0bbf106ff223a30bd354590d7c0442b6603ca922b759d7cd9f31e669db70221008f7a29a9684ae882602800bc55224210f487acfd8ae922f6eb6501e7ea670281:922c64590222798bb761d5b6d8e72950 \ No newline at end of file diff --git a/cloud/kubernetes/security-compliance/k8s-audit-log-path-set.yaml b/cloud/kubernetes/security-compliance/k8s-audit-log-path-set.yaml index d061f129b14..dcb9cf22630 100644 --- a/cloud/kubernetes/security-compliance/k8s-audit-log-path-set.yaml +++ b/cloud/kubernetes/security-compliance/k8s-audit-log-path-set.yaml @@ -11,7 +11,7 @@ info: Configure the Kubernetes API server to include the audit-log-path argument pointing to a secure, writeable directory where audit logs will be stored. Ensure that this directory is properly secured and regularly monitored. reference: - https://kubernetes.io/docs/tasks/debug-application-cluster/audit/ - tags: cloud,devops,kubernetes,devsecops,api-server,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,api-server,k8s,k8s-cluster-security variables: argument: "audit-log-path" diff --git a/cloud/kubernetes/security-compliance/k8s-enc-prov-conf.yaml b/cloud/kubernetes/security-compliance/k8s-enc-prov-conf.yaml index 85f97e64d36..195af386a8c 100644 --- a/cloud/kubernetes/security-compliance/k8s-enc-prov-conf.yaml +++ b/cloud/kubernetes/security-compliance/k8s-enc-prov-conf.yaml @@ -11,7 +11,7 @@ info: Ensure that the encryption provider configuration file is set up correctly and referenced properly in the API server configuration. Encryption should be enabled and configured according to the security best practices. reference: - https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/ - tags: cloud,devops,kubernetes,devsecops,encryption,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,encryption,k8s,k8s-cluster-security variables: argument: "encryption-provider-config" diff --git a/cloud/kubernetes/security-compliance/k8s-etcd-cafile-set.yaml b/cloud/kubernetes/security-compliance/k8s-etcd-cafile-set.yaml index 2e0b8cf977d..043d1861ec5 100644 --- a/cloud/kubernetes/security-compliance/k8s-etcd-cafile-set.yaml +++ b/cloud/kubernetes/security-compliance/k8s-etcd-cafile-set.yaml @@ -11,7 +11,7 @@ info: Configure etcd to use an etcd-cafile argument that points to a valid CA certificate bundle. This setting should be part of the etcd startup arguments or in its configuration file. reference: - https://etcd.io/docs/v3.5/op-guide/security/ - tags: cloud,devops,kubernetes,devsecops,etcd,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,etcd,k8s,k8s-cluster-security variables: argument: "etcd-cafile" diff --git a/cloud/kubernetes/security-compliance/k8s-etcd-files-set.yaml b/cloud/kubernetes/security-compliance/k8s-etcd-files-set.yaml index 514715c0e77..f4613cf6f69 100644 --- a/cloud/kubernetes/security-compliance/k8s-etcd-files-set.yaml +++ b/cloud/kubernetes/security-compliance/k8s-etcd-files-set.yaml @@ -11,7 +11,7 @@ info: Configure the etcd server to use etcd-certfile and etcd-keyfile arguments that point to valid certificate and key files respectively. This ensures that communications to and from the etcd server are properly encrypted. reference: - https://etcd.io/docs/v3.4.0/op-guide/security/ - tags: cloud,devops,kubernetes,devsecops,etcd,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,etcd,k8s,k8s-cluster-security variables: argument: "etcd-certfile or etcd-keyfile" diff --git a/cloud/kubernetes/security-compliance/k8s-ns-usage-check.yaml b/cloud/kubernetes/security-compliance/k8s-ns-usage-check.yaml index 14ee3eedbe8..0e7f17b4fbf 100644 --- a/cloud/kubernetes/security-compliance/k8s-ns-usage-check.yaml +++ b/cloud/kubernetes/security-compliance/k8s-ns-usage-check.yaml @@ -11,7 +11,7 @@ info: Implement and use namespaces to organize resources within the Kubernetes cluster effectively. Define access controls and resource quotas on a per-namespace basis. reference: - https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/ - tags: cloud,devops,kubernetes,devsecops,namespaces,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,namespaces,k8s,k8s-cluster-security variables: argument: "namespaces" diff --git a/cloud/kubernetes/security-compliance/k8s-svc-acct-issuer-set.yaml b/cloud/kubernetes/security-compliance/k8s-svc-acct-issuer-set.yaml index 88e1e37fb06..9f99d6551f9 100644 --- a/cloud/kubernetes/security-compliance/k8s-svc-acct-issuer-set.yaml +++ b/cloud/kubernetes/security-compliance/k8s-svc-acct-issuer-set.yaml @@ -11,7 +11,7 @@ info: Set the service-account-issuer argument to a valid issuer URL in the API server's startup arguments or configuration file. This ensures the tokens issued are trusted across services. reference: - https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/ - tags: cloud,devops,kubernetes,devsecops,api-server,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,devsecops,api-server,k8s,k8s-cluster-security variables: argument: "service-account-issuer" diff --git a/cloud/kubernetes/security-compliance/k8s-svc-acct-key.yaml b/cloud/kubernetes/security-compliance/k8s-svc-acct-key.yaml index 6282ef436fc..f436b99aced 100644 --- a/cloud/kubernetes/security-compliance/k8s-svc-acct-key.yaml +++ b/cloud/kubernetes/security-compliance/k8s-svc-acct-key.yaml @@ -11,7 +11,7 @@ info: Configure the API server to use a service-account-key-file that points to a valid private key used to sign service account tokens. This setting should be part of the API server startup arguments or in its configuration file. reference: - https://kubernetes.io/docs/admin/kube-apiserver/ - tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security variables: argument: "service-account-key-file" diff --git a/cloud/kubernetes/security-compliance/k8s-svc-acct-lookup-set.yaml b/cloud/kubernetes/security-compliance/k8s-svc-acct-lookup-set.yaml index 91e0e3136cd..94fdc77e6d0 100644 --- a/cloud/kubernetes/security-compliance/k8s-svc-acct-lookup-set.yaml +++ b/cloud/kubernetes/security-compliance/k8s-svc-acct-lookup-set.yaml @@ -11,7 +11,7 @@ info: Set the service-account-lookup argument to true in the API server's startup arguments or configuration file to ensure proper verification of service accounts. reference: - https://kubernetes.io/docs/admin/kube-apiserver/ - tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security variables: argument: "service-account-lookup=true" diff --git a/cloud/kubernetes/security-compliance/k8s-tls-config-set.yaml b/cloud/kubernetes/security-compliance/k8s-tls-config-set.yaml index e70611b7501..ba15663b185 100644 --- a/cloud/kubernetes/security-compliance/k8s-tls-config-set.yaml +++ b/cloud/kubernetes/security-compliance/k8s-tls-config-set.yaml @@ -11,7 +11,7 @@ info: Configure the API server to use tls-cert-file and tls-private-key-file that point to a valid certificate and key file respectively. This setting should be part of the API server startup arguments or in its configuration file. reference: - https://kubernetes.io/docs/admin/kube-apiserver/ - tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security,vuln + tags: cloud,devops,kubernetes,security,devsecops,api-server,k8s,k8s-cluster-security variables: argument: "tls-cert-file or tls-private-key-file" diff --git a/http/iot/brother-unauthorized-access.yaml b/http/iot/brother-unauthorized-access.yaml index d00ae80fdce..3870c8ffded 100644 --- a/http/iot/brother-unauthorized-access.yaml +++ b/http/iot/brother-unauthorized-access.yaml @@ -8,7 +8,7 @@ info: reference: https://www.exploit-db.com/ghdb/6889 metadata: max-request: 1 - tags: iot,printer,unauth,discovery + tags: iot,printer,unauth,vuln,discovery http: - method: GET diff --git a/http/iot/dell-laser-printer-unauth.yaml b/http/iot/dell-laser-printer-unauth.yaml index 4aff20e1fa8..ea8226f224a 100644 --- a/http/iot/dell-laser-printer-unauth.yaml +++ b/http/iot/dell-laser-printer-unauth.yaml @@ -10,7 +10,7 @@ info: max-request: 1 shodan-query: title="Laser Printer" verified: true - tags: dell,iot,unauth,misconfig,printer,discovery + tags: dell,iot,unauth,misconfig,printer,vuln,discovery flow: http(1) && http(2) diff --git a/http/iot/iotawatt-app-exposure.yaml b/http/iot/iotawatt-app-exposure.yaml index 725996664ff..8727cdcfc2f 100644 --- a/http/iot/iotawatt-app-exposure.yaml +++ b/http/iot/iotawatt-app-exposure.yaml @@ -14,7 +14,7 @@ info: metadata: max-request: 1 fofa-query: app="IoTaWatt-Configuration-app" - tags: iot,exposure,discovery + tags: iot,exposure,vuln,discovery http: - method: GET diff --git a/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml b/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml index 892c2736c7c..3e925fa299c 100644 --- a/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml +++ b/http/misconfiguration/gocd/gocd-unauth-dashboard.yaml @@ -12,7 +12,7 @@ info: vendor: thoughtworks product: gocd shodan-query: http.title:"Create a pipeline - Go" html:"GoCD Version" - tags: go,gocd,unauth,misconfig,discovery + tags: go,gocd,unauth,misconfig,vuln,discovery http: - method: GET diff --git a/http/osint/phishing/1password-phish.yaml b/http/osint/phishing/1password-phish.yaml index 4dfe56486df..467fc5876d4 100644 --- a/http/osint/phishing/1password-phish.yaml +++ b/http/osint/phishing/1password-phish.yaml @@ -10,7 +10,7 @@ info: - https://1password.com metadata: max-request: 1 - tags: phishing,1password,osint,vuln + tags: phishing,1password,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/adobe-phish.yaml b/http/osint/phishing/adobe-phish.yaml index 1a75d09a570..cfa6ea1a824 100644 --- a/http/osint/phishing/adobe-phish.yaml +++ b/http/osint/phishing/adobe-phish.yaml @@ -10,7 +10,7 @@ info: - https://adobe.com metadata: max-request: 1 - tags: phishing,adobe,osint,vuln + tags: phishing,adobe,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/aliexpress-phish.yaml b/http/osint/phishing/aliexpress-phish.yaml index 6ed705cc229..ec1bd194310 100644 --- a/http/osint/phishing/aliexpress-phish.yaml +++ b/http/osint/phishing/aliexpress-phish.yaml @@ -10,7 +10,7 @@ info: - https://aliexpress.com metadata: max-request: 1 - tags: phishing,aliexpress,osint,vuln + tags: phishing,aliexpress,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/amazon-phish.yaml b/http/osint/phishing/amazon-phish.yaml index 33056df0f84..0f0ba4793f5 100644 --- a/http/osint/phishing/amazon-phish.yaml +++ b/http/osint/phishing/amazon-phish.yaml @@ -10,7 +10,7 @@ info: - https://amazon.com metadata: max-request: 1 - tags: phishing,amazon,osint,vuln + tags: phishing,amazon,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/amazon-web-services-phish.yaml b/http/osint/phishing/amazon-web-services-phish.yaml index 95e80311d01..2b91af4aa08 100644 --- a/http/osint/phishing/amazon-web-services-phish.yaml +++ b/http/osint/phishing/amazon-web-services-phish.yaml @@ -10,7 +10,7 @@ info: - https://signin.aws.amazon.com metadata: max-request: 1 - tags: phishing,amazon-web-services,aws,osint,vuln + tags: phishing,amazon-web-services,aws,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/american-express-phish.yaml b/http/osint/phishing/american-express-phish.yaml index 152a03aab51..dcd95f92be8 100644 --- a/http/osint/phishing/american-express-phish.yaml +++ b/http/osint/phishing/american-express-phish.yaml @@ -10,7 +10,7 @@ info: - https://www.americanexpress.com metadata: max-request: 1 - tags: phishing,american-express,osint,vuln + tags: phishing,american-express,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/anydesk-phish.yaml b/http/osint/phishing/anydesk-phish.yaml index 1a758e32874..35488677e64 100644 --- a/http/osint/phishing/anydesk-phish.yaml +++ b/http/osint/phishing/anydesk-phish.yaml @@ -10,7 +10,7 @@ info: - https://anydesk.com metadata: max-request: 1 - tags: phishing,anydesk,osint,vuln + tags: phishing,anydesk,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/avast-phish.yaml b/http/osint/phishing/avast-phish.yaml index 0bb7e0b89b2..e6de7685aaa 100644 --- a/http/osint/phishing/avast-phish.yaml +++ b/http/osint/phishing/avast-phish.yaml @@ -10,7 +10,7 @@ info: - https://avast.com metadata: max-request: 1 - tags: phishing,avast,osint,vuln + tags: phishing,avast,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/avg-phish.yaml b/http/osint/phishing/avg-phish.yaml index cf3729ac7d4..255a9a6531c 100644 --- a/http/osint/phishing/avg-phish.yaml +++ b/http/osint/phishing/avg-phish.yaml @@ -10,7 +10,7 @@ info: - https://avg.com metadata: max-request: 1 - tags: phishing,avg,osint,vuln + tags: phishing,avg,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/bank-central-asia-phish.yaml b/http/osint/phishing/bank-central-asia-phish.yaml index 6e2f76d9a3b..31991d2215e 100644 --- a/http/osint/phishing/bank-central-asia-phish.yaml +++ b/http/osint/phishing/bank-central-asia-phish.yaml @@ -10,7 +10,7 @@ info: - https://bca.co.id metadata: max-request: 1 - tags: phishing,bca,osint,vuln + tags: phishing,bca,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/bank-of-america-phish.yaml b/http/osint/phishing/bank-of-america-phish.yaml index c714b37ed5b..c8cff1e746f 100644 --- a/http/osint/phishing/bank-of-america-phish.yaml +++ b/http/osint/phishing/bank-of-america-phish.yaml @@ -10,7 +10,7 @@ info: - https://bankofamerica.com metadata: max-request: 1 - tags: phishing,BankOfAmerica,osint,vuln + tags: phishing,BankOfAmerica,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/battlenet-phish.yaml b/http/osint/phishing/battlenet-phish.yaml index 4993bd70a49..ed32165719e 100644 --- a/http/osint/phishing/battlenet-phish.yaml +++ b/http/osint/phishing/battlenet-phish.yaml @@ -10,7 +10,7 @@ info: - https://eu.account.battle.net/login metadata: max-request: 1 - tags: phishing,battlenet,osint,vuln + tags: phishing,battlenet,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/bestbuy-phish.yaml b/http/osint/phishing/bestbuy-phish.yaml index a06be25ad41..398a47e872a 100644 --- a/http/osint/phishing/bestbuy-phish.yaml +++ b/http/osint/phishing/bestbuy-phish.yaml @@ -10,7 +10,7 @@ info: - https://bestbuy.com metadata: max-request: 1 - tags: phishing,bestbuy,osint,vuln + tags: phishing,bestbuy,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/bitdefender-phish.yaml b/http/osint/phishing/bitdefender-phish.yaml index 6c2792e1492..65ec38c1e1a 100644 --- a/http/osint/phishing/bitdefender-phish.yaml +++ b/http/osint/phishing/bitdefender-phish.yaml @@ -10,7 +10,7 @@ info: - https://bitdefender.com metadata: max-request: 1 - tags: phishing,bitdefender,osint,vuln + tags: phishing,bitdefender,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/bitwarden-phish.yaml b/http/osint/phishing/bitwarden-phish.yaml index 1739f7c7ad6..dce3b98b652 100644 --- a/http/osint/phishing/bitwarden-phish.yaml +++ b/http/osint/phishing/bitwarden-phish.yaml @@ -10,7 +10,7 @@ info: - https://bitwarden.com metadata: max-request: 1 - tags: phishing,bitwarden,osint,vuln + tags: phishing,bitwarden,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/blender-phish.yaml b/http/osint/phishing/blender-phish.yaml index 0b4cb5f529f..128f4a8e675 100644 --- a/http/osint/phishing/blender-phish.yaml +++ b/http/osint/phishing/blender-phish.yaml @@ -10,7 +10,7 @@ info: - https://blender.org metadata: max-request: 1 - tags: phishing,blender,osint,vuln + tags: phishing,blender,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/booking-phish.yaml b/http/osint/phishing/booking-phish.yaml index 68ba34ed891..0f31bdad1f0 100644 --- a/http/osint/phishing/booking-phish.yaml +++ b/http/osint/phishing/booking-phish.yaml @@ -10,7 +10,7 @@ info: - https://booking.com metadata: max-request: 1 - tags: phishing,booking,osint,vuln + tags: phishing,booking,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/box-storage-phish.yaml b/http/osint/phishing/box-storage-phish.yaml index 8d8d68152f7..3fe0ab0b8b0 100644 --- a/http/osint/phishing/box-storage-phish.yaml +++ b/http/osint/phishing/box-storage-phish.yaml @@ -10,7 +10,7 @@ info: - https://box.com metadata: max-request: 1 - tags: phishing,box-storage,osint,vuln + tags: phishing,box-storage,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/brave-phish.yaml b/http/osint/phishing/brave-phish.yaml index 3f1583e471e..eebd18e8895 100644 --- a/http/osint/phishing/brave-phish.yaml +++ b/http/osint/phishing/brave-phish.yaml @@ -10,7 +10,7 @@ info: - https://brave.com metadata: max-request: 1 - tags: phishing,brave,osint,vuln + tags: phishing,brave,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/brighthr-phish.yaml b/http/osint/phishing/brighthr-phish.yaml index d4169f9de6d..cf4c81a558b 100644 --- a/http/osint/phishing/brighthr-phish.yaml +++ b/http/osint/phishing/brighthr-phish.yaml @@ -10,7 +10,7 @@ info: - https://brighthr.com metadata: max-request: 1 - tags: phishing,brighthr,osint,vuln + tags: phishing,brighthr,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/ccleaner-phish.yaml b/http/osint/phishing/ccleaner-phish.yaml index 45af42b90b8..8771c956e78 100644 --- a/http/osint/phishing/ccleaner-phish.yaml +++ b/http/osint/phishing/ccleaner-phish.yaml @@ -10,7 +10,7 @@ info: - https://ccleaner.com metadata: max-request: 1 - tags: phishing,ccleaner,osint,vuln + tags: phishing,ccleaner,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/chase-phish.yaml b/http/osint/phishing/chase-phish.yaml index df41eab80d6..1686138f721 100644 --- a/http/osint/phishing/chase-phish.yaml +++ b/http/osint/phishing/chase-phish.yaml @@ -10,7 +10,7 @@ info: - https://chase.com metadata: max-request: 1 - tags: phishing,Chase,osint,vuln + tags: phishing,Chase,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/chrome-phish.yaml b/http/osint/phishing/chrome-phish.yaml index 280a55c7aa5..277aa63956c 100644 --- a/http/osint/phishing/chrome-phish.yaml +++ b/http/osint/phishing/chrome-phish.yaml @@ -10,7 +10,7 @@ info: - https://www.google.com/intl/en_uk/chrome/ metadata: max-request: 1 - tags: phishing,chrome,osint,vuln + tags: phishing,chrome,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/costa-phish.yaml b/http/osint/phishing/costa-phish.yaml index f8e3be44584..a1a81a5c5d8 100644 --- a/http/osint/phishing/costa-phish.yaml +++ b/http/osint/phishing/costa-phish.yaml @@ -10,7 +10,7 @@ info: - https://costa.co.uk metadata: max-request: 1 - tags: phishing,costa,osint,vuln + tags: phishing,costa,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/dashlane-phish.yaml b/http/osint/phishing/dashlane-phish.yaml index b6ca513d992..fe8a307bc0d 100644 --- a/http/osint/phishing/dashlane-phish.yaml +++ b/http/osint/phishing/dashlane-phish.yaml @@ -10,7 +10,7 @@ info: - https://dashlane.com metadata: max-request: 1 - tags: phishing,dashlane,osint,vuln + tags: phishing,dashlane,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/deezer-phish.yaml b/http/osint/phishing/deezer-phish.yaml index 7ccd3a575b7..912f16035f1 100644 --- a/http/osint/phishing/deezer-phish.yaml +++ b/http/osint/phishing/deezer-phish.yaml @@ -10,7 +10,7 @@ info: - https://deezer.com metadata: max-request: 1 - tags: phishing,deezer,osint,vuln + tags: phishing,deezer,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/deliveroo-phish.yaml b/http/osint/phishing/deliveroo-phish.yaml index f623f942d82..76aeb5af706 100644 --- a/http/osint/phishing/deliveroo-phish.yaml +++ b/http/osint/phishing/deliveroo-phish.yaml @@ -10,7 +10,7 @@ info: - https://deliveroo.co.uk metadata: max-request: 1 - tags: phishing,deliveroo,osint,vuln + tags: phishing,deliveroo,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/digital-ocean-phish.yaml b/http/osint/phishing/digital-ocean-phish.yaml index 44e6283c6c0..296f4749348 100644 --- a/http/osint/phishing/digital-ocean-phish.yaml +++ b/http/osint/phishing/digital-ocean-phish.yaml @@ -10,7 +10,7 @@ info: - https://digitalocean.com metadata: max-request: 1 - tags: phishing,digital-ocean,osint,vuln + tags: phishing,digital-ocean,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/discord-phish.yaml b/http/osint/phishing/discord-phish.yaml index 7ae0a6dcd93..6932cf6f96d 100644 --- a/http/osint/phishing/discord-phish.yaml +++ b/http/osint/phishing/discord-phish.yaml @@ -10,7 +10,7 @@ info: - https://discord.com metadata: max-request: 1 - tags: phishing,discord,osint,vuln + tags: phishing,discord,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/disneyplus-phish.yaml b/http/osint/phishing/disneyplus-phish.yaml index 5ee4816a003..59223586a08 100644 --- a/http/osint/phishing/disneyplus-phish.yaml +++ b/http/osint/phishing/disneyplus-phish.yaml @@ -10,7 +10,7 @@ info: - https://disneyplus.com metadata: max-request: 1 - tags: phishing,disneyplus,osint,vuln + tags: phishing,disneyplus,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/dropbox-phish.yaml b/http/osint/phishing/dropbox-phish.yaml index 729452f731c..c84a21a2267 100644 --- a/http/osint/phishing/dropbox-phish.yaml +++ b/http/osint/phishing/dropbox-phish.yaml @@ -10,7 +10,7 @@ info: - https://dropbox.com metadata: max-request: 1 - tags: phishing,dropbox,osint,vuln + tags: phishing,dropbox,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/duckduckgo-phish.yaml b/http/osint/phishing/duckduckgo-phish.yaml index 1942bc7bb5e..ed01ac453d1 100644 --- a/http/osint/phishing/duckduckgo-phish.yaml +++ b/http/osint/phishing/duckduckgo-phish.yaml @@ -10,7 +10,7 @@ info: - https://duckduckgo.com metadata: max-request: 1 - tags: phishing,duckduckgo,osint,vuln + tags: phishing,duckduckgo,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/ebay-phish.yaml b/http/osint/phishing/ebay-phish.yaml index cd446214413..cd1c4a1b44a 100644 --- a/http/osint/phishing/ebay-phish.yaml +++ b/http/osint/phishing/ebay-phish.yaml @@ -10,7 +10,7 @@ info: - https://ebay.com metadata: max-request: 1 - tags: phishing,ebay,osint,vuln + tags: phishing,ebay,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/edge-phish.yaml b/http/osint/phishing/edge-phish.yaml index 0bb0ebeec81..fa7bed6d322 100644 --- a/http/osint/phishing/edge-phish.yaml +++ b/http/osint/phishing/edge-phish.yaml @@ -10,7 +10,7 @@ info: - https://www.microsoft.com/en-us/edge/download?form=MA13FJ&ch=1 metadata: max-request: 1 - tags: phishing,edge,osint,vuln + tags: phishing,edge,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/ee-mobile-phish.yaml b/http/osint/phishing/ee-mobile-phish.yaml index ea2c656a762..9ba5965f4f8 100644 --- a/http/osint/phishing/ee-mobile-phish.yaml +++ b/http/osint/phishing/ee-mobile-phish.yaml @@ -10,7 +10,7 @@ info: - https://ee.co.uk metadata: max-request: 1 - tags: phishing,ee,osint,vuln + tags: phishing,ee,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/eset-phish.yaml b/http/osint/phishing/eset-phish.yaml index 28d92f570ca..9c52b3f32e6 100644 --- a/http/osint/phishing/eset-phish.yaml +++ b/http/osint/phishing/eset-phish.yaml @@ -10,7 +10,7 @@ info: - https://eset.com metadata: max-request: 1 - tags: phishing,eset,osint,vuln + tags: phishing,eset,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/evernote-phish.yaml b/http/osint/phishing/evernote-phish.yaml index 05a5ac28636..2590fa8688d 100644 --- a/http/osint/phishing/evernote-phish.yaml +++ b/http/osint/phishing/evernote-phish.yaml @@ -10,7 +10,7 @@ info: - https://evernote.com metadata: max-request: 1 - tags: phishing,evernote,osint,vuln + tags: phishing,evernote,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/facebook-phish.yaml b/http/osint/phishing/facebook-phish.yaml index 5a3d4bb742f..74f9e725632 100644 --- a/http/osint/phishing/facebook-phish.yaml +++ b/http/osint/phishing/facebook-phish.yaml @@ -10,7 +10,7 @@ info: - https://facebook.com metadata: max-request: 1 - tags: phishing,facebook,osint,vuln + tags: phishing,facebook,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/figma-phish.yaml b/http/osint/phishing/figma-phish.yaml index ab69351c7d5..daec60d1798 100644 --- a/http/osint/phishing/figma-phish.yaml +++ b/http/osint/phishing/figma-phish.yaml @@ -10,7 +10,7 @@ info: - https://figma.com metadata: max-request: 1 - tags: phishing,figma,osint,vuln + tags: phishing,figma,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/filezilla-phish.yaml b/http/osint/phishing/filezilla-phish.yaml index 7675634eec8..ef9ddb2198b 100644 --- a/http/osint/phishing/filezilla-phish.yaml +++ b/http/osint/phishing/filezilla-phish.yaml @@ -10,7 +10,7 @@ info: - https://filezilla-project.org metadata: max-request: 1 - tags: phishing,filezilla,osint,vuln + tags: phishing,filezilla,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/firefox-phish.yaml b/http/osint/phishing/firefox-phish.yaml index dd2a79aff8b..b222441664b 100644 --- a/http/osint/phishing/firefox-phish.yaml +++ b/http/osint/phishing/firefox-phish.yaml @@ -10,7 +10,7 @@ info: - https://www.mozilla.org/en-GB/firefox/new/ metadata: max-request: 1 - tags: phishing,firefox,osint,vuln + tags: phishing,firefox,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/gimp-phish.yaml b/http/osint/phishing/gimp-phish.yaml index 59d8052ad5e..ec3436dfcb4 100644 --- a/http/osint/phishing/gimp-phish.yaml +++ b/http/osint/phishing/gimp-phish.yaml @@ -10,7 +10,7 @@ info: - https://gimp.org metadata: max-request: 1 - tags: phishing,gimp,osint,vuln + tags: phishing,gimp,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/github-phish.yaml b/http/osint/phishing/github-phish.yaml index b772d18beda..c679029b4b6 100644 --- a/http/osint/phishing/github-phish.yaml +++ b/http/osint/phishing/github-phish.yaml @@ -10,7 +10,7 @@ info: - https://github.com metadata: max-request: 1 - tags: phishing,github,osint,vuln + tags: phishing,github,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/google-phish.yaml b/http/osint/phishing/google-phish.yaml index 72bc8264e5b..ed004ef3035 100644 --- a/http/osint/phishing/google-phish.yaml +++ b/http/osint/phishing/google-phish.yaml @@ -10,7 +10,7 @@ info: - https://google.com metadata: max-request: 1 - tags: phishing,google,osint,vuln + tags: phishing,google,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/icloud-phish.yaml b/http/osint/phishing/icloud-phish.yaml index 00fe0dce037..a648901df49 100644 --- a/http/osint/phishing/icloud-phish.yaml +++ b/http/osint/phishing/icloud-phish.yaml @@ -10,7 +10,7 @@ info: - https://icloud.com metadata: max-request: 1 - tags: phishing,icloud,osint,vuln + tags: phishing,icloud,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/instagram-phish.yaml b/http/osint/phishing/instagram-phish.yaml index baf7dce1af0..417690ff175 100644 --- a/http/osint/phishing/instagram-phish.yaml +++ b/http/osint/phishing/instagram-phish.yaml @@ -10,7 +10,7 @@ info: - https://instagram.com metadata: max-request: 1 - tags: phishing,instagram,osint,vuln + tags: phishing,instagram,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/kakao-login-phish.yaml b/http/osint/phishing/kakao-login-phish.yaml index 9d15e053b10..07e395fab2a 100644 --- a/http/osint/phishing/kakao-login-phish.yaml +++ b/http/osint/phishing/kakao-login-phish.yaml @@ -11,7 +11,7 @@ info: - https://www.kakaocorp.com metadata: max-request: 1 - tags: phishing,kakao,osint,vuln + tags: phishing,kakao,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/kaspersky-phish.yaml b/http/osint/phishing/kaspersky-phish.yaml index 10165a8e168..94a5488e6e7 100644 --- a/http/osint/phishing/kaspersky-phish.yaml +++ b/http/osint/phishing/kaspersky-phish.yaml @@ -10,7 +10,7 @@ info: - https://kaspersky.co.uk metadata: max-request: 1 - tags: phishing,kaspersky,osint,vuln + tags: phishing,kaspersky,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/kayak-phish.yaml b/http/osint/phishing/kayak-phish.yaml index 8bc250085b4..3bd5521bf52 100644 --- a/http/osint/phishing/kayak-phish.yaml +++ b/http/osint/phishing/kayak-phish.yaml @@ -10,7 +10,7 @@ info: - https://kayak.co.uk metadata: max-request: 1 - tags: phishing,kayak,osint,vuln + tags: phishing,kayak,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/keepass-phish.yaml b/http/osint/phishing/keepass-phish.yaml index 4db7efb0c1b..811a736e233 100644 --- a/http/osint/phishing/keepass-phish.yaml +++ b/http/osint/phishing/keepass-phish.yaml @@ -10,7 +10,7 @@ info: - https://keepass.info metadata: max-request: 1 - tags: phishing,keepass,osint,vuln + tags: phishing,keepass,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/keepersecurity-phish.yaml b/http/osint/phishing/keepersecurity-phish.yaml index 2c3fc7510b5..692175890f5 100644 --- a/http/osint/phishing/keepersecurity-phish.yaml +++ b/http/osint/phishing/keepersecurity-phish.yaml @@ -10,7 +10,7 @@ info: - https://keepersecurity.com metadata: max-request: 1 - tags: phishing,keepersecurity,osint,vuln + tags: phishing,keepersecurity,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/keybase-phish.yaml b/http/osint/phishing/keybase-phish.yaml index 922ef257930..386be623c84 100644 --- a/http/osint/phishing/keybase-phish.yaml +++ b/http/osint/phishing/keybase-phish.yaml @@ -10,7 +10,7 @@ info: - https://keybase.io metadata: max-request: 1 - tags: phishing,keybase,osint,vuln + tags: phishing,keybase,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/lastpass-phish.yaml b/http/osint/phishing/lastpass-phish.yaml index 3fdf62c7ac1..5be0de5b1c7 100644 --- a/http/osint/phishing/lastpass-phish.yaml +++ b/http/osint/phishing/lastpass-phish.yaml @@ -10,7 +10,7 @@ info: - https://lastpass.com metadata: max-request: 1 - tags: phishing,lastpass,osint,vuln + tags: phishing,lastpass,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/libre-office-phish.yaml b/http/osint/phishing/libre-office-phish.yaml index 180ccd58966..8cadfa0386c 100644 --- a/http/osint/phishing/libre-office-phish.yaml +++ b/http/osint/phishing/libre-office-phish.yaml @@ -10,7 +10,7 @@ info: - https://libreoffice.org metadata: max-request: 1 - tags: phishing,libre-office,osint,vuln + tags: phishing,libre-office,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/linkedin-phish.yaml b/http/osint/phishing/linkedin-phish.yaml index 25b0d755e5b..7fd4c70f5aa 100644 --- a/http/osint/phishing/linkedin-phish.yaml +++ b/http/osint/phishing/linkedin-phish.yaml @@ -10,7 +10,7 @@ info: - https://linkedin.com metadata: max-request: 1 - tags: phishing,linkedin,osint,vuln + tags: phishing,linkedin,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/malwarebytes-phish.yaml b/http/osint/phishing/malwarebytes-phish.yaml index d9c35621345..a5b0f48f7b3 100644 --- a/http/osint/phishing/malwarebytes-phish.yaml +++ b/http/osint/phishing/malwarebytes-phish.yaml @@ -10,7 +10,7 @@ info: - https://malwarebytes.com metadata: max-request: 1 - tags: phishing,malwarebytes,osint,vuln + tags: phishing,malwarebytes,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/mcafee-phish.yaml b/http/osint/phishing/mcafee-phish.yaml index ed89d03ef15..a30002a66e0 100644 --- a/http/osint/phishing/mcafee-phish.yaml +++ b/http/osint/phishing/mcafee-phish.yaml @@ -10,7 +10,7 @@ info: - https://mcafee.com metadata: max-request: 1 - tags: phishing,mcafee,osint,vuln + tags: phishing,mcafee,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/mega-phish.yaml b/http/osint/phishing/mega-phish.yaml index 0724de34e66..7fe35a4b231 100644 --- a/http/osint/phishing/mega-phish.yaml +++ b/http/osint/phishing/mega-phish.yaml @@ -10,7 +10,7 @@ info: - https://mega.io metadata: max-request: 1 - tags: phishing,mega,osint,vuln + tags: phishing,mega,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/messenger-phish.yaml b/http/osint/phishing/messenger-phish.yaml index e38c3163aec..cece4e6b84a 100644 --- a/http/osint/phishing/messenger-phish.yaml +++ b/http/osint/phishing/messenger-phish.yaml @@ -10,7 +10,7 @@ info: - https://messenger.com metadata: max-request: 1 - tags: phishing,messenger,osint,vuln + tags: phishing,messenger,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/microcenter-phish.yaml b/http/osint/phishing/microcenter-phish.yaml index 8a9e3fd6f7d..006645698c6 100644 --- a/http/osint/phishing/microcenter-phish.yaml +++ b/http/osint/phishing/microcenter-phish.yaml @@ -10,7 +10,7 @@ info: - https://microcenter.com metadata: max-request: 1 - tags: phishing,microcenter,osint,vuln + tags: phishing,microcenter,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/microsoft-phish.yaml b/http/osint/phishing/microsoft-phish.yaml index 6212c71b043..5dc4490b8ea 100644 --- a/http/osint/phishing/microsoft-phish.yaml +++ b/http/osint/phishing/microsoft-phish.yaml @@ -11,7 +11,7 @@ info: - https://microsoft.com metadata: max-request: 1 - tags: phishing,microsoft,osint,vuln + tags: phishing,microsoft,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/microsoft-teams-phish.yaml b/http/osint/phishing/microsoft-teams-phish.yaml index 90633ad1c89..e980003cd35 100644 --- a/http/osint/phishing/microsoft-teams-phish.yaml +++ b/http/osint/phishing/microsoft-teams-phish.yaml @@ -10,7 +10,7 @@ info: - https://www.microsoft.com/en-gb/microsoft-teams/download-app metadata: max-request: 1 - tags: phishing,microsoft-teams,osint,vuln + tags: phishing,microsoft-teams,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/naver-login-phish.yaml b/http/osint/phishing/naver-login-phish.yaml index 491db969e6e..23764b5ca82 100644 --- a/http/osint/phishing/naver-login-phish.yaml +++ b/http/osint/phishing/naver-login-phish.yaml @@ -11,7 +11,7 @@ info: - https://www.navercorp.com metadata: max-request: 1 - tags: phishing,naver,osint,vuln + tags: phishing,naver,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/netflix-phish.yaml b/http/osint/phishing/netflix-phish.yaml index 2929a6cb83f..75fc7d3a0aa 100644 --- a/http/osint/phishing/netflix-phish.yaml +++ b/http/osint/phishing/netflix-phish.yaml @@ -10,7 +10,7 @@ info: - https://netflix.com metadata: max-request: 1 - tags: phishing,netflix,osint,vuln + tags: phishing,netflix,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/nordpass-phish.yaml b/http/osint/phishing/nordpass-phish.yaml index 7948f295141..cdf335ac6bc 100644 --- a/http/osint/phishing/nordpass-phish.yaml +++ b/http/osint/phishing/nordpass-phish.yaml @@ -10,7 +10,7 @@ info: - https://nordpass.com metadata: max-request: 1 - tags: phishing,nordpass,osint,vuln + tags: phishing,nordpass,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/norton-phish.yaml b/http/osint/phishing/norton-phish.yaml index 8c058f606ed..f74d06656f3 100644 --- a/http/osint/phishing/norton-phish.yaml +++ b/http/osint/phishing/norton-phish.yaml @@ -10,7 +10,7 @@ info: - https://norton.com metadata: max-request: 1 - tags: phishing,norton,osint,vuln + tags: phishing,norton,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/notion-phish.yaml b/http/osint/phishing/notion-phish.yaml index c0e7b5cc467..971746061da 100644 --- a/http/osint/phishing/notion-phish.yaml +++ b/http/osint/phishing/notion-phish.yaml @@ -10,7 +10,7 @@ info: - https://notion.so metadata: max-request: 1 - tags: phishing,notion,osint,vuln + tags: phishing,notion,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/o2-mobile-phish.yaml b/http/osint/phishing/o2-mobile-phish.yaml index aefa0aded16..22ce0c9cf22 100644 --- a/http/osint/phishing/o2-mobile-phish.yaml +++ b/http/osint/phishing/o2-mobile-phish.yaml @@ -10,7 +10,7 @@ info: - https://o2.co.uk metadata: max-request: 1 - tags: phishing,o2,osint,vuln + tags: phishing,o2,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/openai-phish.yaml b/http/osint/phishing/openai-phish.yaml index 1ac7a53f04d..feb7e19c6ba 100644 --- a/http/osint/phishing/openai-phish.yaml +++ b/http/osint/phishing/openai-phish.yaml @@ -10,7 +10,7 @@ info: - https://openai.com metadata: max-request: 1 - tags: phishing,openai,osint,vuln + tags: phishing,openai,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/opera-phish.yaml b/http/osint/phishing/opera-phish.yaml index ee5eb3604ca..27b2dd5b651 100644 --- a/http/osint/phishing/opera-phish.yaml +++ b/http/osint/phishing/opera-phish.yaml @@ -10,7 +10,7 @@ info: - https://opera.com metadata: max-request: 1 - tags: phishing,opera,osint,vuln + tags: phishing,opera,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/paramountplus-phish.yaml b/http/osint/phishing/paramountplus-phish.yaml index 57f5653424d..3f1c4bf73e1 100644 --- a/http/osint/phishing/paramountplus-phish.yaml +++ b/http/osint/phishing/paramountplus-phish.yaml @@ -10,7 +10,7 @@ info: - https://paramountplus.com metadata: max-request: 1 - tags: phishing,paramountplus,osint,vuln + tags: phishing,paramountplus,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/paypal-phish.yaml b/http/osint/phishing/paypal-phish.yaml index 23e94e3526e..6eeaaf3c1b7 100644 --- a/http/osint/phishing/paypal-phish.yaml +++ b/http/osint/phishing/paypal-phish.yaml @@ -10,7 +10,7 @@ info: - https://paypal.com metadata: max-request: 1 - tags: phishing,paypal,osint,vuln + tags: phishing,paypal,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/pcloud-phish.yaml b/http/osint/phishing/pcloud-phish.yaml index 6399fbdc1e3..b867e5619f3 100644 --- a/http/osint/phishing/pcloud-phish.yaml +++ b/http/osint/phishing/pcloud-phish.yaml @@ -10,7 +10,7 @@ info: - https://pcloud.com metadata: max-request: 1 - tags: phishing,pcloud,osint,vuln + tags: phishing,pcloud,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/pintrest-phish.yaml b/http/osint/phishing/pintrest-phish.yaml index 8847ed5cb9a..c6516cfd85d 100644 --- a/http/osint/phishing/pintrest-phish.yaml +++ b/http/osint/phishing/pintrest-phish.yaml @@ -10,7 +10,7 @@ info: - https://pinterest.com metadata: max-request: 1 - tags: phishing,pinterest,osint,vuln + tags: phishing,pinterest,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/plusnet-phish.yaml b/http/osint/phishing/plusnet-phish.yaml index 156c9859ebd..21439616249 100644 --- a/http/osint/phishing/plusnet-phish.yaml +++ b/http/osint/phishing/plusnet-phish.yaml @@ -10,7 +10,7 @@ info: - https://plus.net metadata: max-request: 1 - tags: phishing,plusnet,osint,vuln + tags: phishing,plusnet,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/proton-phish.yaml b/http/osint/phishing/proton-phish.yaml index 7a69b9006d9..1555cac25ac 100644 --- a/http/osint/phishing/proton-phish.yaml +++ b/http/osint/phishing/proton-phish.yaml @@ -10,7 +10,7 @@ info: - https://proton.me metadata: max-request: 1 - tags: phishing,proton,osint,vuln + tags: phishing,proton,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/putty-phish.yaml b/http/osint/phishing/putty-phish.yaml index 7f0f9f2b62e..a986f3563f5 100644 --- a/http/osint/phishing/putty-phish.yaml +++ b/http/osint/phishing/putty-phish.yaml @@ -10,7 +10,7 @@ info: - https://putty.org metadata: max-request: 1 - tags: phishing,putty,osint,vuln + tags: phishing,putty,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/python-phish.yaml b/http/osint/phishing/python-phish.yaml index 97ddf1d77d4..74cb1d295cd 100644 --- a/http/osint/phishing/python-phish.yaml +++ b/http/osint/phishing/python-phish.yaml @@ -10,7 +10,7 @@ info: - https://python.org metadata: max-request: 1 - tags: phishing,python,osint,vuln + tags: phishing,python,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/quora-phish.yaml b/http/osint/phishing/quora-phish.yaml index c367b0d785f..39ba1178a80 100644 --- a/http/osint/phishing/quora-phish.yaml +++ b/http/osint/phishing/quora-phish.yaml @@ -10,7 +10,7 @@ info: - https://quora.com metadata: max-request: 1 - tags: phishing,quora,osint,vuln + tags: phishing,quora,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/reddit-phish.yaml b/http/osint/phishing/reddit-phish.yaml index 8c87bc49c31..cb7db826256 100644 --- a/http/osint/phishing/reddit-phish.yaml +++ b/http/osint/phishing/reddit-phish.yaml @@ -10,7 +10,7 @@ info: - https://reddit.com metadata: max-request: 1 - tags: phishing,reddit,osint,vuln + tags: phishing,reddit,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/roblox-phish.yaml b/http/osint/phishing/roblox-phish.yaml index 17b86837624..89ede7fb5d7 100644 --- a/http/osint/phishing/roblox-phish.yaml +++ b/http/osint/phishing/roblox-phish.yaml @@ -10,7 +10,7 @@ info: - https://roblox.com metadata: max-request: 1 - tags: phishing,roblox,osint,vuln + tags: phishing,roblox,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/roboform-phish.yaml b/http/osint/phishing/roboform-phish.yaml index f484c513df0..6615345a010 100644 --- a/http/osint/phishing/roboform-phish.yaml +++ b/http/osint/phishing/roboform-phish.yaml @@ -10,7 +10,7 @@ info: - https://roboform.com metadata: max-request: 1 - tags: phishing,roboform,osint,vuln + tags: phishing,roboform,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/royal-mail-phish.yaml b/http/osint/phishing/royal-mail-phish.yaml index 2f9fb990c1b..95849b3dbf1 100644 --- a/http/osint/phishing/royal-mail-phish.yaml +++ b/http/osint/phishing/royal-mail-phish.yaml @@ -10,7 +10,7 @@ info: - https://royalmail.com metadata: max-request: 1 - tags: phishing,royal-mail,osint,vuln + tags: phishing,royal-mail,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/samsung-phish.yaml b/http/osint/phishing/samsung-phish.yaml index 71b41858fbe..b130c7d1473 100644 --- a/http/osint/phishing/samsung-phish.yaml +++ b/http/osint/phishing/samsung-phish.yaml @@ -10,7 +10,7 @@ info: - https://samsung.com metadata: max-request: 1 - tags: phishing,samsung,osint,vuln + tags: phishing,samsung,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/signal-phish.yaml b/http/osint/phishing/signal-phish.yaml index 35cd614dc84..7cdf283a304 100644 --- a/http/osint/phishing/signal-phish.yaml +++ b/http/osint/phishing/signal-phish.yaml @@ -10,7 +10,7 @@ info: - https://signal.org metadata: max-request: 1 - tags: phishing,signal,osint,vuln + tags: phishing,signal,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/sky-phish.yaml b/http/osint/phishing/sky-phish.yaml index 45877f5b9b4..4aad24b6692 100644 --- a/http/osint/phishing/sky-phish.yaml +++ b/http/osint/phishing/sky-phish.yaml @@ -10,7 +10,7 @@ info: - https://sky.com metadata: max-request: 1 - tags: phishing,sky,osint,vuln + tags: phishing,sky,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/skype-phish.yaml b/http/osint/phishing/skype-phish.yaml index a021440e0a9..7939bbc422c 100644 --- a/http/osint/phishing/skype-phish.yaml +++ b/http/osint/phishing/skype-phish.yaml @@ -10,7 +10,7 @@ info: - https://skype.com metadata: max-request: 1 - tags: phishing,skype,osint,vuln + tags: phishing,skype,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/skyscanner-phish.yaml b/http/osint/phishing/skyscanner-phish.yaml index c2fa1cfd239..152287ced09 100644 --- a/http/osint/phishing/skyscanner-phish.yaml +++ b/http/osint/phishing/skyscanner-phish.yaml @@ -10,7 +10,7 @@ info: - https://skyscanner.net metadata: max-request: 1 - tags: phishing,skyscanner,osint,vuln + tags: phishing,skyscanner,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/slack-phish.yaml b/http/osint/phishing/slack-phish.yaml index 8b05e9b69c1..08e64bd0a10 100644 --- a/http/osint/phishing/slack-phish.yaml +++ b/http/osint/phishing/slack-phish.yaml @@ -10,7 +10,7 @@ info: - https://slack.com metadata: max-request: 1 - tags: phishing,slack,osint,vuln + tags: phishing,slack,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/sophos-phish.yaml b/http/osint/phishing/sophos-phish.yaml index 8a73f747284..bc2ef8f4078 100644 --- a/http/osint/phishing/sophos-phish.yaml +++ b/http/osint/phishing/sophos-phish.yaml @@ -10,7 +10,7 @@ info: - https://sophos.com metadata: max-request: 1 - tags: phishing,sophos,osint,vuln + tags: phishing,sophos,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/spotify-phish.yaml b/http/osint/phishing/spotify-phish.yaml index bcab5caadbc..f98a5e17c74 100644 --- a/http/osint/phishing/spotify-phish.yaml +++ b/http/osint/phishing/spotify-phish.yaml @@ -10,7 +10,7 @@ info: - https://spotify.com metadata: max-request: 1 - tags: phishing,spotify,osint,vuln + tags: phishing,spotify,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/steam-phish.yaml b/http/osint/phishing/steam-phish.yaml index ec629c12584..7ea2905c2ff 100644 --- a/http/osint/phishing/steam-phish.yaml +++ b/http/osint/phishing/steam-phish.yaml @@ -10,7 +10,7 @@ info: - https://steampowered.com metadata: max-request: 1 - tags: phishing,steam,osint,vuln + tags: phishing,steam,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/sync-storage-phish.yaml b/http/osint/phishing/sync-storage-phish.yaml index 34bdfe4e990..d67bd40bbd9 100644 --- a/http/osint/phishing/sync-storage-phish.yaml +++ b/http/osint/phishing/sync-storage-phish.yaml @@ -10,7 +10,7 @@ info: - https://sync.com metadata: max-request: 1 - tags: phishing,sync,osint,vuln + tags: phishing,sync,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/target-phish.yaml b/http/osint/phishing/target-phish.yaml index 56c4899bb19..8c668cdc5ee 100644 --- a/http/osint/phishing/target-phish.yaml +++ b/http/osint/phishing/target-phish.yaml @@ -10,7 +10,7 @@ info: - https://target.com metadata: max-request: 1 - tags: phishing,target,osint,vuln + tags: phishing,target,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/teamviewer-phish.yaml b/http/osint/phishing/teamviewer-phish.yaml index 8a54b3e3902..3f1badec6aa 100644 --- a/http/osint/phishing/teamviewer-phish.yaml +++ b/http/osint/phishing/teamviewer-phish.yaml @@ -10,7 +10,7 @@ info: - https://teamviewer.com metadata: max-request: 1 - tags: phishing,teamviewer,osint,vuln + tags: phishing,teamviewer,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/telegram-phish.yaml b/http/osint/phishing/telegram-phish.yaml index 4a390040e44..0d89d1370d2 100644 --- a/http/osint/phishing/telegram-phish.yaml +++ b/http/osint/phishing/telegram-phish.yaml @@ -10,7 +10,7 @@ info: - https://telegram.org metadata: max-request: 1 - tags: phishing,telegram,osint,vuln + tags: phishing,telegram,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/three-mobile-phish.yaml b/http/osint/phishing/three-mobile-phish.yaml index c8e8b66e91c..81e7f43863f 100644 --- a/http/osint/phishing/three-mobile-phish.yaml +++ b/http/osint/phishing/three-mobile-phish.yaml @@ -10,7 +10,7 @@ info: - https://three.co.uk metadata: max-request: 1 - tags: phishing,three,osint,vuln + tags: phishing,three,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/thunderbird-phish.yaml b/http/osint/phishing/thunderbird-phish.yaml index 47b43115610..8b0de501c7a 100644 --- a/http/osint/phishing/thunderbird-phish.yaml +++ b/http/osint/phishing/thunderbird-phish.yaml @@ -10,7 +10,7 @@ info: - https://thunderbird.net metadata: max-request: 1 - tags: phishing,thunderbird,osint,vuln + tags: phishing,thunderbird,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/ticketmaster-phish.yaml b/http/osint/phishing/ticketmaster-phish.yaml index ac9802bdaf1..b17dfdb17f5 100644 --- a/http/osint/phishing/ticketmaster-phish.yaml +++ b/http/osint/phishing/ticketmaster-phish.yaml @@ -10,7 +10,7 @@ info: - https://ticketmaster.com metadata: max-request: 1 - tags: phishing,ticket-master,osint,vuln + tags: phishing,ticket-master,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/tiktok-phish.yaml b/http/osint/phishing/tiktok-phish.yaml index 7ca366de840..fe20ea0456d 100644 --- a/http/osint/phishing/tiktok-phish.yaml +++ b/http/osint/phishing/tiktok-phish.yaml @@ -10,7 +10,7 @@ info: - https://tiktok.com metadata: max-request: 1 - tags: phishing,tiktok,osint,vuln + tags: phishing,tiktok,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/trading212-phish.yaml b/http/osint/phishing/trading212-phish.yaml index e311d702c1c..f6a4355b407 100644 --- a/http/osint/phishing/trading212-phish.yaml +++ b/http/osint/phishing/trading212-phish.yaml @@ -10,7 +10,7 @@ info: - https://trading212.com metadata: max-request: 1 - tags: phishing,trading212,osint,vuln + tags: phishing,trading212,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/trend-micro-phish.yaml b/http/osint/phishing/trend-micro-phish.yaml index 0b878df24a0..212ec6b39ac 100644 --- a/http/osint/phishing/trend-micro-phish.yaml +++ b/http/osint/phishing/trend-micro-phish.yaml @@ -10,7 +10,7 @@ info: - https://trendmicro.com metadata: max-request: 1 - tags: phishing,trend-micro,osint,vuln + tags: phishing,trend-micro,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/trip-phish.yaml b/http/osint/phishing/trip-phish.yaml index 6b02185410b..cf0738d641b 100644 --- a/http/osint/phishing/trip-phish.yaml +++ b/http/osint/phishing/trip-phish.yaml @@ -10,7 +10,7 @@ info: - https://trip.com metadata: max-request: 1 - tags: phishing,trip,osint,vuln + tags: phishing,trip,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/twitch-phish.yaml b/http/osint/phishing/twitch-phish.yaml index 5014c094845..e33a1ce9831 100644 --- a/http/osint/phishing/twitch-phish.yaml +++ b/http/osint/phishing/twitch-phish.yaml @@ -10,7 +10,7 @@ info: - https://twitch.tv metadata: max-request: 1 - tags: phishing,twitch,osint,vuln + tags: phishing,twitch,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/uber-phish.yaml b/http/osint/phishing/uber-phish.yaml index ee61da0f8df..8c5a5794da4 100644 --- a/http/osint/phishing/uber-phish.yaml +++ b/http/osint/phishing/uber-phish.yaml @@ -10,7 +10,7 @@ info: - https://uber.com metadata: max-request: 1 - tags: phishing,uber,osint,vuln + tags: phishing,uber,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/visual-studio-code-phish.yaml b/http/osint/phishing/visual-studio-code-phish.yaml index 64184728d0a..798b8bc6abd 100644 --- a/http/osint/phishing/visual-studio-code-phish.yaml +++ b/http/osint/phishing/visual-studio-code-phish.yaml @@ -10,7 +10,7 @@ info: - https://visualstudio.com metadata: max-request: 1 - tags: phishing,visual-studio-code,osint,vuln + tags: phishing,visual-studio-code,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/vlc-player-phish.yaml b/http/osint/phishing/vlc-player-phish.yaml index f2deaa6977a..9e7a0b421b2 100644 --- a/http/osint/phishing/vlc-player-phish.yaml +++ b/http/osint/phishing/vlc-player-phish.yaml @@ -10,7 +10,7 @@ info: - https://www.videolan.org metadata: max-request: 1 - tags: phishing,vlc-media,osint,vuln + tags: phishing,vlc-media,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/vodafone-phish.yaml b/http/osint/phishing/vodafone-phish.yaml index 31ab8fe1852..60b65e9e66c 100644 --- a/http/osint/phishing/vodafone-phish.yaml +++ b/http/osint/phishing/vodafone-phish.yaml @@ -10,7 +10,7 @@ info: - https://vodafone.co.uk metadata: max-request: 1 - tags: phishing,vodafone,osint,vuln + tags: phishing,vodafone,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/vultr-phish.yaml b/http/osint/phishing/vultr-phish.yaml index 3e2ef35e220..07b248c1e40 100644 --- a/http/osint/phishing/vultr-phish.yaml +++ b/http/osint/phishing/vultr-phish.yaml @@ -10,7 +10,7 @@ info: - https://my.vultr.com/ metadata: max-request: 1 - tags: phishing,vultr,osint,vuln + tags: phishing,vultr,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/walmart-phish.yaml b/http/osint/phishing/walmart-phish.yaml index 48ab07af811..3f6121ef720 100644 --- a/http/osint/phishing/walmart-phish.yaml +++ b/http/osint/phishing/walmart-phish.yaml @@ -10,7 +10,7 @@ info: - https://walmart.com metadata: max-request: 1 - tags: phishing,walmart,osint,vuln + tags: phishing,walmart,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/wetransfer-phish.yaml b/http/osint/phishing/wetransfer-phish.yaml index e73cedbd0fc..7c1936cd6e8 100644 --- a/http/osint/phishing/wetransfer-phish.yaml +++ b/http/osint/phishing/wetransfer-phish.yaml @@ -10,7 +10,7 @@ info: - https://wetransfer.com metadata: max-request: 1 - tags: phishing,wetransfer,osint,vuln + tags: phishing,wetransfer,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/whatsapp-phish.yaml b/http/osint/phishing/whatsapp-phish.yaml index 185af1c4218..3573e424beb 100644 --- a/http/osint/phishing/whatsapp-phish.yaml +++ b/http/osint/phishing/whatsapp-phish.yaml @@ -10,7 +10,7 @@ info: - https://whatsapp.com metadata: max-request: 1 - tags: phishing,whatsapp,osint,vuln + tags: phishing,whatsapp,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/wikipedia-phish.yaml b/http/osint/phishing/wikipedia-phish.yaml index afb42f3ada4..44ead50bbc7 100644 --- a/http/osint/phishing/wikipedia-phish.yaml +++ b/http/osint/phishing/wikipedia-phish.yaml @@ -10,7 +10,7 @@ info: - https://wikipedia.com metadata: max-request: 1 - tags: phishing,wikipedia,osint,vuln + tags: phishing,wikipedia,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/winscp-phish.yaml b/http/osint/phishing/winscp-phish.yaml index c175a2a7d83..39fd08e4e4b 100644 --- a/http/osint/phishing/winscp-phish.yaml +++ b/http/osint/phishing/winscp-phish.yaml @@ -10,7 +10,7 @@ info: - https://winscp.net metadata: max-request: 1 - tags: phishing,winscp,osint,vuln + tags: phishing,winscp,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/yahoo-phish.yaml b/http/osint/phishing/yahoo-phish.yaml index 1803427c519..113d03fc000 100644 --- a/http/osint/phishing/yahoo-phish.yaml +++ b/http/osint/phishing/yahoo-phish.yaml @@ -10,7 +10,7 @@ info: - https://yahoo.com metadata: max-request: 1 - tags: phishing,yahoo,osint,vuln + tags: phishing,yahoo,osint,discovery http: - method: GET path: diff --git a/http/osint/phishing/zoom-phish.yaml b/http/osint/phishing/zoom-phish.yaml index 60c388e47f0..a7b215e4985 100644 --- a/http/osint/phishing/zoom-phish.yaml +++ b/http/osint/phishing/zoom-phish.yaml @@ -10,7 +10,7 @@ info: - https://zoom.us metadata: max-request: 1 - tags: phishing,zoom,osint,vuln + tags: phishing,zoom,osint,discovery http: - method: GET path: diff --git a/http/token-spray/api-1forge.yaml b/http/token-spray/api-1forge.yaml index 7564a32650c..ea1dc6bf69b 100644 --- a/http/token-spray/api-1forge.yaml +++ b/http/token-spray/api-1forge.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/1forge metadata: max-request: 1 - tags: token-spray,1forge,vuln + tags: token-spray,1forge self-contained: true diff --git a/http/token-spray/api-abstract-company-enrichment.yaml b/http/token-spray/api-abstract-company-enrichment.yaml index 03dc7badfd5..e63cda24746 100644 --- a/http/token-spray/api-abstract-company-enrichment.yaml +++ b/http/token-spray/api-abstract-company-enrichment.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-company-enrichment metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-email-validation.yaml b/http/token-spray/api-abstract-email-validation.yaml index 29732bd86b6..4f1ff8b79e4 100644 --- a/http/token-spray/api-abstract-email-validation.yaml +++ b/http/token-spray/api-abstract-email-validation.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-email-validation metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-exchange-rates.yaml b/http/token-spray/api-abstract-exchange-rates.yaml index a693d2b3848..4bed7b7f6e3 100644 --- a/http/token-spray/api-abstract-exchange-rates.yaml +++ b/http/token-spray/api-abstract-exchange-rates.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-exchange-rates metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-iban-validation.yaml b/http/token-spray/api-abstract-iban-validation.yaml index 7dae79a749d..eb62223a78b 100644 --- a/http/token-spray/api-abstract-iban-validation.yaml +++ b/http/token-spray/api-abstract-iban-validation.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-iban-validation metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-image-processing.yaml b/http/token-spray/api-abstract-image-processing.yaml index 56cabf76e90..1212d64c02b 100644 --- a/http/token-spray/api-abstract-image-processing.yaml +++ b/http/token-spray/api-abstract-image-processing.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-image-processing metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-ip-geolocation.yaml b/http/token-spray/api-abstract-ip-geolocation.yaml index c652e7081e4..5e9029bce1b 100644 --- a/http/token-spray/api-abstract-ip-geolocation.yaml +++ b/http/token-spray/api-abstract-ip-geolocation.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-ip-geolocation metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-phone-validation.yaml b/http/token-spray/api-abstract-phone-validation.yaml index ef08db34e9e..364443616f0 100644 --- a/http/token-spray/api-abstract-phone-validation.yaml +++ b/http/token-spray/api-abstract-phone-validation.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-phone-validation metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-public-holidays.yaml b/http/token-spray/api-abstract-public-holidays.yaml index d3d01b30565..0d55c6f7d14 100644 --- a/http/token-spray/api-abstract-public-holidays.yaml +++ b/http/token-spray/api-abstract-public-holidays.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-public-holidays metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-timezone.yaml b/http/token-spray/api-abstract-timezone.yaml index cd43fc14479..274271a5a1a 100644 --- a/http/token-spray/api-abstract-timezone.yaml +++ b/http/token-spray/api-abstract-timezone.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-timezone metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-user-avatars.yaml b/http/token-spray/api-abstract-user-avatars.yaml index 2732b0ecff7..c64ad631998 100644 --- a/http/token-spray/api-abstract-user-avatars.yaml +++ b/http/token-spray/api-abstract-user-avatars.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-user-avatars metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-vat-validation-rates.yaml b/http/token-spray/api-abstract-vat-validation-rates.yaml index 8d8dceae1df..824f0100551 100644 --- a/http/token-spray/api-abstract-vat-validation-rates.yaml +++ b/http/token-spray/api-abstract-vat-validation-rates.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-vat-validation-rates metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-website-scraping.yaml b/http/token-spray/api-abstract-website-scraping.yaml index 569389ec9d7..d9b13ce35cd 100644 --- a/http/token-spray/api-abstract-website-scraping.yaml +++ b/http/token-spray/api-abstract-website-scraping.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-website-scraping metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abstract-website-screenshot.yaml b/http/token-spray/api-abstract-website-screenshot.yaml index 9fd64f6813f..9c692142e74 100644 --- a/http/token-spray/api-abstract-website-screenshot.yaml +++ b/http/token-spray/api-abstract-website-screenshot.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/abstract-website-screenshot metadata: max-request: 1 - tags: token-spray,abstractapi,vuln + tags: token-spray,abstractapi self-contained: true diff --git a/http/token-spray/api-abuseipdb.yaml b/http/token-spray/api-abuseipdb.yaml index 2611a38f996..a0f18848b6b 100644 --- a/http/token-spray/api-abuseipdb.yaml +++ b/http/token-spray/api-abuseipdb.yaml @@ -14,7 +14,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: token-spray,abuseipdb,vuln + tags: token-spray,abuseipdb self-contained: true diff --git a/http/token-spray/api-accuweather.yaml b/http/token-spray/api-accuweather.yaml index f0dd0c5e966..ccc69b90ddf 100644 --- a/http/token-spray/api-accuweather.yaml +++ b/http/token-spray/api-accuweather.yaml @@ -8,7 +8,7 @@ info: - https://developer.accuweather.com/apis metadata: max-request: 1 - tags: token-spray,accuweather,vuln + tags: token-spray,accuweather self-contained: true diff --git a/http/token-spray/api-adafruit-io.yaml b/http/token-spray/api-adafruit-io.yaml index 757bb173d0e..87caa07064e 100644 --- a/http/token-spray/api-adafruit-io.yaml +++ b/http/token-spray/api-adafruit-io.yaml @@ -8,7 +8,7 @@ info: - https://io.adafruit.com/api/docs/ metadata: max-request: 1 - tags: token-spray,adafruit,vuln + tags: token-spray,adafruit self-contained: true diff --git a/http/token-spray/api-adoptapet.yaml b/http/token-spray/api-adoptapet.yaml index 99b5863f1b8..a73211ab572 100644 --- a/http/token-spray/api-adoptapet.yaml +++ b/http/token-spray/api-adoptapet.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/adoptapet metadata: max-request: 1 - tags: token-spray,adoptapet,vuln + tags: token-spray,adoptapet self-contained: true diff --git a/http/token-spray/api-airtable.yaml b/http/token-spray/api-airtable.yaml index b3ebed187fb..02238d82ea4 100644 --- a/http/token-spray/api-airtable.yaml +++ b/http/token-spray/api-airtable.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/airtable metadata: max-request: 1 - tags: token-spray,airtable,vuln + tags: token-spray,airtable self-contained: true diff --git a/http/token-spray/api-alchemy.yaml b/http/token-spray/api-alchemy.yaml index 8adc159c7a1..375abbdb284 100644 --- a/http/token-spray/api-alchemy.yaml +++ b/http/token-spray/api-alchemy.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/alchemy metadata: max-request: 1 - tags: token-spray,alchemy,vuln + tags: token-spray,alchemy self-contained: true diff --git a/http/token-spray/api-alienvault.yaml b/http/token-spray/api-alienvault.yaml index fe508cb9f44..935e8c3d0d7 100644 --- a/http/token-spray/api-alienvault.yaml +++ b/http/token-spray/api-alienvault.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/alienvault-open-threat-exchange metadata: max-request: 1 - tags: token-spray,alienvault,exchange,vuln + tags: token-spray,alienvault,exchange self-contained: true diff --git a/http/token-spray/api-amdoren.yaml b/http/token-spray/api-amdoren.yaml index 6bac833eb76..28f57777b16 100644 --- a/http/token-spray/api-amdoren.yaml +++ b/http/token-spray/api-amdoren.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/amdoren metadata: max-request: 1 - tags: token-spray,amdoren,vuln + tags: token-spray,amdoren self-contained: true diff --git a/http/token-spray/api-aniapi.yaml b/http/token-spray/api-aniapi.yaml index 9ce911ccb58..2e83df45ed4 100644 --- a/http/token-spray/api-aniapi.yaml +++ b/http/token-spray/api-aniapi.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/aniapi metadata: max-request: 1 - tags: token-spray,aniapi,vuln + tags: token-spray,aniapi self-contained: true diff --git a/http/token-spray/api-api2convert.yaml b/http/token-spray/api-api2convert.yaml index a966bea4763..8151ff224eb 100644 --- a/http/token-spray/api-api2convert.yaml +++ b/http/token-spray/api-api2convert.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/api2convert metadata: max-request: 1 - tags: token-spray,api2convert,vuln + tags: token-spray,api2convert self-contained: true diff --git a/http/token-spray/api-apiflash.yaml b/http/token-spray/api-apiflash.yaml index 3f8b4f3bcbe..9612e4c2b30 100644 --- a/http/token-spray/api-apiflash.yaml +++ b/http/token-spray/api-apiflash.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/apiflash metadata: max-request: 1 - tags: token-spray,apiflash,vuln + tags: token-spray,apiflash self-contained: true diff --git a/http/token-spray/api-apigee-edge.yaml b/http/token-spray/api-apigee-edge.yaml index 01b20e69f78..64e145ff525 100644 --- a/http/token-spray/api-apigee-edge.yaml +++ b/http/token-spray/api-apigee-edge.yaml @@ -8,7 +8,7 @@ info: - https://apidocs.apigee.com/apis metadata: max-request: 1 - tags: token-spray,apigee,vuln + tags: token-spray,apigee self-contained: true diff --git a/http/token-spray/api-appveyor.yaml b/http/token-spray/api-appveyor.yaml index cbea1c62fc7..e2c5f7307ae 100644 --- a/http/token-spray/api-appveyor.yaml +++ b/http/token-spray/api-appveyor.yaml @@ -8,7 +8,7 @@ info: - https://www.appveyor.com/docs/api/ metadata: max-request: 1 - tags: token-spray,appveyor,vuln + tags: token-spray,appveyor self-contained: true diff --git a/http/token-spray/api-asana.yaml b/http/token-spray/api-asana.yaml index b6995164aa0..96dcd24858d 100644 --- a/http/token-spray/api-asana.yaml +++ b/http/token-spray/api-asana.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/asana metadata: max-request: 1 - tags: token-spray,asana,vuln + tags: token-spray,asana self-contained: true diff --git a/http/token-spray/api-bhagavadgita.yaml b/http/token-spray/api-bhagavadgita.yaml index b772a1ea0c0..cc3a87c8b19 100644 --- a/http/token-spray/api-bhagavadgita.yaml +++ b/http/token-spray/api-bhagavadgita.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/bhagavad-gita metadata: max-request: 1 - tags: token-spray,bhagavadgita,vuln + tags: token-spray,bhagavadgita self-contained: true diff --git a/http/token-spray/api-bible.yaml b/http/token-spray/api-bible.yaml index 7af31a4e7c4..6b47038aeca 100644 --- a/http/token-spray/api-bible.yaml +++ b/http/token-spray/api-bible.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/api-bible metadata: max-request: 1 - tags: token-spray,bible,vuln + tags: token-spray,bible self-contained: true diff --git a/http/token-spray/api-binance.yaml b/http/token-spray/api-binance.yaml index e1ccde66aa4..15d987b69c6 100644 --- a/http/token-spray/api-binance.yaml +++ b/http/token-spray/api-binance.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/binance metadata: max-request: 1 - tags: token-spray,binance,vuln + tags: token-spray,binance self-contained: true diff --git a/http/token-spray/api-binaryedge.yaml b/http/token-spray/api-binaryedge.yaml index 5176ef2e052..8f8b1c15ac5 100644 --- a/http/token-spray/api-binaryedge.yaml +++ b/http/token-spray/api-binaryedge.yaml @@ -11,7 +11,7 @@ info: - https://docs.binaryedge.io metadata: max-request: 1 - tags: recon,binaryedge,token-spray,vuln + tags: recon,binaryedge,token-spray self-contained: true diff --git a/http/token-spray/api-bingmaps.yaml b/http/token-spray/api-bingmaps.yaml index cad150e6b9e..5b46523fa9d 100644 --- a/http/token-spray/api-bingmaps.yaml +++ b/http/token-spray/api-bingmaps.yaml @@ -8,7 +8,7 @@ info: - https://docs.microsoft.com/en-us/bingmaps/rest-services/locations/find-a-location-by-address metadata: max-request: 1 - tags: token-spray,bing,maps,bingmaps,vuln + tags: token-spray,bing,maps,bingmaps self-contained: true diff --git a/http/token-spray/api-bitcoinaverage.yaml b/http/token-spray/api-bitcoinaverage.yaml index 1d803b05f8e..362a9e28a33 100644 --- a/http/token-spray/api-bitcoinaverage.yaml +++ b/http/token-spray/api-bitcoinaverage.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/bitcoinaverage metadata: max-request: 1 - tags: token-spray,bitcoinaverage,vuln + tags: token-spray,bitcoinaverage self-contained: true diff --git a/http/token-spray/api-bitly.yaml b/http/token-spray/api-bitly.yaml index 01078e21467..976552f65c6 100644 --- a/http/token-spray/api-bitly.yaml +++ b/http/token-spray/api-bitly.yaml @@ -8,7 +8,7 @@ info: - https://dev.bitly.com/api-reference metadata: max-request: 1 - tags: token-spray,bitly,vuln + tags: token-spray,bitly self-contained: true diff --git a/http/token-spray/api-bitquery.yaml b/http/token-spray/api-bitquery.yaml index 29294a0937a..ca48e0b0b09 100644 --- a/http/token-spray/api-bitquery.yaml +++ b/http/token-spray/api-bitquery.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/bitquery metadata: max-request: 1 - tags: token-spray,bitquery,vuln + tags: token-spray,bitquery self-contained: true diff --git a/http/token-spray/api-bitrise.yaml b/http/token-spray/api-bitrise.yaml index c1dc6f94712..b75fae2bdcd 100644 --- a/http/token-spray/api-bitrise.yaml +++ b/http/token-spray/api-bitrise.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/bitrise metadata: max-request: 1 - tags: token-spray,bitrise,vuln + tags: token-spray,bitrise self-contained: true diff --git a/http/token-spray/api-blitapp.yaml b/http/token-spray/api-blitapp.yaml index 53ad357938d..3dadb00455f 100644 --- a/http/token-spray/api-blitapp.yaml +++ b/http/token-spray/api-blitapp.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/blitapp metadata: max-request: 1 - tags: token-spray,blitapp,vuln + tags: token-spray,blitapp self-contained: true diff --git a/http/token-spray/api-block.yaml b/http/token-spray/api-block.yaml index b9baee0ad1a..ff19987373d 100644 --- a/http/token-spray/api-block.yaml +++ b/http/token-spray/api-block.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/block metadata: max-request: 1 - tags: token-spray,block,vuln + tags: token-spray,block self-contained: true diff --git a/http/token-spray/api-blockchain.yaml b/http/token-spray/api-blockchain.yaml index 297388b5229..f8a5bd87735 100644 --- a/http/token-spray/api-blockchain.yaml +++ b/http/token-spray/api-blockchain.yaml @@ -12,7 +12,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: token-spray,blockchain,vuln + tags: token-spray,blockchain self-contained: true diff --git a/http/token-spray/api-blockfrost.yaml b/http/token-spray/api-blockfrost.yaml index bcc37372bdb..c792eaf5f34 100644 --- a/http/token-spray/api-blockfrost.yaml +++ b/http/token-spray/api-blockfrost.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/blockfrost metadata: max-request: 1 - tags: token-spray,blockfrost,vuln + tags: token-spray,blockfrost self-contained: true diff --git a/http/token-spray/api-box.yaml b/http/token-spray/api-box.yaml index 61134f6abbb..c41e4a47762 100644 --- a/http/token-spray/api-box.yaml +++ b/http/token-spray/api-box.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/box metadata: max-request: 1 - tags: token-spray,box,vuln + tags: token-spray,box self-contained: true diff --git a/http/token-spray/api-bravenewcoin.yaml b/http/token-spray/api-bravenewcoin.yaml index 0d759b143e3..814a33128fc 100644 --- a/http/token-spray/api-bravenewcoin.yaml +++ b/http/token-spray/api-bravenewcoin.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/brave-new-coin metadata: max-request: 1 - tags: token-spray,bravenewcoin,vuln + tags: token-spray,bravenewcoin self-contained: true diff --git a/http/token-spray/api-browshot.yaml b/http/token-spray/api-browshot.yaml index f9c5c614320..74832d35c87 100644 --- a/http/token-spray/api-browshot.yaml +++ b/http/token-spray/api-browshot.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/browshot metadata: max-request: 1 - tags: token-spray,browshot,vuln + tags: token-spray,browshot self-contained: true diff --git a/http/token-spray/api-buildkite.yaml b/http/token-spray/api-buildkite.yaml index 8de95a005dc..40d589cb7a6 100644 --- a/http/token-spray/api-buildkite.yaml +++ b/http/token-spray/api-buildkite.yaml @@ -8,7 +8,7 @@ info: - https://buildkite.com/docs/apis/rest-api/user metadata: max-request: 1 - tags: token-spray,buildkite,vuln + tags: token-spray,buildkite self-contained: true diff --git a/http/token-spray/api-buttercms.yaml b/http/token-spray/api-buttercms.yaml index 1fafc072c3a..c5b866d4353 100644 --- a/http/token-spray/api-buttercms.yaml +++ b/http/token-spray/api-buttercms.yaml @@ -8,7 +8,7 @@ info: - https://buttercms.com/docs/api/#introduction metadata: max-request: 1 - tags: token-spray,buttercms,vuln + tags: token-spray,buttercms self-contained: true diff --git a/http/token-spray/api-c99.yaml b/http/token-spray/api-c99.yaml index a2b031de48d..3323c306e17 100644 --- a/http/token-spray/api-c99.yaml +++ b/http/token-spray/api-c99.yaml @@ -8,7 +8,7 @@ info: - https://api.c99.nl metadata: max-request: 1 - tags: c99,api,token-spray,vuln + tags: c99,api,token-spray self-contained: true diff --git a/http/token-spray/api-calendarific.yaml b/http/token-spray/api-calendarific.yaml index a8a7f8e1eb3..f7c4a77433c 100644 --- a/http/token-spray/api-calendarific.yaml +++ b/http/token-spray/api-calendarific.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/calendarific metadata: max-request: 1 - tags: token-spray,calendarific,vuln + tags: token-spray,calendarific self-contained: true diff --git a/http/token-spray/api-calendly.yaml b/http/token-spray/api-calendly.yaml index a158ce47b85..3465197c963 100644 --- a/http/token-spray/api-calendly.yaml +++ b/http/token-spray/api-calendly.yaml @@ -8,7 +8,7 @@ info: - https://calendly.stoplight.io/docs/api-docs-v1/b3A6MTg3MDczNg-about-me metadata: max-request: 1 - tags: token-spray,calendly,vuln + tags: token-spray,calendly self-contained: true diff --git a/http/token-spray/api-chaos.yaml b/http/token-spray/api-chaos.yaml index f6095fdaf84..a0d4d78ad54 100644 --- a/http/token-spray/api-chaos.yaml +++ b/http/token-spray/api-chaos.yaml @@ -8,7 +8,7 @@ info: - https://chaos.projectdiscovery.io/#/docs metadata: max-request: 1 - tags: recon,chaos,token-spray,projectdiscovery,vuln + tags: recon,chaos,token-spray,projectdiscovery self-contained: true diff --git a/http/token-spray/api-charity.yaml b/http/token-spray/api-charity.yaml index e24d84de3d0..f93a07e3c5b 100644 --- a/http/token-spray/api-charity.yaml +++ b/http/token-spray/api-charity.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/charity-search metadata: max-request: 1 - tags: token-spray,charity,search,vuln + tags: token-spray,charity,search self-contained: true diff --git a/http/token-spray/api-circleci.yaml b/http/token-spray/api-circleci.yaml index b33238f659d..65bc8c00dcf 100644 --- a/http/token-spray/api-circleci.yaml +++ b/http/token-spray/api-circleci.yaml @@ -8,7 +8,7 @@ info: - https://circleci.com/docs/api/v1 metadata: max-request: 1 - tags: token-spray,circleci,vuln + tags: token-spray,circleci self-contained: true diff --git a/http/token-spray/api-clearbit.yaml b/http/token-spray/api-clearbit.yaml index cb924aab43d..1b9683f050b 100644 --- a/http/token-spray/api-clearbit.yaml +++ b/http/token-spray/api-clearbit.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/clearbit metadata: max-request: 1 - tags: token-spray,clearbit,vuln + tags: token-spray,clearbit self-contained: true diff --git a/http/token-spray/api-clickup.yaml b/http/token-spray/api-clickup.yaml index 4543ba06f68..051685ea271 100644 --- a/http/token-spray/api-clickup.yaml +++ b/http/token-spray/api-clickup.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/clickup metadata: max-request: 1 - tags: token-spray,clickup,vuln + tags: token-spray,clickup self-contained: true diff --git a/http/token-spray/api-clockify.yaml b/http/token-spray/api-clockify.yaml index 7c186261755..d9c3b228290 100644 --- a/http/token-spray/api-clockify.yaml +++ b/http/token-spray/api-clockify.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/clockify metadata: max-request: 1 - tags: token-spray,clockify,vuln + tags: token-spray,clockify self-contained: true diff --git a/http/token-spray/api-cloudconvert.yaml b/http/token-spray/api-cloudconvert.yaml index 3d9f4e8cb71..375019749af 100644 --- a/http/token-spray/api-cloudconvert.yaml +++ b/http/token-spray/api-cloudconvert.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/cloudconvert metadata: max-request: 1 - tags: token-spray,cloudconvert,vuln + tags: token-spray,cloudconvert self-contained: true diff --git a/http/token-spray/api-cloudflare.yaml b/http/token-spray/api-cloudflare.yaml index 8b864eece98..d08aa5e5568 100644 --- a/http/token-spray/api-cloudflare.yaml +++ b/http/token-spray/api-cloudflare.yaml @@ -8,7 +8,7 @@ info: - https://dash.cloudflare.com/profile/api-tokens metadata: max-request: 1 - tags: token-spray,cloudflare,vuln + tags: token-spray,cloudflare self-contained: true diff --git a/http/token-spray/api-codestats.yaml b/http/token-spray/api-codestats.yaml index 1546c57f42e..2efc65164dc 100644 --- a/http/token-spray/api-codestats.yaml +++ b/http/token-spray/api-codestats.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/codestats metadata: max-request: 1 - tags: token-spray,codestats,vuln + tags: token-spray,codestats self-contained: true diff --git a/http/token-spray/api-coinapi.yaml b/http/token-spray/api-coinapi.yaml index 4fb58942b95..ef78a8bfc1c 100644 --- a/http/token-spray/api-coinapi.yaml +++ b/http/token-spray/api-coinapi.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/coinapi metadata: max-request: 1 - tags: token-spray,coinapi,vuln + tags: token-spray,coinapi self-contained: true diff --git a/http/token-spray/api-coinlayer.yaml b/http/token-spray/api-coinlayer.yaml index 1b29658b35c..f5f4bae1bf9 100644 --- a/http/token-spray/api-coinlayer.yaml +++ b/http/token-spray/api-coinlayer.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/coinlayer metadata: max-request: 1 - tags: token-spray,coinlayer,vuln + tags: token-spray,coinlayer self-contained: true diff --git a/http/token-spray/api-coinmarketcap.yaml b/http/token-spray/api-coinmarketcap.yaml index a613fe2e0da..986ea77eccf 100644 --- a/http/token-spray/api-coinmarketcap.yaml +++ b/http/token-spray/api-coinmarketcap.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/coinmarketcap metadata: max-request: 1 - tags: token-spray,coinmarketcap,vuln + tags: token-spray,coinmarketcap self-contained: true diff --git a/http/token-spray/api-coinranking.yaml b/http/token-spray/api-coinranking.yaml index 3b6b8aff4e5..6bf15090113 100644 --- a/http/token-spray/api-coinranking.yaml +++ b/http/token-spray/api-coinranking.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/coinranking metadata: max-request: 1 - tags: token-spray,coinranking,vuln + tags: token-spray,coinranking self-contained: true diff --git a/http/token-spray/api-cooperhewitt.yaml b/http/token-spray/api-cooperhewitt.yaml index a837406e232..9f3a88d3dc9 100644 --- a/http/token-spray/api-cooperhewitt.yaml +++ b/http/token-spray/api-cooperhewitt.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/cooper-hewitt metadata: max-request: 1 - tags: token-spray,cooperhewitt,vuln + tags: token-spray,cooperhewitt self-contained: true diff --git a/http/token-spray/api-covalent.yaml b/http/token-spray/api-covalent.yaml index 9dcaa690c80..5c0a1b4fe35 100644 --- a/http/token-spray/api-covalent.yaml +++ b/http/token-spray/api-covalent.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/covalent metadata: max-request: 1 - tags: token-spray,covalent,vuln + tags: token-spray,covalent self-contained: true diff --git a/http/token-spray/api-craftmypdf.yaml b/http/token-spray/api-craftmypdf.yaml index 89658ddda5f..d1d9baf768c 100644 --- a/http/token-spray/api-craftmypdf.yaml +++ b/http/token-spray/api-craftmypdf.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/craftmypdf metadata: max-request: 1 - tags: token-spray,craftmypdf,vuln + tags: token-spray,craftmypdf self-contained: true diff --git a/http/token-spray/api-currencyfreaks.yaml b/http/token-spray/api-currencyfreaks.yaml index 8441f2c1101..503f90d4f8d 100644 --- a/http/token-spray/api-currencyfreaks.yaml +++ b/http/token-spray/api-currencyfreaks.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/currencyfreaks metadata: max-request: 1 - tags: token-spray,currencyfreaks,vuln + tags: token-spray,currencyfreaks self-contained: true diff --git a/http/token-spray/api-currencylayer.yaml b/http/token-spray/api-currencylayer.yaml index 228eb3bf8e0..6a025b6c6df 100644 --- a/http/token-spray/api-currencylayer.yaml +++ b/http/token-spray/api-currencylayer.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/currencylayer metadata: max-request: 1 - tags: token-spray,currencylayer,vuln + tags: token-spray,currencylayer self-contained: true diff --git a/http/token-spray/api-currencyscoop.yaml b/http/token-spray/api-currencyscoop.yaml index c8dd3ab6909..973401fb149 100644 --- a/http/token-spray/api-currencyscoop.yaml +++ b/http/token-spray/api-currencyscoop.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/currencyscoop metadata: max-request: 1 - tags: token-spray,currencyscoop,vuln + tags: token-spray,currencyscoop self-contained: true diff --git a/http/token-spray/api-dbt.yaml b/http/token-spray/api-dbt.yaml index 3631dfe5b44..b07acfa0ee7 100644 --- a/http/token-spray/api-dbt.yaml +++ b/http/token-spray/api-dbt.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: token-spray,dbt,vuln + tags: token-spray,dbt self-contained: true diff --git a/http/token-spray/api-ddownload.yaml b/http/token-spray/api-ddownload.yaml index 224b03913a3..372eca68eaa 100644 --- a/http/token-spray/api-ddownload.yaml +++ b/http/token-spray/api-ddownload.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/ddownload metadata: max-request: 1 - tags: token-spray,ddownload,vuln + tags: token-spray,ddownload self-contained: true diff --git a/http/token-spray/api-debounce.yaml b/http/token-spray/api-debounce.yaml index 518d0bf944f..ccb3821952a 100644 --- a/http/token-spray/api-debounce.yaml +++ b/http/token-spray/api-debounce.yaml @@ -9,7 +9,7 @@ info: - https://debounce.io metadata: max-request: 1 - tags: debounce,token-spray,vuln + tags: debounce,token-spray self-contained: true diff --git a/http/token-spray/api-delighted.yaml b/http/token-spray/api-delighted.yaml index 41531db473a..32bad3a637f 100644 --- a/http/token-spray/api-delighted.yaml +++ b/http/token-spray/api-delighted.yaml @@ -9,7 +9,7 @@ info: - https://app.delighted.com/docs/api metadata: max-request: 1 - tags: token-spray,delighted,vuln + tags: token-spray,delighted self-contained: true http: diff --git a/http/token-spray/api-deviantart.yaml b/http/token-spray/api-deviantart.yaml index 68c034b14f2..cff25169d81 100644 --- a/http/token-spray/api-deviantart.yaml +++ b/http/token-spray/api-deviantart.yaml @@ -8,7 +8,7 @@ info: - https://www.deviantart.com/developers/authentication metadata: max-request: 1 - tags: token-spray,deviantart,vuln + tags: token-spray,deviantart self-contained: true diff --git a/http/token-spray/api-digitalocean.yaml b/http/token-spray/api-digitalocean.yaml index 82e5bef9697..1dc847b06e1 100644 --- a/http/token-spray/api-digitalocean.yaml +++ b/http/token-spray/api-digitalocean.yaml @@ -8,7 +8,7 @@ info: - https://docs.digitalocean.com/reference/api/ metadata: max-request: 1 - tags: token-spray,digitalocean,vuln + tags: token-spray,digitalocean self-contained: true diff --git a/http/token-spray/api-dribbble.yaml b/http/token-spray/api-dribbble.yaml index ba3e78379ce..4550245f8fe 100644 --- a/http/token-spray/api-dribbble.yaml +++ b/http/token-spray/api-dribbble.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/dribbble metadata: max-request: 1 - tags: token-spray,dribbble,vuln + tags: token-spray,dribbble self-contained: true diff --git a/http/token-spray/api-dropbox.yaml b/http/token-spray/api-dropbox.yaml index 5a88dee1496..9c7c36e6c2e 100644 --- a/http/token-spray/api-dropbox.yaml +++ b/http/token-spray/api-dropbox.yaml @@ -8,7 +8,7 @@ info: - https://www.dropbox.com/developers/documentation/http/documentation metadata: max-request: 1 - tags: token-spray,dropbox,vuln + tags: token-spray,dropbox self-contained: true diff --git a/http/token-spray/api-ebird.yaml b/http/token-spray/api-ebird.yaml index cb35fe31f16..3f7a8fc6f22 100644 --- a/http/token-spray/api-ebird.yaml +++ b/http/token-spray/api-ebird.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/ebird metadata: max-request: 1 - tags: token-spray,ebird,vuln + tags: token-spray,ebird self-contained: true diff --git a/http/token-spray/api-etherscan.yaml b/http/token-spray/api-etherscan.yaml index 7a2b44106e5..d93ae8c9108 100644 --- a/http/token-spray/api-etherscan.yaml +++ b/http/token-spray/api-etherscan.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/etherscan metadata: max-request: 1 - tags: token-spray,etherscan,vuln + tags: token-spray,etherscan self-contained: true diff --git a/http/token-spray/api-europeana.yaml b/http/token-spray/api-europeana.yaml index 0d392b99aae..77bdaf8da59 100644 --- a/http/token-spray/api-europeana.yaml +++ b/http/token-spray/api-europeana.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/europeana metadata: max-request: 1 - tags: token-spray,europeana,vuln + tags: token-spray,europeana self-contained: true diff --git a/http/token-spray/api-exchangerateapi.yaml b/http/token-spray/api-exchangerateapi.yaml index 8fe17e075da..8bb016a96a0 100644 --- a/http/token-spray/api-exchangerateapi.yaml +++ b/http/token-spray/api-exchangerateapi.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/exchangerate-api metadata: max-request: 1 - tags: token-spray,exchangerateapi,vuln + tags: token-spray,exchangerateapi self-contained: true diff --git a/http/token-spray/api-facebook.yaml b/http/token-spray/api-facebook.yaml index 97952ed1e16..e1ce1fda6f2 100644 --- a/http/token-spray/api-facebook.yaml +++ b/http/token-spray/api-facebook.yaml @@ -8,7 +8,7 @@ info: - https://developers.facebook.com/tools/explorer/ metadata: max-request: 1 - tags: token-spray,facebook,vuln + tags: token-spray,facebook self-contained: true diff --git a/http/token-spray/api-fastly.yaml b/http/token-spray/api-fastly.yaml index ddab1f3e0ad..e54e68f7b4c 100644 --- a/http/token-spray/api-fastly.yaml +++ b/http/token-spray/api-fastly.yaml @@ -8,7 +8,7 @@ info: - https://developer.fastly.com/reference/api/ metadata: max-request: 1 - tags: token-spray,fastly,vuln + tags: token-spray,fastly self-contained: true diff --git a/http/token-spray/api-festivo.yaml b/http/token-spray/api-festivo.yaml index f6d44358714..38117708e72 100644 --- a/http/token-spray/api-festivo.yaml +++ b/http/token-spray/api-festivo.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/festivo-public-holidays metadata: max-request: 1 - tags: token-spray,festivo,vuln + tags: token-spray,festivo self-contained: true diff --git a/http/token-spray/api-flickr.yaml b/http/token-spray/api-flickr.yaml index c36e5cbd46c..bd1c9336925 100644 --- a/http/token-spray/api-flickr.yaml +++ b/http/token-spray/api-flickr.yaml @@ -8,7 +8,7 @@ info: - https://www.flickr.com/services/developer/api/ metadata: max-request: 1 - tags: token-spray,flickr,vuln + tags: token-spray,flickr self-contained: true diff --git a/http/token-spray/api-flowdash.yaml b/http/token-spray/api-flowdash.yaml index 505394b71ba..d2fb8c85315 100644 --- a/http/token-spray/api-flowdash.yaml +++ b/http/token-spray/api-flowdash.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/flowdash metadata: max-request: 1 - tags: token-spray,flowdash,vuln + tags: token-spray,flowdash self-contained: true diff --git a/http/token-spray/api-fontawesome.yaml b/http/token-spray/api-fontawesome.yaml index 05caef66946..75329116564 100644 --- a/http/token-spray/api-fontawesome.yaml +++ b/http/token-spray/api-fontawesome.yaml @@ -8,7 +8,7 @@ info: - https://fontawesome.com/v6.0/docs/apis/graphql/get-started metadata: max-request: 1 - tags: token-spray,fontawesome,vuln + tags: token-spray,fontawesome self-contained: true diff --git a/http/token-spray/api-fortitoken-cloud.yaml b/http/token-spray/api-fortitoken-cloud.yaml index 8ec1da68972..f045a9e0758 100644 --- a/http/token-spray/api-fortitoken-cloud.yaml +++ b/http/token-spray/api-fortitoken-cloud.yaml @@ -8,7 +8,7 @@ info: - https://docs.fortinet.com/document/fortitoken-cloud/latest/rest-api/456035/overview metadata: max-request: 1 - tags: token-spray,fortinet,fortitoken,vuln + tags: token-spray,fortinet,fortitoken self-contained: true diff --git a/http/token-spray/api-front.yaml b/http/token-spray/api-front.yaml index 36feaf09372..b4a7b6648a8 100644 --- a/http/token-spray/api-front.yaml +++ b/http/token-spray/api-front.yaml @@ -8,7 +8,7 @@ info: - https://dev.frontapp.com/reference/introduction metadata: max-request: 1 - tags: token-spray,front,vuln + tags: token-spray,front self-contained: true diff --git a/http/token-spray/api-fullhunt.yaml b/http/token-spray/api-fullhunt.yaml index 0198ddb9250..cb8e651fac6 100644 --- a/http/token-spray/api-fullhunt.yaml +++ b/http/token-spray/api-fullhunt.yaml @@ -11,7 +11,7 @@ info: - https://api-docs.fullhunt.io metadata: max-request: 1 - tags: scan,recon,fullhunt,token-spray,vuln + tags: scan,recon,fullhunt,token-spray self-contained: true diff --git a/http/token-spray/api-giphy.yaml b/http/token-spray/api-giphy.yaml index 4a455644de5..7f28ea5ca4f 100644 --- a/http/token-spray/api-giphy.yaml +++ b/http/token-spray/api-giphy.yaml @@ -8,7 +8,7 @@ info: - https://developers.giphy.com/branch/master/docs/api/ metadata: max-request: 1 - tags: token-spray,giphy,vuln + tags: token-spray,giphy self-contained: true diff --git a/http/token-spray/api-github.yaml b/http/token-spray/api-github.yaml index 8ac2fda7a2c..4aa56d2e412 100644 --- a/http/token-spray/api-github.yaml +++ b/http/token-spray/api-github.yaml @@ -8,7 +8,7 @@ info: - https://docs.github.com/en/rest/reference/users metadata: max-request: 1 - tags: token-spray,github,vuln + tags: token-spray,github self-contained: true diff --git a/http/token-spray/api-gitlab.yaml b/http/token-spray/api-gitlab.yaml index 659b34f4e0d..a2074b9f379 100644 --- a/http/token-spray/api-gitlab.yaml +++ b/http/token-spray/api-gitlab.yaml @@ -8,7 +8,7 @@ info: - https://docs.gitlab.com/ee/api/personal_access_tokens.html metadata: max-request: 1 - tags: token-spray,gitlab,vuln + tags: token-spray,gitlab self-contained: true diff --git a/http/token-spray/api-gofile.yaml b/http/token-spray/api-gofile.yaml index 23b3bd0cfcb..f9c0f4a3912 100644 --- a/http/token-spray/api-gofile.yaml +++ b/http/token-spray/api-gofile.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/gofile metadata: max-request: 1 - tags: token-spray,gofile,vuln + tags: token-spray,gofile self-contained: true diff --git a/http/token-spray/api-google-drive.yaml b/http/token-spray/api-google-drive.yaml index f35ed284036..811cccd6de1 100644 --- a/http/token-spray/api-google-drive.yaml +++ b/http/token-spray/api-google-drive.yaml @@ -8,7 +8,7 @@ info: - https://developers.google.com/drive/api/guides/about-sdk metadata: max-request: 1 - tags: token-spray,google,drive,intrusive,vuln + tags: token-spray,google,drive,intrusive self-contained: true diff --git a/http/token-spray/api-gorest.yaml b/http/token-spray/api-gorest.yaml index f72c8409bae..87cffa2594f 100644 --- a/http/token-spray/api-gorest.yaml +++ b/http/token-spray/api-gorest.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/gorest metadata: max-request: 1 - tags: token-spray,gorest,vuln + tags: token-spray,gorest self-contained: true diff --git a/http/token-spray/api-harvardart.yaml b/http/token-spray/api-harvardart.yaml index 7ecf86214d0..35cdcaaffb4 100644 --- a/http/token-spray/api-harvardart.yaml +++ b/http/token-spray/api-harvardart.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/harvard-art-museums metadata: max-request: 1 - tags: token-spray,harvardart,vuln + tags: token-spray,harvardart self-contained: true diff --git a/http/token-spray/api-heroku.yaml b/http/token-spray/api-heroku.yaml index e03b30db32a..07fe2cc8be9 100644 --- a/http/token-spray/api-heroku.yaml +++ b/http/token-spray/api-heroku.yaml @@ -8,7 +8,7 @@ info: - https://devcenter.heroku.com/articles/platform-api-quickstart#calling-the-api metadata: max-request: 1 - tags: token-spray,heroku,vuln + tags: token-spray,heroku self-contained: true diff --git a/http/token-spray/api-hirak-rates.yaml b/http/token-spray/api-hirak-rates.yaml index c20004e0b39..1cc2fdfd89d 100644 --- a/http/token-spray/api-hirak-rates.yaml +++ b/http/token-spray/api-hirak-rates.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/hirak-exchange-rates metadata: max-request: 1 - tags: token-spray,hirak,vuln + tags: token-spray,hirak self-contained: true diff --git a/http/token-spray/api-holidayapi.yaml b/http/token-spray/api-holidayapi.yaml index 81d52393701..aff70489491 100644 --- a/http/token-spray/api-holidayapi.yaml +++ b/http/token-spray/api-holidayapi.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/holiday-api metadata: max-request: 1 - tags: token-spray,holidayapi,vuln + tags: token-spray,holidayapi self-contained: true diff --git a/http/token-spray/api-host-io.yaml b/http/token-spray/api-host-io.yaml index 41a3a99adc6..f75fa9b4faf 100644 --- a/http/token-spray/api-host-io.yaml +++ b/http/token-spray/api-host-io.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/host-io metadata: max-request: 1 - tags: token-spray,hostio,vuln + tags: token-spray,hostio self-contained: true diff --git a/http/token-spray/api-html2pdf.yaml b/http/token-spray/api-html2pdf.yaml index 8ec10ea371a..fd379b9b1da 100644 --- a/http/token-spray/api-html2pdf.yaml +++ b/http/token-spray/api-html2pdf.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/html2pdf metadata: max-request: 1 - tags: token-spray,html2pdf,vuln + tags: token-spray,html2pdf self-contained: true diff --git a/http/token-spray/api-hubspot.yaml b/http/token-spray/api-hubspot.yaml index 684a9003b8a..9811e670083 100644 --- a/http/token-spray/api-hubspot.yaml +++ b/http/token-spray/api-hubspot.yaml @@ -8,7 +8,7 @@ info: - https://legacydocs.hubspot.com/docs/methods/owners/get_owners metadata: max-request: 2 - tags: token-spray,hubspot,vuln + tags: token-spray,hubspot self-contained: true diff --git a/http/token-spray/api-hunter.yaml b/http/token-spray/api-hunter.yaml index 51bc186d776..a9692ffd10f 100644 --- a/http/token-spray/api-hunter.yaml +++ b/http/token-spray/api-hunter.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/hunter metadata: max-request: 1 - tags: token-spray,hunter,vuln + tags: token-spray,hunter self-contained: true diff --git a/http/token-spray/api-iconfinder.yaml b/http/token-spray/api-iconfinder.yaml index 02568c527cd..cae41ef4cfd 100644 --- a/http/token-spray/api-iconfinder.yaml +++ b/http/token-spray/api-iconfinder.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/iconfinder metadata: max-request: 1 - tags: token-spray,iconfinder,vuln + tags: token-spray,iconfinder self-contained: true diff --git a/http/token-spray/api-improvmx.yaml b/http/token-spray/api-improvmx.yaml index ada7b9140be..b8bda0e8e8e 100644 --- a/http/token-spray/api-improvmx.yaml +++ b/http/token-spray/api-improvmx.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/improvmx metadata: max-request: 1 - tags: token-spray,improvmx,vuln + tags: token-spray,improvmx self-contained: true diff --git a/http/token-spray/api-instagram.yaml b/http/token-spray/api-instagram.yaml index ea96416fb60..b455b03fe85 100644 --- a/http/token-spray/api-instagram.yaml +++ b/http/token-spray/api-instagram.yaml @@ -8,7 +8,7 @@ info: - https://developers.facebook.com/docs/instagram-api/getting-started metadata: max-request: 1 - tags: token-spray,instagram,graph,facebook,vuln + tags: token-spray,instagram,graph,facebook self-contained: true diff --git a/http/token-spray/api-instatus.yaml b/http/token-spray/api-instatus.yaml index 8ba76c31d70..59c5830760c 100644 --- a/http/token-spray/api-instatus.yaml +++ b/http/token-spray/api-instatus.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/instatus metadata: max-request: 1 - tags: token-spray,instatus,vuln + tags: token-spray,instatus self-contained: true diff --git a/http/token-spray/api-intelx.yaml b/http/token-spray/api-intelx.yaml index 7801ad01676..156dd08cd05 100644 --- a/http/token-spray/api-intelx.yaml +++ b/http/token-spray/api-intelx.yaml @@ -13,7 +13,7 @@ info: - https://intelx.io/account?tab=developer metadata: max-request: 1 - tags: scan,recon,intelx,token-spray,vuln + tags: scan,recon,intelx,token-spray self-contained: true diff --git a/http/token-spray/api-intercom.yaml b/http/token-spray/api-intercom.yaml index 829be0fdfc7..19fb6f1aafb 100644 --- a/http/token-spray/api-intercom.yaml +++ b/http/token-spray/api-intercom.yaml @@ -8,7 +8,7 @@ info: - https://developers.intercom.com/building-apps/docs/rest-api-reference metadata: max-request: 1 - tags: token-spray,intercom,vuln + tags: token-spray,intercom self-contained: true diff --git a/http/token-spray/api-intigriti.yaml b/http/token-spray/api-intigriti.yaml index 1bd7d13ce01..7624713a486 100644 --- a/http/token-spray/api-intigriti.yaml +++ b/http/token-spray/api-intigriti.yaml @@ -10,7 +10,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,intigriti,vuln + tags: token-spray,intigriti self-contained: true diff --git a/http/token-spray/api-ip2whois.yaml b/http/token-spray/api-ip2whois.yaml index 4639942d6f1..3735fd1c7a2 100644 --- a/http/token-spray/api-ip2whois.yaml +++ b/http/token-spray/api-ip2whois.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/ip2whois metadata: max-request: 1 - tags: token-spray,ip2whois,vuln + tags: token-spray,ip2whois self-contained: true diff --git a/http/token-spray/api-ipdata.yaml b/http/token-spray/api-ipdata.yaml index d060c5262d0..b445cfc1c18 100644 --- a/http/token-spray/api-ipdata.yaml +++ b/http/token-spray/api-ipdata.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,ipdata,vuln + tags: token-spray,ipdata self-contained: true diff --git a/http/token-spray/api-ipfind.yaml b/http/token-spray/api-ipfind.yaml index d064fe377f1..8b25db73acd 100644 --- a/http/token-spray/api-ipfind.yaml +++ b/http/token-spray/api-ipfind.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/ipfind metadata: max-request: 1 - tags: token-spray,ipfind,vuln + tags: token-spray,ipfind self-contained: true diff --git a/http/token-spray/api-ipinfo.yaml b/http/token-spray/api-ipinfo.yaml index f4963c0e993..7f680f27ac8 100644 --- a/http/token-spray/api-ipinfo.yaml +++ b/http/token-spray/api-ipinfo.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,ipinfo,vuln + tags: token-spray,ipinfo self-contained: true diff --git a/http/token-spray/api-ipstack.yaml b/http/token-spray/api-ipstack.yaml index 29522f65d53..2933c3fa356 100644 --- a/http/token-spray/api-ipstack.yaml +++ b/http/token-spray/api-ipstack.yaml @@ -8,7 +8,7 @@ info: - https://ipstack.com/documentation metadata: max-request: 1 - tags: token-spray,ipstack,vuln + tags: token-spray,ipstack self-contained: true diff --git a/http/token-spray/api-iterable.yaml b/http/token-spray/api-iterable.yaml index a793db45499..dfe5a92bdfc 100644 --- a/http/token-spray/api-iterable.yaml +++ b/http/token-spray/api-iterable.yaml @@ -8,7 +8,7 @@ info: - https://api.iterable.com/api/docs metadata: max-request: 1 - tags: token-spray,iterable,vuln + tags: token-spray,iterable self-contained: true diff --git a/http/token-spray/api-iucn.yaml b/http/token-spray/api-iucn.yaml index fe803d68135..fbd0e1048fa 100644 --- a/http/token-spray/api-iucn.yaml +++ b/http/token-spray/api-iucn.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/iucn metadata: max-request: 1 - tags: token-spray,iucn,vuln + tags: token-spray,iucn self-contained: true diff --git a/http/token-spray/api-jotform.yaml b/http/token-spray/api-jotform.yaml index 68bc3fdc50e..bec3a177ae3 100644 --- a/http/token-spray/api-jotform.yaml +++ b/http/token-spray/api-jotform.yaml @@ -10,7 +10,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,jotform,vuln + tags: token-spray,jotform self-contained: true diff --git a/http/token-spray/api-jsonbin.yaml b/http/token-spray/api-jsonbin.yaml index c15eb62021e..a5fcf934214 100644 --- a/http/token-spray/api-jsonbin.yaml +++ b/http/token-spray/api-jsonbin.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/jsonbin metadata: max-request: 1 - tags: token-spray,jsonbin,vuln + tags: token-spray,jsonbin self-contained: true diff --git a/http/token-spray/api-jumpcloud.yaml b/http/token-spray/api-jumpcloud.yaml index 81030c2e511..4969c1feb2e 100644 --- a/http/token-spray/api-jumpcloud.yaml +++ b/http/token-spray/api-jumpcloud.yaml @@ -8,7 +8,7 @@ info: - https://docs.jumpcloud.com/1.0/authentication-and-authorization/api-key metadata: max-request: 1 - tags: token-spray,jumpcloud,vuln + tags: token-spray,jumpcloud self-contained: true diff --git a/http/token-spray/api-launchdarkly.yaml b/http/token-spray/api-launchdarkly.yaml index 1bfadf6309f..f341f6f9ffb 100644 --- a/http/token-spray/api-launchdarkly.yaml +++ b/http/token-spray/api-launchdarkly.yaml @@ -8,7 +8,7 @@ info: - https://apidocs.launchdarkly.com/ metadata: max-request: 1 - tags: token-spray,launchdarkly,vuln + tags: token-spray,launchdarkly self-contained: true diff --git a/http/token-spray/api-leanix.yaml b/http/token-spray/api-leanix.yaml index 7872feb1082..13b346eb10f 100644 --- a/http/token-spray/api-leanix.yaml +++ b/http/token-spray/api-leanix.yaml @@ -8,7 +8,7 @@ info: - https://docs.leanix.net/docs/rest-api metadata: max-request: 2 - tags: token-spray,leanix,vuln + tags: token-spray,leanix self-contained: true diff --git a/http/token-spray/api-linkedin.yaml b/http/token-spray/api-linkedin.yaml index 25c8f105a71..1c89bde378b 100644 --- a/http/token-spray/api-linkedin.yaml +++ b/http/token-spray/api-linkedin.yaml @@ -8,7 +8,7 @@ info: - https://docs.microsoft.com/en-us/linkedin/compliance/ metadata: max-request: 1 - tags: token-spray,linkedin,vuln + tags: token-spray,linkedin self-contained: true diff --git a/http/token-spray/api-lob.yaml b/http/token-spray/api-lob.yaml index a8d394c47a1..1218f17032f 100644 --- a/http/token-spray/api-lob.yaml +++ b/http/token-spray/api-lob.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/lob metadata: max-request: 1 - tags: token-spray,lob,vuln + tags: token-spray,lob self-contained: true diff --git a/http/token-spray/api-lokalise.yaml b/http/token-spray/api-lokalise.yaml index cd825cad5b4..a5a61f471d4 100644 --- a/http/token-spray/api-lokalise.yaml +++ b/http/token-spray/api-lokalise.yaml @@ -8,7 +8,7 @@ info: - https://app.lokalise.com/api2docs/curl/#resource-projects metadata: max-request: 1 - tags: token-spray,lokalise,vuln + tags: token-spray,lokalise self-contained: true diff --git a/http/token-spray/api-loqate.yaml b/http/token-spray/api-loqate.yaml index c0d1a92d000..5ec3db0c7ef 100644 --- a/http/token-spray/api-loqate.yaml +++ b/http/token-spray/api-loqate.yaml @@ -8,7 +8,7 @@ info: - https://www.loqate.com/resources/support/apis/Capture/Interactive/Find/1.1/ metadata: max-request: 1 - tags: token-spray,loqate,vuln + tags: token-spray,loqate self-contained: true diff --git a/http/token-spray/api-mac-address-lookup.yaml b/http/token-spray/api-mac-address-lookup.yaml index 08df5093088..34680d4df59 100644 --- a/http/token-spray/api-mac-address-lookup.yaml +++ b/http/token-spray/api-mac-address-lookup.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/mac-address-lookup metadata: max-request: 1 - tags: token-spray,macaddresslookup,vuln + tags: token-spray,macaddresslookup self-contained: true diff --git a/http/token-spray/api-mailboxvalidator.yaml b/http/token-spray/api-mailboxvalidator.yaml index ff49eda4da2..ac35c58cc1b 100644 --- a/http/token-spray/api-mailboxvalidator.yaml +++ b/http/token-spray/api-mailboxvalidator.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/mailboxvalidator metadata: max-request: 1 - tags: token-spray,mailboxvalidator,vuln + tags: token-spray,mailboxvalidator self-contained: true diff --git a/http/token-spray/api-mailchimp.yaml b/http/token-spray/api-mailchimp.yaml index 863c67a66b8..aec6111865f 100644 --- a/http/token-spray/api-mailchimp.yaml +++ b/http/token-spray/api-mailchimp.yaml @@ -8,7 +8,7 @@ info: - https://mailchimp.com/developer/transactional/docs/smtp-integration/#credentials-and-configuration metadata: max-request: 1 - tags: token-spray,mailchimp,tcp,vuln + tags: token-spray,mailchimp,tcp self-contained: true tcp: diff --git a/http/token-spray/api-mailgun.yaml b/http/token-spray/api-mailgun.yaml index 7486a805347..d719278d92a 100644 --- a/http/token-spray/api-mailgun.yaml +++ b/http/token-spray/api-mailgun.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/mailgun metadata: max-request: 1 - tags: token-spray,mailgun,vuln + tags: token-spray,mailgun self-contained: true diff --git a/http/token-spray/api-malshare.yaml b/http/token-spray/api-malshare.yaml index a1a967df293..768973d1a73 100644 --- a/http/token-spray/api-malshare.yaml +++ b/http/token-spray/api-malshare.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/malshare metadata: max-request: 1 - tags: token-spray,malshare,vuln + tags: token-spray,malshare self-contained: true diff --git a/http/token-spray/api-malwarebazaar.yaml b/http/token-spray/api-malwarebazaar.yaml index 4e62aae4e6d..e64384bc9f3 100644 --- a/http/token-spray/api-malwarebazaar.yaml +++ b/http/token-spray/api-malwarebazaar.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/malwarebazaar metadata: max-request: 1 - tags: token-spray,malwarebazaar,intrusive,vuln + tags: token-spray,malwarebazaar,intrusive self-contained: true diff --git a/http/token-spray/api-mapbox.yaml b/http/token-spray/api-mapbox.yaml index 2f64634a1d3..e95113fa7c9 100644 --- a/http/token-spray/api-mapbox.yaml +++ b/http/token-spray/api-mapbox.yaml @@ -8,7 +8,7 @@ info: - https://docs.mapbox.com/api/search/geocoding/ metadata: max-request: 1 - tags: token-spray,mapbox,vuln + tags: token-spray,mapbox self-contained: true diff --git a/http/token-spray/api-micro-user-service.yaml b/http/token-spray/api-micro-user-service.yaml index 437620dd855..f0d5f5a7d05 100644 --- a/http/token-spray/api-micro-user-service.yaml +++ b/http/token-spray/api-micro-user-service.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/micro-user-service metadata: max-request: 1 - tags: token-spray,micro-user-service,vuln + tags: token-spray,micro-user-service self-contained: true diff --git a/http/token-spray/api-mojoauth.yaml b/http/token-spray/api-mojoauth.yaml index e6599b7f109..c1896118ce4 100644 --- a/http/token-spray/api-mojoauth.yaml +++ b/http/token-spray/api-mojoauth.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/mojoauth metadata: max-request: 1 - tags: token-spray,mojoauth,vuln + tags: token-spray,mojoauth self-contained: true diff --git a/http/token-spray/api-monday.yaml b/http/token-spray/api-monday.yaml index a1f3f86ab9b..8cc29b642a8 100644 --- a/http/token-spray/api-monday.yaml +++ b/http/token-spray/api-monday.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/monday metadata: max-request: 1 - tags: token-spray,monday,vuln + tags: token-spray,monday self-contained: true diff --git a/http/token-spray/api-moonpay.yaml b/http/token-spray/api-moonpay.yaml index dea64a561af..4caf14701fc 100644 --- a/http/token-spray/api-moonpay.yaml +++ b/http/token-spray/api-moonpay.yaml @@ -8,7 +8,7 @@ info: - https://dashboard.moonpay.com/getting_started metadata: max-request: 1 - tags: token-spray,moonpay,cryptocurrencies,vuln + tags: token-spray,moonpay,cryptocurrencies self-contained: true diff --git a/http/token-spray/api-myanimelist.yaml b/http/token-spray/api-myanimelist.yaml index 497e927ce94..de3575ed446 100644 --- a/http/token-spray/api-myanimelist.yaml +++ b/http/token-spray/api-myanimelist.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/myanimelist metadata: max-request: 1 - tags: token-spray,myanimelist,vuln + tags: token-spray,myanimelist self-contained: true diff --git a/http/token-spray/api-mywot.yaml b/http/token-spray/api-mywot.yaml index dc98347cff0..db7b36cf076 100644 --- a/http/token-spray/api-mywot.yaml +++ b/http/token-spray/api-mywot.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/web-of-trust metadata: max-request: 1 - tags: token-spray,weboftrust,vuln + tags: token-spray,weboftrust self-contained: true diff --git a/http/token-spray/api-nerdgraph.yaml b/http/token-spray/api-nerdgraph.yaml index dfc47652c16..2afa99491be 100644 --- a/http/token-spray/api-nerdgraph.yaml +++ b/http/token-spray/api-nerdgraph.yaml @@ -8,7 +8,7 @@ info: - https://docs.newrelic.com/docs/apis/nerdgraph/get-started/introduction-new-relic-nerdgraph/ metadata: max-request: 1 - tags: token-spray,newrelic,nerdgraph,vuln + tags: token-spray,newrelic,nerdgraph self-contained: true diff --git a/http/token-spray/api-netlify.yaml b/http/token-spray/api-netlify.yaml index 4d0a597c0c8..90e4c324a95 100644 --- a/http/token-spray/api-netlify.yaml +++ b/http/token-spray/api-netlify.yaml @@ -8,7 +8,7 @@ info: - https://docs.netlify.com/api/get-started/ metadata: max-request: 1 - tags: token-spray,netlify,vuln + tags: token-spray,netlify self-contained: true diff --git a/http/token-spray/api-networksdb.yaml b/http/token-spray/api-networksdb.yaml index 671116ee92f..d6d01a6e022 100644 --- a/http/token-spray/api-networksdb.yaml +++ b/http/token-spray/api-networksdb.yaml @@ -10,7 +10,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,networkdb,vuln + tags: token-spray,networkdb self-contained: true diff --git a/http/token-spray/api-newrelic.yaml b/http/token-spray/api-newrelic.yaml index 69387fcd5ae..bb8b4ccd1c9 100644 --- a/http/token-spray/api-newrelic.yaml +++ b/http/token-spray/api-newrelic.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,newrelic,vuln + tags: token-spray,newrelic self-contained: true diff --git a/http/token-spray/api-notolytix.yaml b/http/token-spray/api-notolytix.yaml index dcae9e9a061..22940bf18d1 100644 --- a/http/token-spray/api-notolytix.yaml +++ b/http/token-spray/api-notolytix.yaml @@ -8,7 +8,7 @@ info: - https://notolytix.com/ metadata: max-request: 1 - tags: notolytix,token-spray,vuln + tags: notolytix,token-spray self-contained: true diff --git a/http/token-spray/api-nownodes.yaml b/http/token-spray/api-nownodes.yaml index 8ad56c05403..c230646b122 100644 --- a/http/token-spray/api-nownodes.yaml +++ b/http/token-spray/api-nownodes.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/nownodes metadata: max-request: 1 - tags: token-spray,nownodes,vuln + tags: token-spray,nownodes self-contained: true diff --git a/http/token-spray/api-npm.yaml b/http/token-spray/api-npm.yaml index 9e04ffe75f9..0a678955ba9 100644 --- a/http/token-spray/api-npm.yaml +++ b/http/token-spray/api-npm.yaml @@ -8,7 +8,7 @@ info: - https://docs.npmjs.com/creating-and-viewing-access-tokens metadata: max-request: 1 - tags: token-spray,node,npm,vuln + tags: token-spray,node,npm self-contained: true diff --git a/http/token-spray/api-nytimes.yaml b/http/token-spray/api-nytimes.yaml index 21f2f51b616..2d2f3ac65f4 100644 --- a/http/token-spray/api-nytimes.yaml +++ b/http/token-spray/api-nytimes.yaml @@ -9,7 +9,7 @@ info: - https://developer.nytimes.com/apis metadata: max-request: 1 - tags: token-spray,nytimes,vuln + tags: token-spray,nytimes self-contained: true diff --git a/http/token-spray/api-onelogin.yaml b/http/token-spray/api-onelogin.yaml index 10734c33bd3..e30bdc0ff91 100644 --- a/http/token-spray/api-onelogin.yaml +++ b/http/token-spray/api-onelogin.yaml @@ -8,7 +8,7 @@ info: - https://developers.onelogin.com/api-docs/2/getting-started/dev-overview metadata: max-request: 2 - tags: token-spray,onelogin,vuln + tags: token-spray,onelogin self-contained: true diff --git a/http/token-spray/api-onyphe.yaml b/http/token-spray/api-onyphe.yaml index 84a1ff53cd6..f4f7125a24b 100644 --- a/http/token-spray/api-onyphe.yaml +++ b/http/token-spray/api-onyphe.yaml @@ -10,7 +10,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,onyphe,vuln + tags: token-spray,onyphe self-contained: true diff --git a/http/token-spray/api-open-page-rank.yaml b/http/token-spray/api-open-page-rank.yaml index 5f78727de2e..862658d81ed 100644 --- a/http/token-spray/api-open-page-rank.yaml +++ b/http/token-spray/api-open-page-rank.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/open-page-rank metadata: max-request: 1 - tags: token-spray,openpagerank,vuln + tags: token-spray,openpagerank self-contained: true diff --git a/http/token-spray/api-openai.yaml b/http/token-spray/api-openai.yaml index 8900af3b9d7..e6501336767 100644 --- a/http/token-spray/api-openai.yaml +++ b/http/token-spray/api-openai.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,openai,vuln + tags: token-spray,openai self-contained: true diff --git a/http/token-spray/api-opengraphr.yaml b/http/token-spray/api-opengraphr.yaml index 6aa59a25cc9..72cc656ca3a 100644 --- a/http/token-spray/api-opengraphr.yaml +++ b/http/token-spray/api-opengraphr.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/opengraphr metadata: max-request: 1 - tags: token-spray,opengraphr,vuln + tags: token-spray,opengraphr self-contained: true diff --git a/http/token-spray/api-openweather.yaml b/http/token-spray/api-openweather.yaml index b2949c730a9..1d037aa3de1 100644 --- a/http/token-spray/api-openweather.yaml +++ b/http/token-spray/api-openweather.yaml @@ -8,7 +8,7 @@ info: - https://openweathermap.org/current metadata: max-request: 1 - tags: token-spray,weather,openweather,vuln + tags: token-spray,weather,openweather self-contained: true diff --git a/http/token-spray/api-opsgenie.yaml b/http/token-spray/api-opsgenie.yaml index 9bdeeb92fd8..1da29edae4e 100644 --- a/http/token-spray/api-opsgenie.yaml +++ b/http/token-spray/api-opsgenie.yaml @@ -9,7 +9,7 @@ info: - https://docs.opsgenie.com/docs/api-overview metadata: max-request: 1 - tags: token-spray,opsgenie,vuln + tags: token-spray,opsgenie self-contained: true diff --git a/http/token-spray/api-optimizely.yaml b/http/token-spray/api-optimizely.yaml index b546059281e..5e8a2520744 100644 --- a/http/token-spray/api-optimizely.yaml +++ b/http/token-spray/api-optimizely.yaml @@ -8,7 +8,7 @@ info: - https://library.optimizely.com/docs/api/app/v2/index.html metadata: max-request: 1 - tags: token-spray,optimizely,vuln + tags: token-spray,optimizely self-contained: true diff --git a/http/token-spray/api-orbintelligence.yaml b/http/token-spray/api-orbintelligence.yaml index b687f77873c..3188b6c973c 100644 --- a/http/token-spray/api-orbintelligence.yaml +++ b/http/token-spray/api-orbintelligence.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/orb-intelligence metadata: max-request: 1 - tags: token-spray,orbintelligence,vuln + tags: token-spray,orbintelligence self-contained: true diff --git a/http/token-spray/api-pagecdn.yaml b/http/token-spray/api-pagecdn.yaml index 139bdfb673b..62f3cb7f7e1 100644 --- a/http/token-spray/api-pagecdn.yaml +++ b/http/token-spray/api-pagecdn.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/pagecdn metadata: max-request: 1 - tags: token-spray,pagecdn,vuln + tags: token-spray,pagecdn self-contained: true diff --git a/http/token-spray/api-pagerduty.yaml b/http/token-spray/api-pagerduty.yaml index 18a60d0712e..cef411af7ea 100644 --- a/http/token-spray/api-pagerduty.yaml +++ b/http/token-spray/api-pagerduty.yaml @@ -8,7 +8,7 @@ info: - https://developer.pagerduty.com/api-reference metadata: max-request: 1 - tags: token-spray,pagerduty,vuln + tags: token-spray,pagerduty self-contained: true diff --git a/http/token-spray/api-particle.yaml b/http/token-spray/api-particle.yaml index 0e8fc4791c5..664abaf63d0 100644 --- a/http/token-spray/api-particle.yaml +++ b/http/token-spray/api-particle.yaml @@ -8,7 +8,7 @@ info: - https://docs.particle.io/reference metadata: max-request: 1 - tags: token-spray,particle,vuln + tags: token-spray,particle self-contained: true diff --git a/http/token-spray/api-pastebin.yaml b/http/token-spray/api-pastebin.yaml index 87770a10a2c..9e19edfd6b8 100644 --- a/http/token-spray/api-pastebin.yaml +++ b/http/token-spray/api-pastebin.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/pastebin metadata: max-request: 1 - tags: token-spray,pastebin,vuln + tags: token-spray,pastebin self-contained: true diff --git a/http/token-spray/api-paypal.yaml b/http/token-spray/api-paypal.yaml index e808d86bf1f..3ca0db50e3d 100644 --- a/http/token-spray/api-paypal.yaml +++ b/http/token-spray/api-paypal.yaml @@ -8,7 +8,7 @@ info: - https://developer.paypal.com/docs/api/overview/ metadata: max-request: 1 - tags: token-spray,paypal,vuln + tags: token-spray,paypal self-contained: true diff --git a/http/token-spray/api-pdflayer.yaml b/http/token-spray/api-pdflayer.yaml index 58a291b8fa7..ded860182a4 100644 --- a/http/token-spray/api-pdflayer.yaml +++ b/http/token-spray/api-pdflayer.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/pdflayer metadata: max-request: 1 - tags: token-spray,pdflayer,vuln + tags: token-spray,pdflayer self-contained: true diff --git a/http/token-spray/api-pendo.yaml b/http/token-spray/api-pendo.yaml index 5c8b3f715c3..2bfb3c1422d 100644 --- a/http/token-spray/api-pendo.yaml +++ b/http/token-spray/api-pendo.yaml @@ -8,7 +8,7 @@ info: - https://help.pendo.io/resources/support-library/api/index.html metadata: max-request: 1 - tags: token-spray,pendo,vuln + tags: token-spray,pendo self-contained: true diff --git a/http/token-spray/api-petfinder.yaml b/http/token-spray/api-petfinder.yaml index 38d2ba10973..7e2511c6ec6 100644 --- a/http/token-spray/api-petfinder.yaml +++ b/http/token-spray/api-petfinder.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/petfinder metadata: max-request: 1 - tags: token-spray,petfinder,vuln + tags: token-spray,petfinder self-contained: true diff --git a/http/token-spray/api-pinata.yaml b/http/token-spray/api-pinata.yaml index 04caa873e02..f8420da3ba2 100644 --- a/http/token-spray/api-pinata.yaml +++ b/http/token-spray/api-pinata.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/pinata metadata: max-request: 1 - tags: token-spray,pinata,vuln + tags: token-spray,pinata self-contained: true diff --git a/http/token-spray/api-pivotaltracker.yaml b/http/token-spray/api-pivotaltracker.yaml index b75e4727a58..30934fafb47 100644 --- a/http/token-spray/api-pivotaltracker.yaml +++ b/http/token-spray/api-pivotaltracker.yaml @@ -8,7 +8,7 @@ info: - https://www.pivotaltracker.com/help/api metadata: max-request: 1 - tags: token-spray,pivotaltracker,vuln + tags: token-spray,pivotaltracker self-contained: true diff --git a/http/token-spray/api-postmark.yaml b/http/token-spray/api-postmark.yaml index 3f0a7e4c9cb..4214bdb587f 100644 --- a/http/token-spray/api-postmark.yaml +++ b/http/token-spray/api-postmark.yaml @@ -8,7 +8,7 @@ info: - https://postmarkapp.com/developer/api/overview metadata: max-request: 1 - tags: token-spray,postmark,vuln + tags: token-spray,postmark self-contained: true diff --git a/http/token-spray/api-prexview.yaml b/http/token-spray/api-prexview.yaml index a9478a3597c..eef48e866c5 100644 --- a/http/token-spray/api-prexview.yaml +++ b/http/token-spray/api-prexview.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/prexview metadata: max-request: 1 - tags: token-spray,prexview,vuln + tags: token-spray,prexview self-contained: true diff --git a/http/token-spray/api-proxycrawl.yaml b/http/token-spray/api-proxycrawl.yaml index b7bc7efc296..119a30083dd 100644 --- a/http/token-spray/api-proxycrawl.yaml +++ b/http/token-spray/api-proxycrawl.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/proxycrawl metadata: max-request: 1 - tags: token-spray,proxycrawl,vuln + tags: token-spray,proxycrawl self-contained: true diff --git a/http/token-spray/api-proxykingdom.yaml b/http/token-spray/api-proxykingdom.yaml index 8d8fd2e5fc7..8d80e74f47e 100644 --- a/http/token-spray/api-proxykingdom.yaml +++ b/http/token-spray/api-proxykingdom.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/proxykingdom metadata: max-request: 1 - tags: token-spray,proxykingdom,vuln + tags: token-spray,proxykingdom self-contained: true diff --git a/http/token-spray/api-quip.yaml b/http/token-spray/api-quip.yaml index 9ec20f87bea..27160aa7a22 100644 --- a/http/token-spray/api-quip.yaml +++ b/http/token-spray/api-quip.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/quip metadata: max-request: 1 - tags: token-spray,quip,vuln + tags: token-spray,quip self-contained: true diff --git a/http/token-spray/api-rijksmuseum.yaml b/http/token-spray/api-rijksmuseum.yaml index e0465fccacf..0b72faf088f 100644 --- a/http/token-spray/api-rijksmuseum.yaml +++ b/http/token-spray/api-rijksmuseum.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/rijksmuseum metadata: max-request: 1 - tags: token-spray,rijksmuseum,vuln + tags: token-spray,rijksmuseum self-contained: true diff --git a/http/token-spray/api-savepage.yaml b/http/token-spray/api-savepage.yaml index cafde38fff2..be58575734e 100644 --- a/http/token-spray/api-savepage.yaml +++ b/http/token-spray/api-savepage.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/savepage metadata: max-request: 1 - tags: token-spray,savepage,vuln + tags: token-spray,savepage self-contained: true diff --git a/http/token-spray/api-scanii.yaml b/http/token-spray/api-scanii.yaml index ed6532c09a0..1b7d99e5038 100644 --- a/http/token-spray/api-scanii.yaml +++ b/http/token-spray/api-scanii.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/scanii metadata: max-request: 1 - tags: token-spray,scanii,vuln + tags: token-spray,scanii self-contained: true diff --git a/http/token-spray/api-scraperapi.yaml b/http/token-spray/api-scraperapi.yaml index bf631cc0c2b..f005d2f679f 100644 --- a/http/token-spray/api-scraperapi.yaml +++ b/http/token-spray/api-scraperapi.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/scraperapi metadata: max-request: 1 - tags: token-spray,scraperapi,vuln + tags: token-spray,scraperapi self-contained: true diff --git a/http/token-spray/api-scraperbox.yaml b/http/token-spray/api-scraperbox.yaml index d692e365182..c4e3a0fd261 100644 --- a/http/token-spray/api-scraperbox.yaml +++ b/http/token-spray/api-scraperbox.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/scraperbox metadata: max-request: 1 - tags: token-spray,scraperbox,vuln + tags: token-spray,scraperbox self-contained: true diff --git a/http/token-spray/api-scrapestack.yaml b/http/token-spray/api-scrapestack.yaml index feadac037ac..1046f60c57f 100644 --- a/http/token-spray/api-scrapestack.yaml +++ b/http/token-spray/api-scrapestack.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/scrapestack metadata: max-request: 1 - tags: token-spray,scrapestack,vuln + tags: token-spray,scrapestack self-contained: true diff --git a/http/token-spray/api-scrapingant.yaml b/http/token-spray/api-scrapingant.yaml index 226d3bdf862..b5c080da775 100644 --- a/http/token-spray/api-scrapingant.yaml +++ b/http/token-spray/api-scrapingant.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/scrapingant metadata: max-request: 1 - tags: token-spray,scrapingant,vuln + tags: token-spray,scrapingant self-contained: true diff --git a/http/token-spray/api-scrapingdog.yaml b/http/token-spray/api-scrapingdog.yaml index af1fb312904..6b2fabadc4f 100644 --- a/http/token-spray/api-scrapingdog.yaml +++ b/http/token-spray/api-scrapingdog.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/scrapingdog metadata: max-request: 1 - tags: token-spray,scrapingdog,vuln + tags: token-spray,scrapingdog self-contained: true diff --git a/http/token-spray/api-screenshotapi.yaml b/http/token-spray/api-screenshotapi.yaml index 154854628e3..30cd727fc25 100644 --- a/http/token-spray/api-screenshotapi.yaml +++ b/http/token-spray/api-screenshotapi.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/screenshot-api metadata: max-request: 1 - tags: token-spray,screenshotapi,vuln + tags: token-spray,screenshotapi self-contained: true diff --git a/http/token-spray/api-securitytrails.yaml b/http/token-spray/api-securitytrails.yaml index 0564a3c1dc3..ca899105250 100644 --- a/http/token-spray/api-securitytrails.yaml +++ b/http/token-spray/api-securitytrails.yaml @@ -10,7 +10,7 @@ info: - https://securitytrails.com/corp/api metadata: max-request: 1 - tags: recon,securitytrails,token-spray,vuln + tags: recon,securitytrails,token-spray self-contained: true diff --git a/http/token-spray/api-segment.yaml b/http/token-spray/api-segment.yaml index 98945bb4353..917a336e779 100644 --- a/http/token-spray/api-segment.yaml +++ b/http/token-spray/api-segment.yaml @@ -8,7 +8,7 @@ info: - https://reference.segmentapis.com/ metadata: max-request: 1 - tags: token-spray,segment,vuln + tags: token-spray,segment self-contained: true diff --git a/http/token-spray/api-sendgrid.yaml b/http/token-spray/api-sendgrid.yaml index 74423b5dfd9..aa6db766407 100644 --- a/http/token-spray/api-sendgrid.yaml +++ b/http/token-spray/api-sendgrid.yaml @@ -11,7 +11,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,sendgrid,vuln + tags: token-spray,sendgrid self-contained: true diff --git a/http/token-spray/api-sentry.yaml b/http/token-spray/api-sentry.yaml index d607aca135b..75522436111 100644 --- a/http/token-spray/api-sentry.yaml +++ b/http/token-spray/api-sentry.yaml @@ -10,7 +10,7 @@ info: - https://docs.sentry.io/api/auth metadata: max-request: 1 - tags: sentry,tracing,tracking,monitoring,token-spray,vuln + tags: sentry,tracing,tracking,monitoring,token-spray self-contained: true diff --git a/http/token-spray/api-serpstack.yaml b/http/token-spray/api-serpstack.yaml index 5ee0a9b5471..3c30662b3c8 100644 --- a/http/token-spray/api-serpstack.yaml +++ b/http/token-spray/api-serpstack.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/serpstack metadata: max-request: 1 - tags: token-spray,serpstack,vuln + tags: token-spray,serpstack self-contained: true diff --git a/http/token-spray/api-shodan.yaml b/http/token-spray/api-shodan.yaml index 9917b277e3e..f0c2e1260c9 100644 --- a/http/token-spray/api-shodan.yaml +++ b/http/token-spray/api-shodan.yaml @@ -12,7 +12,7 @@ info: - https://developer.shodan.io/api metadata: max-request: 1 - tags: recon,shodan,token-spray,vuln + tags: recon,shodan,token-spray self-contained: true diff --git a/http/token-spray/api-slack.yaml b/http/token-spray/api-slack.yaml index f94c547582d..8698de8592e 100644 --- a/http/token-spray/api-slack.yaml +++ b/http/token-spray/api-slack.yaml @@ -8,7 +8,7 @@ info: - https://api.slack.com/methods/auth.test metadata: max-request: 1 - tags: token-spray,slack,vuln + tags: token-spray,slack self-contained: true diff --git a/http/token-spray/api-smartsheet.yaml b/http/token-spray/api-smartsheet.yaml index eb80b84df2b..91d881adabc 100644 --- a/http/token-spray/api-smartsheet.yaml +++ b/http/token-spray/api-smartsheet.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/smartsheet metadata: max-request: 1 - tags: token-spray,smartsheet,vuln + tags: token-spray,smartsheet self-contained: true diff --git a/http/token-spray/api-sonarcloud.yaml b/http/token-spray/api-sonarcloud.yaml index 08a732f27a5..c58cf2fdbf6 100644 --- a/http/token-spray/api-sonarcloud.yaml +++ b/http/token-spray/api-sonarcloud.yaml @@ -8,7 +8,7 @@ info: - https://sonarcloud.io/web_api/api/authentication metadata: max-request: 1 - tags: token-spray,sonarcloud,vuln + tags: token-spray,sonarcloud self-contained: true diff --git a/http/token-spray/api-spotify.yaml b/http/token-spray/api-spotify.yaml index 4549f4de445..f6176c24d11 100644 --- a/http/token-spray/api-spotify.yaml +++ b/http/token-spray/api-spotify.yaml @@ -8,7 +8,7 @@ info: - https://developer.spotify.com/documentation/general/guides/authorization-guide/ metadata: max-request: 1 - tags: token-spray,spotify,vuln + tags: token-spray,spotify self-contained: true diff --git a/http/token-spray/api-square.yaml b/http/token-spray/api-square.yaml index 96d7ca8fe87..2565c483b49 100644 --- a/http/token-spray/api-square.yaml +++ b/http/token-spray/api-square.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/square metadata: max-request: 2 - tags: token-spray,square,vuln + tags: token-spray,square self-contained: true diff --git a/http/token-spray/api-sslmate.yaml b/http/token-spray/api-sslmate.yaml index 61b6bfd0da0..1c2426fdb85 100644 --- a/http/token-spray/api-sslmate.yaml +++ b/http/token-spray/api-sslmate.yaml @@ -10,7 +10,7 @@ info: - https://sslmate.com/help/reference/apiv2 metadata: max-request: 1 - tags: recon,sslmate,token-spray,vuln + tags: recon,sslmate,token-spray self-contained: true diff --git a/http/token-spray/api-strava.yaml b/http/token-spray/api-strava.yaml index 0da0599647b..aaaeea45b79 100644 --- a/http/token-spray/api-strava.yaml +++ b/http/token-spray/api-strava.yaml @@ -8,7 +8,7 @@ info: - https://developers.strava.com/docs/getting-started/ metadata: max-request: 1 - tags: token-spray,strava,vuln + tags: token-spray,strava self-contained: true diff --git a/http/token-spray/api-stripe.yaml b/http/token-spray/api-stripe.yaml index ac15cd4b36a..8e29c2748e3 100644 --- a/http/token-spray/api-stripe.yaml +++ b/http/token-spray/api-stripe.yaml @@ -8,7 +8,7 @@ info: - https://stripe.com/docs/api/authentication metadata: max-request: 1 - tags: token-spray,stripe,vuln + tags: token-spray,stripe self-contained: true diff --git a/http/token-spray/api-stytch.yaml b/http/token-spray/api-stytch.yaml index d0d619453a2..2b73dd6116d 100644 --- a/http/token-spray/api-stytch.yaml +++ b/http/token-spray/api-stytch.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/stytch metadata: max-request: 1 - tags: token-spray,stytch,vuln + tags: token-spray,stytch self-contained: true diff --git a/http/token-spray/api-supportivekoala.yaml b/http/token-spray/api-supportivekoala.yaml index 3ccc24f8c59..16eda311a48 100644 --- a/http/token-spray/api-supportivekoala.yaml +++ b/http/token-spray/api-supportivekoala.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/supportivekoala metadata: max-request: 1 - tags: token-spray,supportivekoala,vuln + tags: token-spray,supportivekoala self-contained: true diff --git a/http/token-spray/api-taiga.yaml b/http/token-spray/api-taiga.yaml index 9281ec0252d..c0e86059bec 100644 --- a/http/token-spray/api-taiga.yaml +++ b/http/token-spray/api-taiga.yaml @@ -8,7 +8,7 @@ info: - https://docs.taiga.io/api.html metadata: max-request: 1 - tags: token-spray,taiga,vuln + tags: token-spray,taiga self-contained: true diff --git a/http/token-spray/api-tatum.yaml b/http/token-spray/api-tatum.yaml index 9896d25c7c9..cca1d6ea89b 100644 --- a/http/token-spray/api-tatum.yaml +++ b/http/token-spray/api-tatum.yaml @@ -9,7 +9,7 @@ info: - https://docs.tatum.io metadata: max-request: 1 - tags: defi,dapp,token-spray,blockchain,vuln + tags: defi,dapp,token-spray,blockchain self-contained: true diff --git a/http/token-spray/api-telegram.yaml b/http/token-spray/api-telegram.yaml index 7c9fb1f4f60..c0487ac35f1 100644 --- a/http/token-spray/api-telegram.yaml +++ b/http/token-spray/api-telegram.yaml @@ -10,7 +10,7 @@ info: - https://github.com/streaak/keyhacks?tab=readme-ov-file#telegram-bot-api-token metadata: max-request: 1 - tags: token-spray,telegram,vuln + tags: token-spray,telegram self-contained: true diff --git a/http/token-spray/api-thecatapi.yaml b/http/token-spray/api-thecatapi.yaml index 4f88fcf0d8d..1f508da3f0b 100644 --- a/http/token-spray/api-thecatapi.yaml +++ b/http/token-spray/api-thecatapi.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/thecatapi metadata: max-request: 1 - tags: token-spray,thecatapi,vuln + tags: token-spray,thecatapi self-contained: true diff --git a/http/token-spray/api-thedogapi.yaml b/http/token-spray/api-thedogapi.yaml index 213c96338b8..6b741eb3f55 100644 --- a/http/token-spray/api-thedogapi.yaml +++ b/http/token-spray/api-thedogapi.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/thedogapi metadata: max-request: 1 - tags: token-spray,thedogapi,vuln + tags: token-spray,thedogapi self-contained: true diff --git a/http/token-spray/api-ticketmaster.yaml b/http/token-spray/api-ticketmaster.yaml index 6c863e70deb..875471f6bf2 100644 --- a/http/token-spray/api-ticketmaster.yaml +++ b/http/token-spray/api-ticketmaster.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,ticketmaster,vuln + tags: token-spray,ticketmaster self-contained: true diff --git a/http/token-spray/api-tink.yaml b/http/token-spray/api-tink.yaml index 6f1a93b98b1..efd44141d21 100644 --- a/http/token-spray/api-tink.yaml +++ b/http/token-spray/api-tink.yaml @@ -8,7 +8,7 @@ info: - https://docs.tink.com/api metadata: max-request: 1 - tags: token-spray,tink,vuln + tags: token-spray,tink self-contained: true diff --git a/http/token-spray/api-tinypng.yaml b/http/token-spray/api-tinypng.yaml index f40517a1684..14ea8068071 100644 --- a/http/token-spray/api-tinypng.yaml +++ b/http/token-spray/api-tinypng.yaml @@ -8,7 +8,7 @@ info: - https://tinypng.com/developers metadata: max-request: 1 - tags: token-spray,tinypng,vuln + tags: token-spray,tinypng self-contained: true diff --git a/http/token-spray/api-todoist.yaml b/http/token-spray/api-todoist.yaml index bf36eb78e6c..d296f26df06 100644 --- a/http/token-spray/api-todoist.yaml +++ b/http/token-spray/api-todoist.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/todoist metadata: max-request: 1 - tags: token-spray,todoist,vuln + tags: token-spray,todoist self-contained: true diff --git a/http/token-spray/api-travisci.yaml b/http/token-spray/api-travisci.yaml index 5bb7936efdc..79fec36a467 100644 --- a/http/token-spray/api-travisci.yaml +++ b/http/token-spray/api-travisci.yaml @@ -8,7 +8,7 @@ info: - https://developer.travis-ci.com/ metadata: max-request: 1 - tags: token-spray,travis,vuln + tags: token-spray,travis self-contained: true http: diff --git a/http/token-spray/api-trello.yaml b/http/token-spray/api-trello.yaml index 659c5c092c8..adcc2c2a19e 100644 --- a/http/token-spray/api-trello.yaml +++ b/http/token-spray/api-trello.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/trello metadata: max-request: 1 - tags: token-spray,trello,vuln + tags: token-spray,trello self-contained: true diff --git a/http/token-spray/api-twitter.yaml b/http/token-spray/api-twitter.yaml index 299b1bc31b4..700619a4c02 100644 --- a/http/token-spray/api-twitter.yaml +++ b/http/token-spray/api-twitter.yaml @@ -8,7 +8,7 @@ info: - https://developer.twitter.com/en/docs/twitter-api/api-reference-index metadata: max-request: 1 - tags: token-spray,twitter,vuln + tags: token-spray,twitter self-contained: true diff --git a/http/token-spray/api-urlscan.yaml b/http/token-spray/api-urlscan.yaml index 2719842c649..f9d4ebafd3c 100644 --- a/http/token-spray/api-urlscan.yaml +++ b/http/token-spray/api-urlscan.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/urlscan metadata: max-request: 1 - tags: token-spray,urlscan,vuln + tags: token-spray,urlscan self-contained: true diff --git a/http/token-spray/api-userstack.yaml b/http/token-spray/api-userstack.yaml index 83988ca8991..a1a997f3342 100644 --- a/http/token-spray/api-userstack.yaml +++ b/http/token-spray/api-userstack.yaml @@ -8,7 +8,7 @@ info: - https://userstack.com/documentation metadata: max-request: 1 - tags: token-spray,userstack,vuln + tags: token-spray,userstack self-contained: true diff --git a/http/token-spray/api-vercel.yaml b/http/token-spray/api-vercel.yaml index a7e72adddad..9eabacb2386 100644 --- a/http/token-spray/api-vercel.yaml +++ b/http/token-spray/api-vercel.yaml @@ -13,7 +13,7 @@ info: cwe-id: CWE-200 metadata: max-request: 1 - tags: token-spray,vercel,vuln + tags: token-spray,vercel self-contained: true diff --git a/http/token-spray/api-virustotal.yaml b/http/token-spray/api-virustotal.yaml index 9123e942a3c..a3982613c44 100644 --- a/http/token-spray/api-virustotal.yaml +++ b/http/token-spray/api-virustotal.yaml @@ -9,7 +9,7 @@ info: - https://github.com/daffainfo/all-about-apikey/blob/main/Anti%20Malware/VirusTotal.md metadata: max-request: 1 - tags: token-spray,virustotal,vuln + tags: token-spray,virustotal self-contained: true diff --git a/http/token-spray/api-visualstudio.yaml b/http/token-spray/api-visualstudio.yaml index 35c8100cee6..d40152c1aff 100644 --- a/http/token-spray/api-visualstudio.yaml +++ b/http/token-spray/api-visualstudio.yaml @@ -8,7 +8,7 @@ info: - https://openapi.appcenter.ms/ metadata: max-request: 1 - tags: token-spray,visualstudio,microsoft,vuln + tags: token-spray,visualstudio,microsoft self-contained: true diff --git a/http/token-spray/api-wakatime.yaml b/http/token-spray/api-wakatime.yaml index 8632e45d10c..3953b0a612e 100644 --- a/http/token-spray/api-wakatime.yaml +++ b/http/token-spray/api-wakatime.yaml @@ -8,7 +8,7 @@ info: - https://wakatime.com/developers metadata: max-request: 1 - tags: token-spray,wakatime,vuln + tags: token-spray,wakatime self-contained: true diff --git a/http/token-spray/api-web3storage.yaml b/http/token-spray/api-web3storage.yaml index 10ff9ace370..f4781a04cb6 100644 --- a/http/token-spray/api-web3storage.yaml +++ b/http/token-spray/api-web3storage.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/web3-storage metadata: max-request: 1 - tags: token-spray,web3storage,intrusive,vuln + tags: token-spray,web3storage,intrusive self-contained: true diff --git a/http/token-spray/api-webex.yaml b/http/token-spray/api-webex.yaml index edf8d2a6878..0df0d841e05 100644 --- a/http/token-spray/api-webex.yaml +++ b/http/token-spray/api-webex.yaml @@ -8,7 +8,7 @@ info: - https://developer.webex.com/docs/getting-started metadata: max-request: 1 - tags: token-spray,cisco,webex,vuln + tags: token-spray,cisco,webex self-contained: true diff --git a/http/token-spray/api-weglot.yaml b/http/token-spray/api-weglot.yaml index 1537311fcc6..4bada1d5fd0 100644 --- a/http/token-spray/api-weglot.yaml +++ b/http/token-spray/api-weglot.yaml @@ -8,7 +8,7 @@ info: - https://developers.weglot.com/api/reference metadata: max-request: 1 - tags: token-spray,weglot,vuln + tags: token-spray,weglot self-contained: true diff --git a/http/token-spray/api-wordcloud.yaml b/http/token-spray/api-wordcloud.yaml index c8a48e5e22b..625257ac37f 100644 --- a/http/token-spray/api-wordcloud.yaml +++ b/http/token-spray/api-wordcloud.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/word-cloud metadata: max-request: 1 - tags: token-spray,wordcloud,vuln + tags: token-spray,wordcloud self-contained: true diff --git a/http/token-spray/api-wordnik.yaml b/http/token-spray/api-wordnik.yaml index 23c7586fbcd..666b86f6d97 100644 --- a/http/token-spray/api-wordnik.yaml +++ b/http/token-spray/api-wordnik.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/wordnik metadata: max-request: 1 - tags: token-spray,wordnik,vuln + tags: token-spray,wordnik self-contained: true diff --git a/http/token-spray/api-youtube.yaml b/http/token-spray/api-youtube.yaml index 8e643ba34eb..f5a0601ff64 100644 --- a/http/token-spray/api-youtube.yaml +++ b/http/token-spray/api-youtube.yaml @@ -8,7 +8,7 @@ info: - https://developers.google.com/youtube/v3/docs metadata: max-request: 1 - tags: token-spray,youtube,vuln + tags: token-spray,youtube self-contained: true diff --git a/http/token-spray/api-zenrows.yaml b/http/token-spray/api-zenrows.yaml index f865f3bf50a..1fd9daf8ce5 100644 --- a/http/token-spray/api-zenrows.yaml +++ b/http/token-spray/api-zenrows.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/zenrows metadata: max-request: 1 - tags: token-spray,zenrows,vuln + tags: token-spray,zenrows self-contained: true diff --git a/http/token-spray/api-zerbounce.yaml b/http/token-spray/api-zerbounce.yaml index c1949fb92c9..edbcc06d9ef 100644 --- a/http/token-spray/api-zerbounce.yaml +++ b/http/token-spray/api-zerbounce.yaml @@ -9,7 +9,7 @@ info: metadata: verified: true max-request: 1 - tags: token-spray,zerobounce,vuln + tags: token-spray,zerobounce self-contained: true diff --git a/http/token-spray/api-zoomeye.yaml b/http/token-spray/api-zoomeye.yaml index f32b9a82ccb..b93ed8afb36 100644 --- a/http/token-spray/api-zoomeye.yaml +++ b/http/token-spray/api-zoomeye.yaml @@ -11,7 +11,7 @@ info: - https://zoomeye.org/doc metadata: max-request: 1 - tags: recon,zoomeye,token-spray,vuln + tags: recon,zoomeye,token-spray self-contained: true diff --git a/http/token-spray/google-autocomplete.yaml b/http/token-spray/google-autocomplete.yaml index 9528b358814..2ee48730ed6 100644 --- a/http/token-spray/google-autocomplete.yaml +++ b/http/token-spray/google-autocomplete.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,autocomplete,vuln + tags: token-spray,google,autocomplete self-contained: true diff --git a/http/token-spray/google-books.yaml b/http/token-spray/google-books.yaml index f96c15b84f4..c14cd46e351 100644 --- a/http/token-spray/google-books.yaml +++ b/http/token-spray/google-books.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/google-books metadata: max-request: 1 - tags: token-spray,google,books,vuln + tags: token-spray,google,books self-contained: true diff --git a/http/token-spray/google-customsearch.yaml b/http/token-spray/google-customsearch.yaml index 31727cd2855..a7b03aae0cc 100644 --- a/http/token-spray/google-customsearch.yaml +++ b/http/token-spray/google-customsearch.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,search,vuln + tags: token-spray,google,search self-contained: true diff --git a/http/token-spray/google-directions.yaml b/http/token-spray/google-directions.yaml index 5fe03a0644b..6b7b72b46a7 100644 --- a/http/token-spray/google-directions.yaml +++ b/http/token-spray/google-directions.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,directions,vuln + tags: token-spray,google,directions self-contained: true diff --git a/http/token-spray/google-elevation.yaml b/http/token-spray/google-elevation.yaml index 578128b4122..8a8a3d00a73 100644 --- a/http/token-spray/google-elevation.yaml +++ b/http/token-spray/google-elevation.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,elevation,vuln + tags: token-spray,google,elevation self-contained: true diff --git a/http/token-spray/google-fcm.yaml b/http/token-spray/google-fcm.yaml index b3278a2030c..81f9934bd07 100644 --- a/http/token-spray/google-fcm.yaml +++ b/http/token-spray/google-fcm.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,fcm,firebase,cloud,messaging,vuln + tags: token-spray,google,fcm,firebase,cloud,messaging self-contained: true diff --git a/http/token-spray/google-findplacefromtext.yaml b/http/token-spray/google-findplacefromtext.yaml index b8628b3c110..9d973035342 100644 --- a/http/token-spray/google-findplacefromtext.yaml +++ b/http/token-spray/google-findplacefromtext.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,find,text,vuln + tags: token-spray,google,find,text self-contained: true diff --git a/http/token-spray/google-gedistancematrix.yaml b/http/token-spray/google-gedistancematrix.yaml index a0ac522f48a..4ee79d6a7f6 100644 --- a/http/token-spray/google-gedistancematrix.yaml +++ b/http/token-spray/google-gedistancematrix.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,distance,matrix,vuln + tags: token-spray,google,distance,matrix self-contained: true diff --git a/http/token-spray/google-geocode.yaml b/http/token-spray/google-geocode.yaml index b584f4ef94d..f9770f13b9a 100644 --- a/http/token-spray/google-geocode.yaml +++ b/http/token-spray/google-geocode.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,geocode,vuln + tags: token-spray,google,geocode self-contained: true diff --git a/http/token-spray/google-geolocation.yaml b/http/token-spray/google-geolocation.yaml index c0ddcb0f122..40cbd43a62c 100644 --- a/http/token-spray/google-geolocation.yaml +++ b/http/token-spray/google-geolocation.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,geolocation,vuln + tags: token-spray,google,geolocation self-contained: true diff --git a/http/token-spray/google-mapsembed.yaml b/http/token-spray/google-mapsembed.yaml index aac48b77b84..37ba0910cb8 100644 --- a/http/token-spray/google-mapsembed.yaml +++ b/http/token-spray/google-mapsembed.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,maps,embed,vuln + tags: token-spray,google,maps,embed self-contained: true diff --git a/http/token-spray/google-mapsembedadvanced.yaml b/http/token-spray/google-mapsembedadvanced.yaml index 82d9246f7b7..8f91d5d7545 100644 --- a/http/token-spray/google-mapsembedadvanced.yaml +++ b/http/token-spray/google-mapsembedadvanced.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,maps,embed,vuln + tags: token-spray,google,maps,embed self-contained: true diff --git a/http/token-spray/google-nearbysearch.yaml b/http/token-spray/google-nearbysearch.yaml index 7909b3b4eba..f62a56091f3 100644 --- a/http/token-spray/google-nearbysearch.yaml +++ b/http/token-spray/google-nearbysearch.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,search,nearby,vuln + tags: token-spray,google,search,nearby self-contained: true diff --git a/http/token-spray/google-nearestroads.yaml b/http/token-spray/google-nearestroads.yaml index 1a42fb26596..9d5e52590d6 100644 --- a/http/token-spray/google-nearestroads.yaml +++ b/http/token-spray/google-nearestroads.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,roads,vuln + tags: token-spray,google,roads self-contained: true diff --git a/http/token-spray/google-placedetails.yaml b/http/token-spray/google-placedetails.yaml index 2d6aeff283b..52e6e04a1b1 100644 --- a/http/token-spray/google-placedetails.yaml +++ b/http/token-spray/google-placedetails.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,place,details,vuln + tags: token-spray,google,place,details self-contained: true diff --git a/http/token-spray/google-placesphoto.yaml b/http/token-spray/google-placesphoto.yaml index 585f40456d5..8a74055c2ed 100644 --- a/http/token-spray/google-placesphoto.yaml +++ b/http/token-spray/google-placesphoto.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,places,photo,vuln + tags: token-spray,google,places,photo self-contained: true diff --git a/http/token-spray/google-playablelocations.yaml b/http/token-spray/google-playablelocations.yaml index e70c39140f2..6aef6c00824 100644 --- a/http/token-spray/google-playablelocations.yaml +++ b/http/token-spray/google-playablelocations.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,playable,locations,vuln + tags: token-spray,google,playable,locations self-contained: true diff --git a/http/token-spray/google-routetotraveled.yaml b/http/token-spray/google-routetotraveled.yaml index 7113f941a6b..0e8ba68348f 100644 --- a/http/token-spray/google-routetotraveled.yaml +++ b/http/token-spray/google-routetotraveled.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,route,vuln + tags: token-spray,google,route self-contained: true diff --git a/http/token-spray/google-safebrowsing.yaml b/http/token-spray/google-safebrowsing.yaml index 7921f5d2bcc..82a3ac432c1 100644 --- a/http/token-spray/google-safebrowsing.yaml +++ b/http/token-spray/google-safebrowsing.yaml @@ -10,7 +10,7 @@ info: - https://github.com/daffainfo/all-about-apikey/tree/main/google-safe-browsing metadata: max-request: 1 - tags: token-spray,google,safebrowsing,vuln + tags: token-spray,google,safebrowsing self-contained: true diff --git a/http/token-spray/google-speedlimit.yaml b/http/token-spray/google-speedlimit.yaml index eac7e678f75..cae9ec47518 100644 --- a/http/token-spray/google-speedlimit.yaml +++ b/http/token-spray/google-speedlimit.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,speed,limit,vuln + tags: token-spray,google,speed,limit self-contained: true diff --git a/http/token-spray/google-staticmaps.yaml b/http/token-spray/google-staticmaps.yaml index ab3a9f6070a..d0d4115f6fb 100644 --- a/http/token-spray/google-staticmaps.yaml +++ b/http/token-spray/google-staticmaps.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,maps,vuln + tags: token-spray,google,maps self-contained: true diff --git a/http/token-spray/google-streetview.yaml b/http/token-spray/google-streetview.yaml index cdb7422d9b2..81a67b94802 100644 --- a/http/token-spray/google-streetview.yaml +++ b/http/token-spray/google-streetview.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,streetview,vuln + tags: token-spray,google,streetview self-contained: true diff --git a/http/token-spray/google-textsearchplaces.yaml b/http/token-spray/google-textsearchplaces.yaml index ecb665b00dd..c39213f75fe 100644 --- a/http/token-spray/google-textsearchplaces.yaml +++ b/http/token-spray/google-textsearchplaces.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,search,places,text,vuln + tags: token-spray,google,search,places,text self-contained: true diff --git a/http/token-spray/google-timezone.yaml b/http/token-spray/google-timezone.yaml index e466f9d5691..87bc53580ed 100644 --- a/http/token-spray/google-timezone.yaml +++ b/http/token-spray/google-timezone.yaml @@ -6,7 +6,7 @@ info: severity: info metadata: max-request: 1 - tags: token-spray,google,timezone,vuln + tags: token-spray,google,timezone self-contained: true diff --git a/ssl/c2/asyncrat-c2.yaml b/ssl/c2/asyncrat-c2.yaml index 53116a10fbc..ec344c57eae 100644 --- a/ssl/c2/asyncrat-c2.yaml +++ b/ssl/c2/asyncrat-c2.yaml @@ -13,7 +13,7 @@ info: max-request: 1 shodan-query: ssl:"AsyncRAT Server" censys-query: services.tls.certificates.leaf_data.issuer.common_name:AsyncRat - tags: c2,ssl,tls,ir,osint,malware,asyncrat,vuln + tags: c2,ssl,tls,ir,osint,malware,asyncrat,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/bitrat-c2.yaml b/ssl/c2/bitrat-c2.yaml index 5acccfbcff3..f4ce11a38d1 100644 --- a/ssl/c2/bitrat-c2.yaml +++ b/ssl/c2/bitrat-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 censys-query: 'services.tls.certificates.leaf_data.subject.common_name: "BitRAT"' - tags: ssl,tls,c2,ir,osint,malware,bitrat,vuln + tags: ssl,tls,c2,ir,osint,malware,bitrat,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/cobalt-strike-c2.yaml b/ssl/c2/cobalt-strike-c2.yaml index e95f987e534..d7b274765e2 100644 --- a/ssl/c2/cobalt-strike-c2.yaml +++ b/ssl/c2/cobalt-strike-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 shodan-query: ssl.cert.serial:146473198 - tags: c2,ssl,tls,ir,osint,malware,panel,cobalt-strike,vuln + tags: c2,ssl,tls,ir,osint,malware,panel,cobalt-strike,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/covenant-c2-ssl.yaml b/ssl/c2/covenant-c2-ssl.yaml index 1c94827ef62..5096cfd572c 100644 --- a/ssl/c2/covenant-c2-ssl.yaml +++ b/ssl/c2/covenant-c2-ssl.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 shodan-query: ssl:”Covenant” http.component:”Blazor” - tags: ssl,tls,c2,ir,osint,malware,covenant,vuln + tags: ssl,tls,c2,ir,osint,malware,covenant,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/dcrat-server-c2.yaml b/ssl/c2/dcrat-server-c2.yaml index 69625291ba4..da44b6e7c64 100644 --- a/ssl/c2/dcrat-server-c2.yaml +++ b/ssl/c2/dcrat-server-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 censys-query: 'services.tls.certificates.leaf_data.subject.common_name: "DcRat Server"' - tags: c2,ssl,tls,ir,osint,malware,dcrat,vuln + tags: c2,ssl,tls,ir,osint,malware,dcrat,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/gozi-malware-c2.yaml b/ssl/c2/gozi-malware-c2.yaml index b95192a8af5..891b5b04574 100644 --- a/ssl/c2/gozi-malware-c2.yaml +++ b/ssl/c2/gozi-malware-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 censys-query: 'services.tls.certificates.leaf_data.issuer_dn: "C=XX, ST=1, L=1, O=1, OU=1, CN=\*"' - tags: ssl,tls,c2,ir,osint,malware,gozi,vuln + tags: ssl,tls,c2,ir,osint,malware,gozi,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/havoc-c2.yaml b/ssl/c2/havoc-c2.yaml index a5856c7459f..9814efc4555 100644 --- a/ssl/c2/havoc-c2.yaml +++ b/ssl/c2/havoc-c2.yaml @@ -13,7 +13,7 @@ info: verified: "true" max-request: 1 shodan-query: 'ssl:postalCode=3540 ssl.jarm:3fd21b20d00000021c43d21b21b43de0a012c76cf078b8d06f4620c2286f5e' - tags: c2,ssl,tls,ir,osint,malware,havoc,vuln + tags: c2,ssl,tls,ir,osint,malware,havoc,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/icedid.yaml b/ssl/c2/icedid.yaml index 01a4bbd520c..be336717d55 100644 --- a/ssl/c2/icedid.yaml +++ b/ssl/c2/icedid.yaml @@ -10,7 +10,7 @@ info: verified: "true" max-request: 1 censys-query: CN=localhost, C=AU, ST=Some-State, O=Internet Widgits Pty Ltd - tags: c2,ssl,tls,ir,osint,malware,bokbot,icedid,vuln + tags: c2,ssl,tls,ir,osint,malware,bokbot,icedid,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/metasploit-c2.yaml b/ssl/c2/metasploit-c2.yaml index 213a397de7a..9ab022a87c1 100644 --- a/ssl/c2/metasploit-c2.yaml +++ b/ssl/c2/metasploit-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 shodan-query: ssl:"MetasploitSelfSignedCA" - tags: c2,ssl,tls,ir,osint,malware,metasploit,vuln + tags: c2,ssl,tls,ir,osint,malware,metasploit,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/mythic-c2-ssl.yaml b/ssl/c2/mythic-c2-ssl.yaml index f7624f7ede2..258fad8f374 100644 --- a/ssl/c2/mythic-c2-ssl.yaml +++ b/ssl/c2/mythic-c2-ssl.yaml @@ -14,7 +14,7 @@ info: max-request: 1 shodan-query: ssl:"Mythic" censys-query: services.tls.certificates.leaf_data.issuer.common_name:Mythic - tags: c2,ssl,tls,ir,osint,malware,mythic,vuln + tags: c2,ssl,tls,ir,osint,malware,mythic,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/onimai-rat-c2.yaml b/ssl/c2/onimai-rat-c2.yaml index 713dd1a15da..0db345dc33d 100644 --- a/ssl/c2/onimai-rat-c2.yaml +++ b/ssl/c2/onimai-rat-c2.yaml @@ -11,7 +11,7 @@ info: max-request: 1 shodan-query: ssl.cert.subject.cn:"Onimai Academies CA" censys-query: 'services.tls.certificates.leaf_data.subject.common_name: {"Onimai Academies CA"}' - tags: c2,ir,osint,malware,onimai,rat,vuln + tags: c2,ir,osint,malware,onimai,rat,discovery ssl: - address: "{{Host}}:{{Port}}" diff --git a/ssl/c2/orcus-rat-c2.yaml b/ssl/c2/orcus-rat-c2.yaml index 26ed7f4042d..1c8d09653e0 100644 --- a/ssl/c2/orcus-rat-c2.yaml +++ b/ssl/c2/orcus-rat-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 censys-query: 'services.tls.certificates.leaf_data.subject.common_name: {"Orcus Server", "OrcusServerCertificate"}' - tags: c2,ssl,tls,ir,osint,malware,orcusrat,vuln + tags: c2,ssl,tls,ir,osint,malware,orcusrat,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/posh-c2.yaml b/ssl/c2/posh-c2.yaml index 764c0980732..3cbe89b5ac5 100644 --- a/ssl/c2/posh-c2.yaml +++ b/ssl/c2/posh-c2.yaml @@ -13,7 +13,7 @@ info: verified: "true" max-request: 1 shodan-query: ssl:"P18055077" - tags: c2,ssl,tls,ir,osint,malware,posh,vuln + tags: c2,ssl,tls,ir,osint,malware,posh,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/quasar-rat-c2.yaml b/ssl/c2/quasar-rat-c2.yaml index 1efa901ca5b..e483cd6a2e5 100644 --- a/ssl/c2/quasar-rat-c2.yaml +++ b/ssl/c2/quasar-rat-c2.yaml @@ -13,7 +13,7 @@ info: max-request: 1 shodan-query: ssl.cert.subject.cn:"Quasar Server CA" censys-query: 'services.tls.certificates.leaf_data.subject.common_name: {"Quasar Server CA"}' - tags: c2,ssl,tls,ir,osint,malware,quasar,vuln + tags: c2,ssl,tls,ir,osint,malware,quasar,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/shadowpad-c2.yaml b/ssl/c2/shadowpad-c2.yaml index 0e09644e068..1a725c19b85 100644 --- a/ssl/c2/shadowpad-c2.yaml +++ b/ssl/c2/shadowpad-c2.yaml @@ -10,7 +10,7 @@ info: verified: "true" max-request: 1 censys-query: services.tls.certificates.leaf_data.subject_dn="C=CN, ST=myprovince, L=mycity, O=myorganization, OU=mygroup, CN=myServer" - tags: ssl,tls,c2,ir,osint,malware,shadowpad,vuln + tags: ssl,tls,c2,ir,osint,malware,shadowpad,discovery ssl: - address: "{{Host}}:{{Port}}" matchers: diff --git a/ssl/c2/sliver-c2.yaml b/ssl/c2/sliver-c2.yaml index f1422770f65..aa9a555e2ba 100644 --- a/ssl/c2/sliver-c2.yaml +++ b/ssl/c2/sliver-c2.yaml @@ -12,7 +12,7 @@ info: verified: "true" max-request: 1 shodan-query: product:"Sliver C2" - tags: c2,ssl,ir,osint,malware,sliver,tls,vuln + tags: c2,ssl,ir,osint,malware,sliver,tls,discovery ssl: - address: "{{Host}}:{{Port}}" matchers-condition: and diff --git a/ssl/c2/venomrat.yaml b/ssl/c2/venomrat.yaml index 134f0c4d83a..d524151ee8c 100644 --- a/ssl/c2/venomrat.yaml +++ b/ssl/c2/venomrat.yaml @@ -10,7 +10,7 @@ info: verified: "true" max-request: 1 fofa-query: cert.issuer.cn="VenomRAT Server" - tags: c2,ir,osint,malware,ssl,venomrat,tls,vuln + tags: c2,ir,osint,malware,ssl,venomrat,tls,discovery ssl: - address: "{{Host}}:{{Port}}"