Skip to content

Commit

Permalink
Updating Rule reference Id's and Policy categories (#582)
Browse files Browse the repository at this point in the history
  • Loading branch information
shreyas-phansalkar-189 authored Mar 9, 2021
1 parent 9546bcc commit dbb5a91
Show file tree
Hide file tree
Showing 46 changed files with 93 additions and 93 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Repository is Not Private.",
"reference_id": "accurics.gcp.IAM.145",
"category": "Identity \u0026 Access Management",
"reference_id": "AC-GC-IA-GR-M-0001",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "BigQuery datasets may be anonymously or publicly accessible.",
"reference_id": "accurics.gcp.IAM.106",
"category": "Identity \u0026 Access Management",
"reference_id": "AC-GC-IA-BQ-H-0002",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Ensure VM disks for critical VMs are encrypted with Customer Supplied Encryption Keys (CSEK) .",
"reference_id": "accurics.gcp.EKM.131",
"category": "Encryption \u0026 Key Management",
"reference_id": "AC-GC-DP-CD-M-0003",
"category": "Data Protection",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "VM disks attached to a compute instance should be encrypted with Customer Supplied Encryption Keys (CSEK) .",
"reference_id": "accurics.gcp.EKM.132",
"category": "Encryption \u0026 Key Management",
"reference_id": "AC-GC-DP-CI-M-0196",
"category": "Data Protection",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Instances may have been configured to use the default service account with full access to all Cloud APIs",
"reference_id": "accurics.gcp.IAM.124",
"category": "Identity \u0026 Access Management",
"reference_id": "AC-GC-IA-CI-M-0191",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"severity": "MEDIUM",
"description": "Ensure that no instance in the project overrides the project setting for enabling OSLogin",
"reference_id": "accurics.gcp.IAM.128",
"category": "Identity \u0026 Access Management",
"reference_id": "AC-GC-IA-CI-M-0193",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Instances may have been configured to use the default service account with full access to all Cloud APIs",
"reference_id": "accurics.gcp.NS.125",
"category": "Access Control",
"reference_id": "AC-GC-IS-CI-H-0190",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"severity": "MEDIUM",
"description": "Ensure 'Block Project-wide SSH keys' is enabled for VM instances.",
"reference_id": "accurics.gcp.NS.126",
"category": "Network Security",
"reference_id": "AC-GC-IS-CI-M-0192",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"severity": "MEDIUM",
"description": "Ensure 'Enable connecting to serial ports' is not enabled for VM instances.",
"reference_id": "accurics.gcp.NS.129",
"category": "Network Security",
"reference_id": "AC-GC-IS-CI-M-0194",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
},
"severity": "MEDIUM",
"description": "Ensure IP forwarding is not enabled on Instances.",
"reference_id": "accurics.gcp.NS.130",
"category": "Network Security",
"reference_id": "AC-GC-IS-CI-M-0195",
"category": "Infrastructure Security",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Ensure Compute instances are launched with Shielded VM enabled.",
"reference_id": "accurics.gcp.NS.133",
"category": "Network Security ",
"reference_id": "AC-GC-IS-CI-M-0197",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Ensure no HTTPS or SSL proxy load balancers permit SSL policies with weak cipher suites.",
"reference_id": "accurics.gcp.EKM.134",
"category": "Encryption \u0026 Key Management",
"reference_id": "AC-GC-IS-CP-M-0198",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Ensure that VPC Flow Logs is enabled for every subnet in a VPC Network.",
"reference_id": "accurics.gcp.LOG.118",
"category": "Logging ",
"reference_id": "AC-GC-LM-CS-M-0199",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure Kubernetes Cluster is created with Alias IP ranges enabled",
"reference_id": "accurics.gcp.OPS.115",
"category": "Operational Efficiency",
"reference_id": "AC-GC-CV-CC-H-0207",
"category": "Compliance Validation",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters.",
"reference_id": "accurics.gcp.OPS.116",
"category": "Operational Efficiency",
"reference_id": "AC-GC-CV-CC-H-0210",
"category": "Compliance Validation",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure Kubernetes Clusters are configured with Labels.",
"reference_id": "accurics.gcp.OPS.113",
"category": "Operational Efficiency",
"reference_id": "AC-GC-CV-CC-H-0213",
"category": "Compliance Validation",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure Legacy Authorization is set to disabled on Kubernetes Engine Clusters.",
"reference_id": "accurics.gcp.IAM.142",
"category": "Identity \u0026 Access Management",
"reference_id": "AC-GC-IA-CC-H-0204",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure Kubernetes Cluster is created with Client Certificate disabled.",
"reference_id": "accurics.gcp.IAM.104",
"category": "Identity \u0026 Access Management",
"reference_id": "AC-GC-IA-CC-H-0208",
"category": "Identity and Access Management",
"version": 1
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure GKE basic auth is disabled.",
"reference_id": "accurics.gcp.IAM.110",
"category": "Identity \u0026 Access Management",
"reference_id": "AC-GC-IA-CC-H-0211",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure Master Authentication is set to enabled on Kubernetes Engine Clusters.",
"reference_id": "accurics.gcp.NS.112",
"category": "Network Security",
"reference_id": "AC-GC-IS-CC-H-0205",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure Network policy is enabled on Kubernetes Engine Clusters.",
"reference_id": "accurics.gcp.NS.103",
"category": "Network Security",
"reference_id": "AC-GC-IS-CC-H-0206",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure GKE Control Plane is not public.",
"reference_id": "accurics.gcp.NS.109",
"category": "Network Security",
"reference_id": "AC-GC-IS-CC-H-0209",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure Kubernetes Cluster is created with Private cluster enabled.",
"reference_id": "accurics.gcp.NS.117",
"category": "Network Security",
"reference_id": "AC-GC-IS-CC-H-0212",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"severity": "HIGH",
"description": "Ensure Stackdriver Logging is enabled on Kubernetes Engine Clusters.",
"reference_id": "accurics.gcp.LOG.100",
"category": "Logging",
"reference_id": "AC-GC-LM-CC-H-0202",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"severity": "HIGH",
"description": "Ensure Stackdriver Monitoring is enabled on Kubernetes Engine Clusters.",
"reference_id": "accurics.gcp.MON.143",
"category": "Monitoring",
"reference_id": "AC-GC-LM-CC-H-0203",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure Container-Optimized OS (cos) is used for Kubernetes Engine Clusters Node image.",
"reference_id": "accurics.gcp.OPS.114",
"category": "Operational Efficiency",
"reference_id": "AC-GC-CV-CN-H-0216",
"category": "Compliance Validation",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"severity": "HIGH",
"description": "Ensure 'Automatic node upgrade' is enabled for Kubernetes Clusters.",
"reference_id": "accurics.gcp.OPS.101",
"category": "Operational Efficiency",
"reference_id": "AC-GC-SP-CN-H-0215",
"category": "Security Best Practices",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
},
"severity": "MEDIUM",
"description": "Ensure 'Automatic node repair' is enabled for Kubernetes Clusters.",
"reference_id": "accurics.gcp.OPS.144",
"category": "Operational Efficiency",
"reference_id": "AC-GC-SP-CN-M-0217",
"category": "Security Best Practices",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure that DNSSEC is enabled for Cloud DNS.",
"reference_id": "accurics.gcp.NS.107",
"category": "Network Security",
"reference_id": "AC-GC-IS-DZ-H-0218",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure that RSASHA1 is not used for the zone-signing and key-signing keys in Cloud DNS DNSSEC.",
"reference_id": "accurics.gcp.EKM.108",
"category": "Encryption \u0026 Key Management",
"reference_id": "AC-GC-IS-DZ-H-0219",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure Encryption keys are rotated within a period of 365 days.",
"reference_id": "accurics.gcp.EKM.007",
"category": "Encryption \u0026 Key Management",
"reference_id": "AC-GC-SP-KC-H-0220",
"category": "Security Best Practices",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Ensure Encryption keys are rotated within a period of 90 days.",
"reference_id": "accurics.gcp.EKM.139",
"category": "Encryption \u0026 Key Management",
"reference_id": "AC-GC-SP-KC-M-0221",
"category": "Security Best Practices",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Ensure that the default network does not exist in a project.",
"reference_id": "accurics.gcp.NS.119",
"category": "Network Security",
"reference_id": "AC-GC-IS-PR-M-0222",
"category": "Infrastructure Security",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure that Cloud Audit Logging is configured properly across all services and all users from a project.",
"reference_id": "accurics.gcp.LOG.010",
"category": "Logging",
"reference_id": "AC-GC-LM-PA-H-0223",
"category": "Logging and Monitoring",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "HIGH",
"description": "Ensure that corporate login credentials are used instead of Gmail accounts.",
"reference_id": "accurics.gcp.IAM.150",
"reference_id": "AC-GC-IA-PB-H-0224",
"category": "Identity and Access Management",
"version": 1
}
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
"template_args": null,
"severity": "MEDIUM",
"description": "Ensure that IAM users are not assigned the Service Account User or Service Account Token Creator roles at project level.",
"reference_id": "accurics.gcp.IAM.136",
"category": "Identity \u0026 Access Management",
"reference_id": "AC-GC-IA-PB-M-0225",
"category": "Identity and Access Management",
"version": 1
}
Loading

0 comments on commit dbb5a91

Please sign in to comment.