Refer to this page for information about version-specific improvements to SD Elements and associated content.
2024.3 | 2024.2 | 2024.1 | 2023.4 | 2023.3 | 2023.2 | 2023.1 | 2022.4 | 2022.3 | 2022.2 | 5.20 | 5.19 | 5.18 | 5.17 | 5.16 | 5.15 | 5.14 | 5.13 | 5.12 | 5.11 | 5.10 | 5.9 | 5.8 | 5.7 | 5.6 | 5.5 | 5.4 | 5.3 | 5.2 | 5.1 | 5.0
2024.3
October 12, 2024
New features and enhancements
Library Weakness
- Added the ability to update CWE mappings on Library Weaknesses including the ability to revert those changes back to latest builtin content mapping.
Library Countermeasures
- Added the API capability to POST, PATCH and DELETE Countermeasures, Additional Requirements and How-Tos.
- Improved GET API functionality for Library Countermeasures including new ways to filter content by.
CompositeAPI
- Added the ability to send multiple API requests in a single HTTP request and roll back all changes if any request fails. This reduces the need for multiple API calls and improves performance.
Updates
November 9, 2024
- Scan a Repository
- Added the ability to connect to GitLab to scan a repository
- Users now have the option to connect to either GitLab or GitHub
- Added additional mapping coverage for Containerization, .NET, and C/C++ Technologies
Content improvements summary
- EU Cyber Resilience Act
- Added a new Compliance Regulation and 16 new countermeasures, 16 new weaknesses,and 3 amendments.
- UK PSTI
- Added a new Compliance Regulation and 3 new amendments.
- ANSI/ISA 62443-4-1 (ISASecure SDLA 312)
- Updated the mappings and added new countermeasures to the regulation to account for gaps that were detected.
Content additions and updates (as of September 27, 2024)
Compliance Regulations and Mappings
- Added UK PSTI
- Added EU Cyber Resilience Act
- Updated OWASP Top 10 for Large Language Model Applications v1.0.0 [INFO: Updated the regulation sections].
- Updated ANSI/ISA 62443-4-1 (ISASecure SDLA 312) [INFO: Updated the regulation sections].
Content Packs
- Added UK PSTI
- Added API Gateway
- Added Podman
- Added CRM
- Added Salesforce
- Added CircleCI
- Added EU Cyber Resilience Act
- Added Bash/Shell
T13: Change Automatically Generated Passwords
- TA6891: PSTI Requirement 1 [Added]
- T21: Ensure all data in transit is encrypted using a secure TLS channel
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- INFO: Updated the match conditions.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T170: Secure IPC endpoints used in clients [Updated]
- INFO: Updated the match conditions.
- T312: Verify that inter-process communication (IPC) endpoints are secured in client [Updated]
- INFO: Updated the match conditions.
- T370: Follow best practices for using third-party software libraries/modules and open source/COTS components
- TA6895: Facilitate due diligence if using free and open-source software (FOSS) components in your products [Added]
- T379: Provide sufficient documentation for security-related features
- TA6889: PSTI Requirement 2 [Added]
- TA6890: PSTI Requirement 3 [Added]
- T1376: Provide and maintain guidance on secure installation, maintenance, and configuration of all software components
- TA6814: SDLA 312 Requirement (SG-7) [Deactivated]
- T1388: Triage and fix vulnerabilities discovered during automated and manual security tests
- TA6893: Effective vulnerability management throughout the product's support period [Added]
- TA6803: SDLA 312 Requirement (DM-6) [Deactivated]
- TA6820: SDLA 312 Requirement (SM-12) [Deactivated]
- TA6821: SDLA 312 Requirement (SM-13) [Deactivated]
- T1921: Track and manage usage of third-party and commercial off the shelf (COTS) hardware or software
- TA6892: Reporting and addressing vulnerabilities in third-party components [Added]
- T2510: Define cybersecurity goals and requirements for a component
- TA6807: SDLA 312 Requirement (SD-4) [Deactivated]
- TA6833: SDLA 312 Requirement (SR-5) [Deactivated]
- T2513: Verify whether cybersecurity goals and requirements are clearly defined for a component
- TA6851: SDLA 312 Test Requirement (SD-2) [Deactivated]
- TA6852: SDLA 312 Test Requirement (SD-3) [Deactivated]
- TA6853: SDLA 312 Test Requirement (SD-4) [Deactivated]
- TA6878: SDLA 312 Test Requirement (SR-5) [Deactivated]
- T2519: Prevent prompt injection in Large Language Models [Deactivated]
- T2520: Test the prevention of prompt injection in Large Language Models [Deactivated]
- T2521: Handle insecure output in Large Language Models [Deactivated]
- T2522: Test insecure output handling in Large Language Models [Deactivated]
- T2523: Prevent training data poisoning in Large Language Models [Deactivated]
- T2524: Test the prevention of training data poisoning in Large Language Models [Deactivated]
- T2525: Prevent Large Language Model Denial of Service [Deactivated]
- T2526: Test the prevention Large Language Model Denial of Service [Deactivated]
- T2527: Protect Large Language Models against supply chain vulnerabilities [Deactivated]
- T2528: Test the protection of Large Language Models against supply chain vulnerabilities [Deactivated]
- T2529: Prevent sensitive information disclosure in Large Language Models [Deactivated]
- T2530: Test the prevention of sensitive information disclosure in Large Language Models [Deactivated]
- T2531: Design secure plugins for Large Language Models [Deactivated]
- T2532: Test plugin design security for Large Language Models [Deactivated]
- T2533: Mitigate excessive agency in Large Language Models [Deactivated]
- T2534: Test excessive agency mitigation in Large Language Models [Deactivated]
- T2535: Mitigate overreliance in Large Language Models [Deactivated]
- T2536: Test overreliance in Large Language Models [Deactivated]
- T2537: Prevent model theft in Large Language Models [Deactivated]
- T2538: Test model theft prevention in Large Language Models [Deactivated]
- T2675: Verify that vulnerabilities discovered during automated and manual security tests are triaged and fixed
- TA6849: SDLA 312 Test Requirement (DM-6) [Deactivated]
- TA6865: SDLA 312 Test Requirement (SM-12) [Deactivated]
- TA6866: SDLA 312 Test Requirement (SM-13) [Deactivated]
- T2678: Verify that guidance is provided and maintained for secure installation, maintenance and configuration of all software components
- TA6859: SDLA 312 Test Requirement (SG-7) [Deactivated]
- T4207: Anonymize sensitive data in the analytics environment with the DLP API (GCP) [Added]
- P2211: Insufficient privacy of data in analytics workloads (GCP) [Added]
- T4208: Ensure all types of data are reviewed and classified (GCP) [Added]
- P2212: Insufficient data classification and data controls (GCP) [Added]
- T4209: Record data classification attributes in the Data Catalog (GCP) [Added]
- P2213: Failure to maintain data classification and data controls in different workloads (GCP) [Added]
- T4210: Protect data in integration workflows (GCP) [Added]
- P2214: Sensitive data exposure (GCP) [Added]
- T4211: Connect securely to services in integration workflows (GCP) [Added]
- P2215: Insecure access to resources during integration workflows (GCP) [Added]
- T4212: Implement strict key processes for storing, handling, and using blockchain keys (GCP) [Added]
- P2216: Insecure key management (GCP) [Added]
- T4213: Use established patterns to hide private data and link it to blockchain transactions (GCP) [Added]
- P2217: Disclosure of private business data (GCP) [Added]
- T4214: Have a plan for modifying smart contracts or mitigating newly discovered vulnerabilities (GCP) [Added]
- P2218: Smart contract vulnerabilities (GCP) [Added]
- T4215: Harden Google Workspace user settings (GCP) [Added]
- P2219: Insufficient protection of user accounts (GCP) [Added]
- T4216: Implement policies for secure handling of business data (GCP) [Added]
- P2220: Insecure handling of business data in Google business applications (GCP) [Added]
- T4217: Isolate application workloads according to security requirements (GCP) [Added]
- P2221: Insufficient isolation of application workloads (GCP) [Added]
- T4218: Ensure compute services have sufficient resources and are fault tolerant (GCP) [Added]
- P2222: Denial of service attacks against application workloads (GCP) [Added]
- T4219: Monitor application workloads and patch vulnerabilities (GCP) [Added]
- P2223: Undetected vulnerabilities in application workloads (GCP) [Added]
- T4220: Deploy and manage application environments through automation (GCP) [Added]
- P2224: Manual application management processes (GCP) [Added]
- T4221: Use trusted container images (GCP) [Added]
- P2225: Vulnerable container images (GCP) [Added]
- T4222: Protect images against supply chain attacks (GCP) [Added]
- P2226: Supply chain attacks that target container images (GCP) [Added]
- T4223: Run containers with a least privilege identity (GCP) [Added]
- P2227: Containers with excessive privileges (GCP) [Added]
- T4224: Use IAM authentication for databases if supported (GCP) [Added]
- P2228: Weaknesses in credential management (GCP) [Added]
- T4225: Create dedicated database user accounts with minimum privileges (GCP) [Added]
- P2229: Excessive permissions for database user accounts (GCP) [Added]
- T4226: Use automatic authentication with a Cloud SQL connector (GCP) [Added]
- P2230: Insecure connection practices (GCP) [Added]
- T4227: Schedule regular database backups to protect availability (GCP) [Added]
- P2231: Failure to safeguard against data loss (GCP) [Added]
- T4228: Monitor database activity and collect database instance logs (GCP) [Added]
- P2232: Failure to monitor database activity (GCP) [Added]
- T4229: Use a centralized artifact store to manage dependencies (GCP) [Added]
- P2233: Vulnerable or malicious application dependencies (GCP) [Added]
- T4230: Deploy software using automated processes (GCP) [Added]
- P2234: Poor dependency management with manual deployment (GCP) [Added]
- T4231: Protect the software supply chain with Software Delivery Shield (GCP) [Added]
- P2235: Insufficient controls to detect vulnerable code (GCP) [Added]
- T4232: Give developers least privilege access to the development environment (GCP) [Added]
- P2236: Excessive permissions in the development environment (GCP) [Added]
- T4233: Log activity in the development environment (GCP) [Added]
- P2237: Insufficient monitoring of development activity and CI/CD processes (GCP) [Added]
- T4234: Vet data and monitor models according to best practices (GCP) [Added]
- P2238: Data poisoning attacks (GCP) [Added]
- T4235: Vet training data sets for sensitive data and sanitize them (GCP) [Added]
- P2239: Exposure of sensitive or confidential data (GCP) [Added]
- T4236: Isolate ML workloads (GCP) [Added]
- P2240: Unecessary exposure of ML environments (GCP) [Added]
- T4237: Limit access to ML artifacts (GCP) [Added]
- P2241: Insufficient protection for ML artifacts (GCP) [Added]
- T4238: Review the Google Responsible AI policy and ensure your application is in compliance (GCP) [Added]
- P2242: Failure to meet the Google Responsible AI policy (GCP) [Added]
- T4239: Use automated processes to keep people away from data (GCP) [Added]
- P2243: Manual management processes with insufficient security controls (GCP) [Added]
- T4240: Use the Organization Policy Service to enforce a consistent security baseline (GCP) [Added]
- P2244: Lack of controls to enforce security policy in complex environments (GCP) [Added]
- T4241: Follow best practices for logging and monitoring (GCP) [Added]
- P2245: Insecure or insufficient system logging (GCP) [Added]
- T4242: Protect API keys with use restrictions and signatures (GCP) [Added]
- P2246: Inadequate protection of API keys for Maps Platform APIs (GCP) [Added]
- T4243: Follow privacy rules for location data with Maps API (GCP) [Added]
- P2247: Failure to ensure privacy of location data (GCP) [Added]
- T4244: Serve private media content with Media CDN (GCP) [Added]
- P2248: Insufficient protection for high-value media content (GCP) [Added]
- T4245: Look for logging anomalies and consider watermarking content (GCP) [Added]
- P2249: Failure to detect unauthorized media access (GCP) [Added]
- T4246: Defend media workloads against denial of service attacks (GCP) [Added]
- P2250: Denial of service attacks against streaming services (GCP) [Added]
- T4247: Follow the assess, mobilize, migrate pattern (GCP) [Added]
- P2251: Lack of migration planning (GCP) [Added]
- T4248: Understand how discovery tools use data and ensure it is handled securely. (GCP) [Added]
- P2252: Excessive permissions for discovery tools (GCP) [Added]
- T4249: Begin migrations by establishing a landing zone (GCP) [Added]
- P2253: Incomplete or insecure deployment (GCP) [Added]
- T4250: Protect migration data with validation and a secure connection method (GCP) [Added]
- P2254: Failure to safeguard data during migration (GCP) [Added]
- T4251: Segment your network and implement security controls between zones (GCP) [Added]
- P2255: Insufficient network isolation in a GCP environment (GCP) [Added]
- T4252: Put public endpoints behind a load balancer (GCP) [Added]
- P2256: Failure to protect public endpoints (GCP) [Added]
- T4253: Harden VPCs against denial of service attacks (GCP) [Added]
- P2257: Denial of service attacks against networks and public endpoints (GCP) [Added]
- T4254: Implement best practices for hybrid networks (GCP) [Added]
- P2258: Weak security controls for hybrid networks (GCP) [Added]
- T4255: Follow best practices for key management and monitoring (GCP) [Added]
- P2259: Insecure key management for Google Cloud Security and Identity (GCP) [Added]
- T4256: Ensure security events trigger notifications and responses (GCP) [Added]
- P2260: Insufficient monitoring of security events (GCP) [Added]
- T4257: Conduct regular security audits (GCP) [Added]
- P2261: Failing to follow business security policy (GCP) [Added]
- T4258: Use IAM conditions for fine-grained security in complex environments (GCP) [Added]
- P2262: Inflexible IAM policies for large and dynamic systems (GCP) [Added]
- T4259: Implement access controls based on the sensitivity and criticality of data (GCP) [Added]
- P2263: Insufficient data access controls (GCP) [Added]
- T4260: Use detective controls and data auditing to detect anomalous activity (GCP) [Added]
- P2264: Failure to monitor storage access (GCP) [Added]
- T4261: Schedule regular backups (GCP) [Added]
- P2265: Failure to safeguard against data loss in cloud storage (GCP) [Added]
- T4262: Establish a service perimeter around workloads with sensitive data (GCP) [Added]
- P2266: Data exfiltration from sensitive workloads (GCP) [Added]
- T4263: Implement traffic controls such as rate limiting [Added]
- P2267: Denial of service attacks against API endpoints [Added]
- T4264: Validate and reject malicious requests before processing them [Added]
- P2268: Requests with excessively large or corrupted data [Added]
- T4265: Implement strong authentication and require authorization for all API requests [Added]
- P2269: Weak authentication of API requests [Added]
- T4266: Require TLS encryption for API gateway connections [Added]
- P2270: Unencrypted communication with an API server [Added]
- T4267: Log API activity and monitor for security events [Added]
- P2271: Insufficient logging of API activity [Added]
- T4268: Store pipeline secrets in AWS Secrets Manager (AWS CodePipeline) [Added]
- P2272: Hard-coded secrets in CodePipeline configuration (AWS CodePipeline) [Added]
- T4269: Use a CMK for encryption when required (AWS CodePipeline) [Added]
- P2273: Using the default encryption configuration for AWS CodePipeline artifacts (AWS CodePipeline) [Added]
- T4270: Run the automation server on a dedicated EC2 instance (AWS CodePipeline) [Added]
- P2274: Insecure hosting for automation servers like Jenkins (AWS CodePipeline) [Added]
- T4271: Use the correct type of endpoint for your use case (Azure SQL MI) [Added]
- P2275: Insufficient network protection (Azure SQL MI) [Added]
- T4272: Use Microsoft Entra ID for database authentication (Azure SQL MI) [Added]
- P2276: Weak authentication for database users (Azure SQL MI) [Added]
- T4273: Enable Transparent Data Encryption (Azure SQL MI) [Added]
- P2277: Unencrypted data at rest (Azure SQL MI) [Added]
- T4274: Consider using SQL Server's granular access control features (Azure SQL MI) [Added]
- P2278: Overly permissive access to sensitive data (Azure SQL MI) [Added]
- T4275: Enable Advanced Threat Detection in Microsoft Defender for SQL (Azure SQL MI) [Added]
- P2279: Failure to monitor for database attacks (Azure SQL MI) [Added]
- T4276: Use routing rules to require authentication (Azure Static Web Apps) [Added]
- P2280: Anonymous access to Azure Static Web Apps (Azure Static Web Apps) [Added]
- T4277: Implement role-based authorization (Azure Static Web Apps) [Added]
- P2281: Insufficient authorization controls for signed-in users (Azure Static Web Apps) [Added]
- T4278: Do not use a visitor password to protect sensitive data or features (Azure Static Web Apps) [Added]
- P2282: Improper use of the password protection feature (Azure Static Web Apps) [Added]
- T4279: Include Azure data removal links in your privacy policy (Azure Static Web Apps) [Added]
- P2283: Failure to inform the user how to remove consent (Azure Static Web Apps) [Added]
- T4280: Enable Application Insights for API monitoring (Azure Static Web Apps) [Added]
- P2284: Insufficient monitoring of API activity (Azure Static Web Apps) [Added]
- T4281: Run Podman containers as a non-root user (Podman) [Added]
- P2285: Containers with root privileges on the host system (Podman) [Added]
- T4282: Configure Podman to require signed images from a trusted registry (Podman) [Added]
- P2286: Supply chain attacks against container images (Podman) [Added]
- T4283: Use minimal images that have been hardened for security (Podman) [Added]
- P2287: Expanded attack surface from large and full-featured images (Podman) [Added]
- T4284: Enable Podman log auditing (Podman) [Added]
- P2288: Lack of visibility for container actions (Podman) [Added]
- T4285: Customize the Podman seccomp profile as needed (Podman) [Added]
- P2289: Running Podman with an overly permissive seccomp profile (Podman) [Added]
- T4286: Limit automatic restarts and resource usage (Podman) [Added]
- P2290: Denial of service events from container failures (Podman) [Added]
- T4287: Make container file systems read-only (Podman) [Added]
- P2291: Containers with writeable file systems (Podman) [Added]
- T4288: Limit container access to networking (Podman) [Added]
- P2292: Containers with insufficient network protections (Podman) [Added]
- T4289: Use MFA and set strict password policies (Salesforce) [Added]
- P2293: Weak authentication practices (Salesforce) [Added]
- T4290: Configure trusted and restricted IP ranges (Salesforce) [Added]
- P2294: Access from untrusted locations (Salesforce) [Added]
- T4291: Harden session configuration settings (Salesforce) [Added]
- P2295: Insufficient protection against session hijacking (Salesforce) [Added]
- T4292: Grant least privilege access to Salesforce users (Salesforce) [Added]
- P2296: Excessive permissions for Salesforce users (Salesforce) [Added]
- T4293: Monitor Salesforce system activity and configure alerts (Salesforce) [Added]
- P2297: Failure to monitor Salesforce activity (Salesforce) [Added]
- T4294: Configure a Field Audit Trail policy for sensitive and critical data (Salesforce) [Added]
- P2298: Lack of change history for data fields (Salesforce) [Added]
- T4295: Protect sensitive fields with Platform Encryption (Salesforce) [Added]
- P2299: Unencrypted data at rest (Salesforce) [Added]
- T4296: Schedule regular backups to protect availability (Salesforce) [Added]
- P2300: Failure to safeguard against data loss (Salesforce) [Added]
- T4297: Sanitize untrusted content (Salesforce) [Added]
- P2301: Malicious content injection (Salesforce) [Added]
- T4298: Use the latest versions of Vertex AI containers and VM images (Vertex AI) [Added]
- P2302: Out of date software for Vertex AI containers (Vertex AI) [Added]
- T4299: Schedule regular monitoring jobs with Vertex AI Model Monitoring (Vertex AI) [Added]
- P2303: Failure to monitor a deployed model (Vertex AI) [Added]
- T4300: Conside using customer-managed encryption keys (CMEKs) (Vertex AI) [Added]
- P2304: Lack of control with service-managed encryption keys (Vertex AI) [Added]
- T4301: Anonymize sensitive data so it is not visible in the analytics environment (Azure) [Added]
- P2305: Insufficient privacy of data in analytics workloads (Azure) [Added]
- T4302: Enable data exfiltration protection for Azure Synapse Analytics workspaces with sensitive data (Azure) [Added]
- P2306: Data exfiltration from analytics workloads (Azure) [Added]
- T4303: Ensure all types of data are reviewed and classified (Azure) [Added]
- P2307: Insufficient data classification and data controls (Azure) [Added]
- T4304: Isolate application workloads according to security requirements (Azure) [Added]
- P2308: Insufficient isolation of application workloads (Azure) [Added]
- T4305: Ensure compute services have sufficient resources (Azure) [Added]
- P2309: Denial of service attacks against application workloads (Azure) [Added]
- T4306: Monitor application workloads and patch vulnerabilities (Azure) [Added]
- P2310: Undetected vulnerabilities in application workloads (Azure) [Added]
- T4307: Deploy application environments through automation (Azure) [Added]
- P2311: Manual application management processes (Azure) [Added]
- T4308: Use trusted container images (Azure) [Added]
- P2312: Vulnerable container images (Azure) [Added]
- T4309: Protect images against supply chain attacks (Azure) [Added]
- P2313: Supply chain attacks that target container images (Azure) [Added]
- T4310: Run containers with a least privilege identity (Azure) [Added]
- P2314: Containers with excessive privileges (Azure) [Added]
- T4311: Periodically rescan container images (Azure) [Added]
- P2315: Undetected vulnerabilities in deployed container images (Azure) [Added]
- T4312: Monitor container workloads (Azure) [Added]
- P2316: Insufficient monitoring of container workloads (Azure) [Added]
- T4313: Use Entra ID authentication for databases if supported (Azure) [Added]
- P2317: Weaknesses in credential management (Azure) [Added]
- T4314: Create dedicated database user accounts with minimum privileges (Azure) [Added]
- P2318: Excessive permissions for database user accounts (Azure) [Added]
- T4315: Use at-rest encryption and consider using a CMK (Azure) [Added]
- P2319: Unencrypted data at rest (Azure) [Added]
- T4316: Schedule regular database backups to protect availability (Azure) [Added]
- P2320: Failure to safeguard against data loss in databases (Azure) [Added]
- T4317: Monitor security events and consider audit logging (Azure) [Added]
- P2321: Failure to monitor database activity (Azure) [Added]
- T4318: Protect secrets in the development environment (Azure) [Added]
- P2322: Insufficient protection of development secrets (Azure) [Added]
- T4319: Give developers least privilege access to the development environment (Azure) [Added]
- P2323: Excessive permissions in the development environment (Azure) [Added]
- T4320: Log activity in the development environment (Azure) [Added]
- P2324: Insufficient monitoring of development activity and CI/CD processes (Azure) [Added]
- T4321: Use a centralized artifact store to manage dependencies (Azure) [Added]
- P2325: Vulnerable or malicious application dependencies (Azure) [Added]
- T4322: Deploy software using automated processes (Azure) [Added]
- P2326: Poor dependency management with manual deployment (Azure) [Added]
- T4323: Sign custom code and verify signatures (Azure) [Added]
- P2327: Failure to guarantee code integrity (Azure) [Added]
- T4324: Integrate application security testing into the CI/CD pipeline (Azure) [Added]
- P2328: Failure to detect vulnerable code (Azure) [Added]
- T4325: Implement best practices for hybrid networks (Azure) [Added]
- P2329: Weak security controls for hybrid networks (Azure) [Added]
- T4326: Use automated processes to keep people away from data (Azure) [Added]
- P2330: Manual management processes with insufficient security controls (Azure) [Added]
- T4327: Use Azure Policy to enforce a consistent security baseline (Azure) [Added]
- P2331: Lack of controls to enforce security policy in complex environments (Azure) [Added]
- T4328: Follow best practices for logging and monitoring (Azure) [Added]
- P2332: Insecure or insufficient monitoring (Azure) [Added]
- T4329: Vet data and monitor models according to best practices (Azure) [Added]
- P2333: Data poisoning attacks (Azure) [Added]
- T4330: Vet training data sets for sensitive data and sanitize them (Azure) [Added]
- P2334: Exposure of sensitive or confidential data (Azure) [Added]
- T4331: Use Azure AI Content Safety (Azure) [Added]
- P2335: Offensive content or prompt injection attacks (Azure) [Added]
- T4332: Isolate ML workloads (Azure) [Added]
- P2336: Unecessary exposure of ML environments (Azure) [Added]
- T4333: Review the Azure Responsible AI Standard and ensure your application is in compliance (Azure) [Added]
- P2337: Failure to meet the Azure Responsible AI Standard (Azure) [Added]
- T4334: Segment your network and implement security controls between zones (Azure) [Added]
- P2338: Insufficient network isolation in an Azure environment (Azure) [Added]
- T4335: Deploy Azure Firewall at the network perimeter (Azure) [Added]
- P2339: Failure to secure the network perimeter (Azure) [Added]
- T4336: Put public endpoints behind a load balancer (Azure) [Added]
- P2340: Failure to protect public endpoints (Azure) [Added]
- T4337: Harden VNets against denial of service attacks (Azure) [Added]
- P2341: Denial of service attacks against networks and public endpoints (Azure) [Added]
- T4338: Follow best practices for key management and monitoring (Azure) [Added]
- P2342: Insecure key management (Azure) [Added]
- T4339: Ensure security events trigger notifications and responses (Azure) [Added]
- P2343: Insufficient monitoring of security events (Azure) [Added]
- T4340: Conduct regular security audits (Azure) [Added]
- P2344: Failing to follow business security policy (Azure) [Added]
- T4341: Use role assignment conditions for fine-grained security in complex environments (Azure) [Added]
- P2345: Inflexible IAM policies for large and dynamic systems (Azure) [Added]
- T4342: Implement access controls based on the sensitivity and criticality of data (Azure) [Added]
- P2346: Insufficient data access controls (Azure) [Added]
- T4343: Enable Microsoft Defender for Storage to detect anomalous activity (Azure) [Added]
- P2347: Failure to monitor storage access and exfiltration (Azure) [Added]
- T4344: Schedule regular backups (Azure) [Added]
- P2348: Failure to safeguard against data loss in storage (Azure) [Added]
- T4345: Implement a centralized artifact store in AWS CodePipeline [Added]
- P2350: Inconsistent and unsecured management of software dependencies [Added]
- T4346: Integrate SAST and SCA Tools into AWS CodePipeline [Added]
- P2351: Undetected security vulnerabilities in source code and third-party dependencies [Added]
- T4347: Implement fine-grained IAM policies for AWS CodePipeline [Added]
- P2352: Over-Permissioning in AWS CodePipeline [Added]
- T4348: Enable and configure AWS CloudTrail for CodePipeline [Added]
- P2353: Lack of Visibility and Auditing in AWS CodePipeline [Added]
- T4349: Enable IAM Authentication for AWS ElastiCache for Redis (AWS ElastiCache) [Added]
- P2354: Credential Exposure and Management Risks (AWS ElastiCache) [Added]
- T4350: Implement Dedicated IAM Roles for ElastiCache Access (AWS ElastiCache) [Added]
- P2355: Over-privileged Access (AWS ElastiCache) [Added]
- T4351: Enable At-Rest Encryption for AWS ElastiCache (AWS ElastiCache) [Added]
- P2356: Unauthorized Data Access (AWS ElastiCache) [Added]
- T4352: Enable and Configure Scheduled Backups for AWS ElastiCache for Redis (AWS ElastiCache) [Added]
- P2357: Data Loss Due to Failures or Disasters (AWS ElastiCache) [Added]
- T4353: Enhance Monitoring and Logging for AWS ElastiCache (AWS ElastiCache) [Added]
- P2358: Lack of database monitoring and logging (AWS ElastiCache) [Added]
- T4354: Securely Manage Secrets in CI/CD Pipelines (CircleCI) [Added]
- P2359: Insecure Secrets Management in CI/CD Pipelines [Added]
- T4355: Isolate and Encrypt Sensitive Files (CircleCI) [Added]
- P2360: Insecure Storage of Sensitive Files [Added]
- T4356: Secure Handling of Secrets in CI/CD Pipelines for Forked Pull Requests (CircleCI) [Added]
- P2361: Insecure Handling of Secrets in CI/CD Pipelines for Forked Pull Requests (CircleCI) [Added]
- T4357: Use Trufflehog and GitLeaks to Scan for Exposed Secrets in Git History (CircleCI) [Added]
- P2362: Lack of Automated Detection of Exposed Secrets [Added]
- T4358: Implement Static and Dynamic Application Security Testing (CircleCI) [Added]
- P2363: Lack of Static and Dynamic Application Security Testing [Added]
- T4359: Automate Compliance Checks in CI Pipelines (CircleCI) [Added]
- P2364: Lack of Regulatory Compliance in Software Development [Added]
- T4360: Conduct reviews and improvement of the SDL process [Added]
- P2349: Lack of periodic analysis of security processes [Added]
- T4361: Periodically review security requirements [Added]
- T4362: Document and apply secure design best practices [Added]
- T4363: Review user manuals for errors and omissions [Added]
- T4364: Validate that review and improvement of the SDL process is conducted [Added]
- P2349: Lack of periodic analysis of security processes [Added]
- T4365: Verify that security requirements are periodically reviewed [Added]
- T4366: Verify that secure design best practices are documented and applied [Added]
- T4367: Verify that user manuals are reviewed for errors and omissions [Added]
- T4368: Implement Rigorous Package Vetting Before Addition (AWS CodeArtifact) [Added]
- P2365: Dependency Substitution (AWS CodeArtifact) [Added]
- T4369: Implement Automated Deployment Processes (AWS CodeArtifact) [Added]
- P2366: Human Error in Deployment (AWS CodeArtifact) [Added]
- T4370: Integrate Security Testing Tools (AWS CodeArtifact) [Added]
- P2367: Vulnerabilities in Software Artifacts (AWS CodeArtifact) [Added]
- T4371: Implement Least Privilege Access (AWS CodeArtifact) [Added]
- P2368: Excessive Developer Permissions (AWS CodeArtifact) [Added]
- T4372: Enable and Configure AWS CloudTrail (AWS CodeArtifact) [Added]
- P2369: Unauthorized Access and Modification Risks (AWS CodeArtifact) [Added]
- T4373: Ensure compliance before marketing digital products (EU CRA) [Added]
- P2370: Non-compliance with regulatory standards (EU CRA) [Added]
- T4374: Determine if your product is subject to conformity assessment procedures (EU CRA) [Added]
- P2371: Lack of clear product categorization (EU CRA) [Added]
- T4375: Enhance skills for a cyber resilient digital environment (EU CRA) [Added]
- P2372: Skill gaps and knowledge deficiencies (EU CRA) [Added]
- T4376: Implement cybersecurity measures for digital product (EU CRA) [Added]
- P2373: Lack of implementing cybersecurity measures for digital products (EU CRA) [Added]
- T4377: Delivery with secure by default configuration with ability to reset to original state (EU CRA) [Added]
- P2374: Insecure default configurations (EU CRA) [Added]
- T4378: Implement network connection limits and exception handling (EU CRA) [Added]
- P2375: Network saturation and overload (EU CRA) [Added]
- T4379: Implement Defense in Depth Principles (EU CRA) [Added]
- P2376: Lack of implementing Defense-in-Depth principles (EU CRA) [Added]
- T4380: Implement automatic security updates and notifications in your product (EU CRA) [Added]
- P2377: Lack of automatic security updates and notifications (EU CRA) [Added]
- TA6894: Ensure long-term security updates availability [Added]
- T4381: Provide proper identification and information for your product (EU CRA) [Added]
- P2378: Untraceable products (EU CRA) [Added]
- T4382: Coordinate with authorities (EU CRA) [Added]
- P2379: Lack of accountability and traceability in cybersecurity compliance (EU CRA) [Added]
- T4383: Ensure timely reporting of cyber vulnerabilities and incidents (EU CRA) [Added]
- P2380: Delayed or insufficient communication regarding cybersecurity threats (EU CRA) [Added]
- T4384: Implement and maintain cybersecurity measures for open-source software development (EU CRA) [Added]
- P2381: Insufficient cybersecurity governance and coordination in open-source projects (EU CRA) [Added]
- T4385: Craft and maintain the EU Declaration of Conformity (EU CRA) [Added]
- P2382: Inadequate documentation and formal assurance of compliance with EU cybersecurity standards (EU CRA) [Added]
- T4386: Ensure proper CE marking (EU CRA) [Added]
- P2383: Lack of CE marking (EU CRA) [Added]
- T4387: Prepare and update technical documentation for your product (EU CRA) [Added]
- P2384: Lack of proper technical documentation (EU CRA) [Added]
- T4388: Implement conformity assessments for digital products based on risk classification (EU CRA) [Added]
- P2385: Lack of conformity assessments for digital products (EU CRA) [Added]
- T4433: Prevent path environment attacks (Bash/Shell) [Added]
- P2404: Lack of inputs and environment verification (Bash/Shell) [Added]
- T4434: Prevent injection attacks (Bash/Shell) [Added]
- P2404: Lack of inputs and environment verification (Bash/Shell) [Added]
- T4435: Prevent path traversal and file path manipulation (Bash/Shell) [Added]
- P2404: Lack of inputs and environment verification (Bash/Shell) [Added]
- I1896: Restrict Directories [Added]
- T4436: Protect directory writing and reading (Bash/Shell) [Added]
- P2405: Lack of directory writing and reading protection (Bash/Shell) [Added]
- T4437: Prevent input file attacks (Bash/Shell) [Added]
- P2406: Lack of input file protection (Bash/Shell) [Added]
- T4438: Prevent file upload vulnerabilities (Bash/Shell) [Added]
- P2407: Lack of file upload protection (Bash/Shell) [Added]
- I1897: Restrict File Types [Added]
- I1898: Validate File Content [Added]
- T4439: Prevent authentication attacks (Bash/Shell) [Added]
- P2408: Lack of protection against authentication attacks (Bash/Shell) [Added]
- I1899: Use Secure Password Storage [Added]
- I1900: Implement Password Hashing and Salting [Added]
- I1901: Enforce Strong Password Policies [Added]
- I1902: Implement Rate Limiting [Added]
- T4440: Enforce access controls (Bash/Shell) [Added]
- P2409: Lack of permissions and access controls (Bash/Shell) [Added]
- I1903: Use Access Control Lists (ACLs) [Added]
- T4441: Prevent attacks related to environmental vulnerabilities (Bash/Shell) [Added]
- P2410: Lack of protection against environmental vulnerabilities (Bash/Shell) [Added]
- T4442: Manage and protect script processes (Bash/Shell) [Added]
- P2411: Lack of protection against script process vulnerabilities (Bash/Shell) [Added]
- T4443: Prevent cryptographic failures (Bash/Shell) [Added]
- P2412: Cryptography failures (Bash/Shell) [Added]
- T4444: Test prevention of path environment attacks (Bash/Shell) [Added]
- P2404: Lack of inputs and environment verification (Bash/Shell) [Added]
- T4445: Test prevention of injection attacks (Bash/Shell) [Added]
- P2404: Lack of inputs and environment verification (Bash/Shell) [Added]
- T4446: Test prevention of path traversal and file path manipulation (Bash/Shell) [Added]
- P2404: Lack of inputs and environment verification (Bash/Shell) [Added]
- T4447: Test directory writing and reading (Bash/Shell) [Added]
- P2405: Lack of directory writing and reading protection (Bash/Shell) [Added]
- T4448: Test prevention against input file attacks (Bash/Shell) [Added]
- P2406: Lack of input file protection (Bash/Shell) [Added]
- T4449: Test prevention of file upload vulnerabilities (Bash/Shell) [Added]
- P2407: Lack of file upload protection (Bash/Shell) [Added]
- T4450: Test authentication (Bash/Shell) [Added]
- P2408: Lack of protection against authentication attacks (Bash/Shell) [Added]
- T4451: Test access controls (Bash/Shell) [Added]
- P2409: Lack of permissions and access controls (Bash/Shell) [Added]
- T4452: Test environmental vulnerabilities (Bash/Shell) [Added]
- P2410: Lack of protection against environmental vulnerabilities (Bash/Shell) [Added]
- T4453: Test protection of script processes (Bash/Shell) [Added]
- P2411: Lack of protection against script process vulnerabilities (Bash/Shell) [Added]
- T4454: Test cryptographic functions (Bash/Shell) [Added]
- P2412: Cryptography failures (Bash/Shell) [Added]
- T4455: Prevent prompt injection in Large Language Models (Project Manager) [Added]
- TA6944: Conduct scenario-based prompt injection simulations [Added]
- T4456: Prevent prompt injection in Large Language Models (MLOps Engineer) [Added]
- TA6945: Implement continuous monitoring and alerting systems [Added]
- T4457: Prevent prompt injection in Large Language Models (AI/ML Developer) [Added]
- TA6946: Develop input sanitization and verification modules [Added]
- T4458: Prevent prompt injection in Large Language Models (Data Scientist) [Added]
- TA6947: Develop and validate secure function libraries [Added]
- T4459: Prevent prompt injection in Large Language Models (QA Analyst) [Added]
- TA6948: Design and execute prompt injection attack test cases [Added]
- T4460: Handle insecure output in Large Language Models (AI/ML Developer) [Added]
- TA6949: Develop output sanitization and validation pipelines [Added]
- T4461: Handle insecure output in Large Language Models (MLOps Engineer) [Added]
- TA6950: Implement secure output handling frameworks [Added]
- T4462: Prevent training data poisoning in Large Language Models (Project Manager) [Added]
- TA6910: Implement continuous monitoring and anomaly detection [Added]
- T4463: Prevent training data poisoning in Large Language Models (MLOps Engineer) [Added]
- TA6911: Develop data auditing and validation pipelines [Added]
- T4464: Prevent training data poisoning in Large Language Models (Data Scientist) [Added]
- TA6912: Design data preprocessing and cleaning framework [Added]
- T4465: Prevent training data poisoning in Large Language Models (AI/ML Developer) [Added]
- TA6913: Implement multi-stage model validation and evaluation [Added]
- T4466: Prevent Large Language Model denial of service (Project Manager) [Added]
- TA6914: Establish incident response and mitigation protocols [Added]
- TA6951: Establish incident response and mitigation protocols [Added]
- T4467: Prevent Large Language Model denial of service (MLOps Engineer) [Added]
- TA6915: Implement resource allocation monitoring and throttling mechanisms [Added]
- TA6952: Implement adaptive resource management and rate limiting [Added]
- T4468: Prevent Large Language Models denial of service (AI/ML Developer) [Added]
- TA6916: Develop scalable input handling and load management strategies [Added]
- TA6953: Design context-aware input filtering and constraints [Added]
- T4469: Prevent Large Language Model denial of service (QA Analyst) [Added]
- TA6917: Develop comprehensive test scenarios for stress testing [Added]
- TA6954: Develop comprehensive resource utilization test scenarios [Added]
- T4470: Protect Large Language Models against supply chain vulnerabilities (Project Manager) [Added]
- TA6896: Implement real-time activity monitoring [Added]
- T4471: Protect Large Language Models against supply chain vulnerabilities (MLOps Engineer) [Added]
- TA6897: Implement automated integrity checks and provenance tracking [Added]
- T4472: Protect Large Language Models against supply chain vulnerabilities (AI/ML Developer) [Added]
- TA6898: Implement dependency and provenance tracking [Added]
- T4473: Protect Large Language Models against supply chain vulnerabilities (Data Scientist) [Added]
- TA6899: Implement data validation and monitoring mechanisms [Added]
- T4474: Prevent sensitive information disclosure in Large Language Models (Project Manager) [Added]
- TA6900: Implement continuous data sanitization and monitoring protocols [Added]
- TA6931: Enforce data handling policies for vector databases [Added]
- T4475: Prevent sensitive information disclosure in Large Language Models (MLOps Engineer) [Added]
- TA6901: Implement secure data ingestion and access controls [Added]
- TA6932: Implement strict access controls for vector databases [Added]
- T4476: Prevent sensitive information disclosure in Large Language Models (AI/ML Developer) [Added]
- TA6902: Develop data sanitization algorithms [Added]
- TA6933: Sanitize data ingestion for vector databases [Added]
- T4477: Prevent sensitive information disclosure in Large Language Models (Data Scientist) [Added]
- TA6903: Develop techniques for differential privacy and anonymization [Added]
- TA6934: Design data scrubbing protocols for vector databases [Added]
- T4478: Design secure plugins for Large Language Models (Project Manager) [Added]
- TA6955: Establish secure plugin integration protocols [Added]
- T4479: Design secure plugins for Large Language Models (AI/ML Developer) [Added]
- TA6956: Implement parameterized input and safeguards [Added]
- T4480: Design secure plugins for Large Language Models (MLOps Engineer) [Added]
- TA6957: Implement secure authorization and tracing protocols [Added]
- T4481: Design secure plugins for Large Language Models (QA Analyst) [Added]
- TA6958: Develop test scenarios for manual authorization workflow [Added]
- T4482: Mitigate excessive agency in Large Language Models (Project Manager) [Added]
- TA6959: Implement human-in-the-loop review protocols [Added]
- T4483: Mitigate excessive agency in Large Language Models (MLOps Engineer) [Added]
- TA6960: Implement permission management and activity monitoring systems [Added]
- T4484: Mitigate excessive agency in Large Language Models (AI/ML Developer) [Added]
- TA6961: Develop plugins with granular and restricted functionality [Added]
- T4485: Mitigate excessive agency in Large Language Models (QA Analyst) [Added]
- TA6962: Validate user authorization and security scope compliance [Added]
- T4486: Mitigate overreliance in Large Language Models (Project Manager) [Added]
- T4487: Mitigate overreliance in Large Language Models (MLOps Engineer) [Added]
- TA6918: Implement multi-factor model verification and cross-validation procedures [Added]
- T4488: Mitigate overreliance in Large Language Models (AI/ML Developer) [Added]
- TA6919: Develop response validation and consistency filtering systems [Added]
- T4489: Mitigate overreliance in Large Language Models (Data Scientist) [Added]
- TA6920: Design and implement cross-verification frameworks and task modularization [Added]
- T4490: Mitigate overreliance in Large Language Models (QA Analyst) [Added]
- TA6921: Develop comprehensive testing protocols for user interfaces and API [Added]
- T4491: Prevent model theft in Large Language Models (Project Manager) [Added]
- TA6926: Implement vector database access protocols [Added]
- T4492: Prevent model theft in Large Language Models (MLOps Engineer) [Added]
- TA6927: Implement vector database security measures [Added]
- T4493: Prevent model theft in Large Language Models (AI/ML Developer) [Added]
- TA6928: Develop anomaly detection for vector database queries [Added]
- T4494: Prevent model theft in Large Language Models (Data Scientist) [Added]
- TA6929: Strengthen physical security for vector database infrastructure [Added]
- T4495: Prevent model theft in Large Language Models (QA Analyst) [Added]
- TA6930: Audit vector database access logs and activities [Added]
- T4496: Protect ML models against input manipulation attacks (MLOps Engineer) [Added]
- TA6904: Integrate real-time threat detection and response systems [Added]
- T4497: Protect ML models against input manipulation attacks (AI/ML Developer) [Added]
- TA6905: Develop defense mechanisms for adversarial robustness [Added]
- T4498: Protect ML models against input manipulation attacks (QA Analyst) [Added]
- TA6906: Design comprehensive adversarial testing protocols [Added]
- T4499: Protect ML models against data poisoning and skewing attacks (Project Manager) [Added]
- TA6922: Establish proactive data integrity and security protocols [Added]
- T4500: Protect ML models against data poisoning and skewing attacks (MLOps Engineer) [Added]
- TA6923: Integrate advanced security measures and access management systems [Added]
- T4501: Protect ML models against data poisoning and skewing attacks (AI/ML Developer) [Added]
- TA6924: Develop multi-model ensemble and performance monitoring frameworks [Added]
- T4502: Protect ML models against data poisoning and skewing attacks (Data Scientist) [Added]
- TA6925: Develop data validation and resilient training techniques [Added]
- T4503: Protect ML models against inversion attacks (Project Manager) [Added]
- TA6940: Enhance model transparency and monitoring for vector database queries [Added]
- T4504: Protect ML models against inversion attacks (MLOps Engineer) [Added]
- TA6941: Secure access and regularly update vector databases [Added]
- T4505: Protect ML models against inversion attacks (AI/ML Developer) [Added]
- TA6942: Validate input data and apply secure feature extraction for vector databases [Added]
- T4506: Protect ML models against inversion attacks (QA Analyst) [Added]
- TA6943: Monitor anomalies and validate distributions for vector database queries [Added]
- T4507: Prevent sensitive data exposure in ML models (Project Manager) [Added]
- TA6935: Implement regular audits for vector database compliance [Added]
- T4508: Prevent sensitive data exposure in ML models (MLOps Engineer) [Added]
- TA6936: Enhance data encryption and access control for vector databases [Added]
- T4509: Prevent sensitive data exposure in ML models (AI/ML Developer) [Added]
- TA6937: Implement privacy-preserving techniques for vector databases [Added]
- T4510: Prevent sensitive data exposure in ML models (Data Scientist) [Added]
- TA6938: Anonymize data and implement advanced privacy techniques for vector databases [Added]
- T4511: Prevent sensitive data exposure in ML models (QA Analyst) [Added]
- TA6939: Perform output monitoring and anomaly detection for vector database queries [Added]
- T4512: Protect ML models against theft (Project Manager) [Added]
- T4513: Protect ML models against theft (MLOps Engineer) [Added]
- T4514: Protect ML models against theft (AI/ML Developer) [Added]
- T4515: Protect ML models against theft (QA Analyst) [Added]
- T4516: Protect ML models against supply chain attacks (Project Manager) [Added]
- T4517: Protect ML models against supply chain attacks (MLOps Engineer) [Added]
- T4518: Protect ML models against supply chain attacks (QA Analyst) [Added]
- T4519: Protect ML models against poisoning attacks (Project Manager) [Added]
- TA6907: Establish comprehensive data verification and source management [Added]
- T4520: Protect ML models against poisoning attacks (MLOps Engineer) [Added]
- TA6908: Enforce environment segmentation and secure deployment [Added]
T4521: Protect ML models against poisoning attacks (AI/ML Developer) [Added]
- TA6909: Implement regularization and encryption techniques [Added]
Changes to Project Properties and Profiles
- Q195: Language and Framework
- Q109: Programming Language
- A1621: Bash/Shell [Added]
- Q109: Programming Language
- Q237: Compliance Scope: Other
- Q374: In scope for UK PSTI [Added]
- A1595: Yes [Added]
- Q378: In-Scope for EU Cyber Resilience Act [Added]
- A1609: Yes [Added]
- A1610: Open-source software steward [Added]
- Q374: In scope for UK PSTI [Added]
- Q243: Internal Hidden Properties
- Q189: Internal Properties (Use this, for all hidden answers)
- A1586: GCP Blockchain (hidden) [Added]
- A1587: GCP Business Applications (hidden) [Added]
- Q189: Internal Properties (Use this, for all hidden answers)
- Q249: Industrial Control Systems
- Q250: In-Scope for ANSI/ISA 62443 or CSA/SSA-311
- A1374: ANSI/ISA 62443-4-1 or SDLA 312 [Updated]
- INFO: Updated the children.
- A1374: ANSI/ISA 62443-4-1 or SDLA 312 [Updated]
- Q250: In-Scope for ANSI/ISA 62443 or CSA/SSA-311
- Q262: External Dependencies
- Q263: Software Updates
- Q373: Customer relationship management (CRM) [Added]
- A1594: Uses Salesforce CRM [Added]
- Q373: Customer relationship management (CRM) [Added]
- Q263: Software Updates
- Q271: Interfaces and APIs
- Q270: Interfaces and APIs Provided
- A1593: Uses API gateway for providing web APIs [Added]
- Q270: Interfaces and APIs Provided
- Q284: Context and Characteristics
- Q252: Application's Context and Characteristics
- Q376: AI/ML Usecases [Added]
- A1622: Fine-tuning [Added]
- A1623: Prompt engineering [Added]
- A1624: Retrieval augmented generation [Added]
- A1625: Vector databases [Added]
- Q376: AI/ML Usecases [Added]
- Q124: Payment Service Provider [Updated]
- INFO: Updated the parent.
- Q165: Health Care Systems [Updated]
- INFO: Updated the parent.
- Q285: ICS [Updated]
- INFO: Updated the parent.
- Q295: Game Applications [Updated]
- INFO: Updated the parent.
- Q252: Application's Context and Characteristics
- Q299: General
- Q375: CI/CD Tools [Added]
- A1596: CircleCI [Added]
- Q375: CI/CD Tools [Added]
- Q307: Containerization
- Q308: Containerization Technologies
- A1591: Podman [Added]
- Q308: Containerization Technologies
- Q361: Amazon Web Services (AWS)
- Q298: AWS Services
- Q379: More AWS Services [Added]
- A1165: AWS RDS [Updated]
- INFO: Updated the text, question, and, children.
- A1169: AWS S3 [Updated]
- INFO: Updated the text, question, and, children.
- A1170: AWS IAM [Updated]
- INFO: Updated the text, question, and, children.
- A1173: AWS SNS [Updated]
- INFO: Updated the text, question, and, children.
- A1177: AWS VPC [Updated]
- INFO: Updated the text, question, and, children.
- A1178: AWS KMS [Updated]
- INFO: Updated the text, question, and, children.
- A1179: AWS Route53 [Updated]
- INFO: Updated the text, question, and, children.
- A1226: AWS Lambda [Updated]
- INFO: Updated the text, question, and, children.
- A1227: AWS SQS [Updated]
- INFO: Updated the text, question, and, children.
- A1347: AWS Kinesis Data Streams [Updated]
- INFO: Updated the text, question, and, children.
- A1348: AWS Kinesis Data Firehose [Updated]
- INFO: Updated the text, question, and, children.
- A1349: AWS WAF [Updated]
- INFO: Updated the text, question, and, children.
- A1366: AWS SageMaker [Updated]
- INFO: Updated the text, question, and, children.
- A1380: AWS MSK [Updated]
- INFO: Updated the text, question, and, children.
- A1381: AWS MQ [Updated]
- INFO: Updated the text, question, and, children.
- A1382: AWS OpenSearch [Updated]
- INFO: Updated the text, question, and, children.
- A1383: AWS RedShift [Updated]
- INFO: Updated the text, question, and, children.
- A1384: AWS Secrets Manager [Updated]
- INFO: Updated the text, question, and, children.
- A1385: AWS SES [Updated]
- INFO: Updated the text, question, and, children.
- A1386: AWS Step Functions [Updated]
- INFO: Updated the text, question, and, children.
- A1387: AWS Systems Manager [Updated]
- INFO: Updated the text, question, and, children.
- A1388: AWS Transfer Family [Updated]
- INFO: Updated the text, question, and, children.
- A1512: AWS S3 Glacier [Updated]
- INFO: Updated the question and children.
- A1514: AWS Lake Formation [Updated]
- INFO: Updated the question and children.
- A1597: AWS X-Ray [Added]
- A1604: AWS GuardDuty [Added]
- A1605: AWS Inspector [Added]
- A1606: AWS Neptune [Added]
- A1607: AWS Rekognition [Added]
- A1165: AWS RDS [Updated]
- A1166: AWS EBS [Updated]
- INFO: Updated the text and children.
- A1167: AWS AMI [Updated]
- INFO: Updated the text and children.
- A1168: AWS ELB [Updated]
- INFO: Updated the text and children.
- A1171: AWS EC2 [Updated]
- INFO: Updated the text and children.
- A1172: AWS Auto Scaling [Updated]
- INFO: Updated the text and children.
- A1174: AWS CloudWatch [Updated]
- INFO: Updated the text and children.
- A1175: AWS CloudFront [Updated]
- INFO: Updated the text and children.
- A1176: AWS Config [Updated]
- INFO: Updated the text and children.
- A1251: AWS Aurora [Updated]
- INFO: Updated the text and children.
- A1270: AWS ECS [Updated]
- INFO: Updated the text and children.
- A1271: AWS DynamoDB [Updated]
- INFO: Updated the text and children.
- A1331: AWS EKS [Updated]
- INFO: Updated the text and children.
- A1345: AWS API Gateway [Updated]
- INFO: Updated the text and children.
- A1346: AWS Cognito [Updated]
- INFO: Updated the text and children.
- A1375: AWS Certificate Manager [Updated]
- INFO: Updated the text and children.
- A1376: AWS CloudFormation [Updated]
- INFO: Updated the text and children.
- A1377: AWS ECR [Updated]
- INFO: Updated the text and children.
- A1378: AWS EFS [Updated]
- INFO: Updated the text and children.
- A1379: AWS ElastiCache [Updated]
- INFO: Updated the text and children.
- A1510: AWS App Mesh [Updated]
- INFO: Updated the children.
- A1511: AWS Bedrock [Updated]
- INFO: Updated the children.
- A1513: AWS Glue [Updated]
- INFO: Updated the children.
- A1588: AWS CodePipeline [Added]
- A1598: AWS Athena [Added]
- A1599: AWS Backup [Added]
- A1600: AWS DataSync [Added]
- A1601: AWS Direct Connect [Added]
- A1602: AWS EventBridge [Added]
- A1603: AWS Fargate [Added]
- A1608: AWS CodeArtifact [Added]
- Q379: More AWS Services [Added]
- Q298: AWS Services
- Q362: Microsoft Azure
- Q306: Azure Services
- Q370: More Azure Services
- A1196: Azure Multi-Factor Authentication [Updated]
- INFO: Updated the text.
- A1198: Azure Virtual Machines [Updated]
- INFO: Updated the text and children.
- A1199: Azure Security Center [Updated]
- INFO: Updated the text and children.
- A1200: Azure Storage [Updated]
- INFO: Updated the text and children.
- A1201: Azure SQL Database [Updated]
- INFO: Updated the text and children.
- A1202: Azure Virtual Network [Updated]
- INFO: Updated the text and children.
- A1203: Azure Monitor [Updated]
- INFO: Updated the text and children.
- A1206: Azure Resource Manager [Updated]
- INFO: Updated the text and children.
- A1396: Azure Machine Learning [Updated]
- INFO: Updated the children.
- A1397: Azure OpenAI Service [Updated]
- INFO: Updated the children.
- A1402: Azure Stream Analytics [Updated]
- INFO: Updated the children.
- A1403: Azure Synapse Analytics [Updated]
- INFO: Updated the children.
- A1406: Azure Linux Virtual Machines [Updated]
- INFO: Updated the children.
- A1407: Azure Spring Apps [Updated]
- INFO: Updated the children.
- A1408: Azure Virtual Desktop [Updated]
- INFO: Updated the children.
- A1409: Azure Virtual Machine Scale Sets [Updated]
- INFO: Updated the children.
- A1410: Azure VMware Solution [Updated]
- INFO: Updated the children.
- A1411: Azure Windows Virtual Machines [Updated]
- INFO: Updated the children.
- A1415: Azure Red Hat OpenShift [Updated]
- INFO: Updated the children.
- A1421: Azure Managed Instance for Apache Cassandra [Updated]
- INFO: Updated the children.
- A1422: Azure SQL [Updated]
- INFO: Updated the children.
- A1426: Azure Stack Edge [Updated]
- INFO: Updated the children.
- A1430: Azure Logic Apps [Updated]
- INFO: Updated the children.
- A1431: Azure Service Bus [Updated]
- INFO: Updated the children.
- A1432: Azure Web PubSub [Updated]
- INFO: Updated the children.
- A1435: Azure Notification Hubs [Updated]
- INFO: Updated the children.
- A1439: Azure Lighthouse [Updated]
- INFO: Updated the children.
- A1440: Azure Managed Applications [Updated]
- INFO: Updated the children.
- A1441: Azure Policy [Updated]
- INFO: Updated the children.
- A1442: Azure Purview [Updated]
- INFO: Updated the children.
- A1443: Azure Resource Manager templates [Updated]
- INFO: Updated the children.
- A1444: Azure Resource Mover [Updated]
- INFO: Updated the children.
- A1445: Azure Media Services [Updated]
- INFO: Updated the children.
- A1447: Azure Migrate [Updated]
- INFO: Updated the children.
- A1448: Azure Site Recovery [Updated]
- INFO: Updated the children.
- A1450: Azure Remote Rendering [Updated]
- INFO: Updated the children.
- A1451: Azure Spatial Anchors [Updated]
- INFO: Updated the children.
- A1461: Azure Load Balancer [Updated]
- INFO: Updated the children.
- A1462: Azure NAT Gateway [Updated]
- INFO: Updated the children.
- A1463: Azure Network Watcher [Updated]
- INFO: Updated the children.
- A1464: Azure Private Link [Updated]
- INFO: Updated the children.
- A1465: Azure Traffic Manager [Updated]
- INFO: Updated the children.
- A1466: Azure Virtual WAN [Updated]
- INFO: Updated the children.
- A1467: Azure VPN Gateway [Updated]
- INFO: Updated the children.
- A1468: Azure Web Application Firewall [Updated]
- INFO: Updated the children.
- A1469: Azure PostgreSQL Database [Updated]
- INFO: Updated the children.
- A1475: Azure Sentinel [Updated]
- INFO: Updated the children.
- A1480: Azure Managed Lustre [Updated]
- INFO: Updated the children.
- A1481: Azure NetApp Files [Updated]
- INFO: Updated the children.
- A1483: Azure SignalR Service [Updated]
- INFO: Updated the children.
- A1589: Azure SQL Managed Instance [Added]
- A1590: Azure Static Web Apps [Added]
- A1196: Azure Multi-Factor Authentication [Updated]
- A1197: Azure Active Directory [Updated]
- INFO: Updated the text and children.
- A1204: Azure Key Vault [Updated]
- INFO: Updated the text, question, and, children.
- A1210: Azure Functions [Updated]
- INFO: Updated the children.
- A1351: Azure AKS [Updated]
- INFO: Updated the text and children.
- A1394: Azure AI Bot Service [Updated]
- INFO: Updated the children.
- A1395: Azure Databricks [Updated]
- INFO: Updated the children.
- A1398: Azure Analysis Services [Updated]
- INFO: Updated the children.
- A1399: Azure Data Explorer [Updated]
- INFO: Updated the children.
- A1400: Azure Data Lake Analytics [Updated]
- INFO: Updated the children.
- A1401: Azure Event Hubs [Updated]
- INFO: Updated the children.
- A1404: Azure App Service [Updated]
- INFO: Updated the children.
- A1405: Azure Batch [Updated]
- INFO: Updated the children.
- A1412: Azure Container Apps [Updated]
- INFO: Updated the children.
- A1413: Azure Container Instances [Updated]
- INFO: Updated the children.
- A1414: Azure Container Registry [Updated]
- INFO: Updated the children.
- A1416: Azure Cache for Redis [Updated]
- INFO: Updated the children.
- A1417: Azure Cosmos DB [Updated]
- INFO: Updated the children.
- A1418: Azure Data Factory [Updated]
- INFO: Updated the children.
- A1419: Azure Database for MariaDB [Updated]
- INFO: Updated the children.
- A1420: Azure Database for MySQL [Updated]
- INFO: Updated the children.
- A1423: Azure App Configuration [Updated]
- INFO: Updated the children.
- A1424: Azure DevTest Labs [Updated]
- INFO: Updated the children.
- A1425: Azure Arc [Updated]
- INFO: Updated the children.
- A1427: Azure Active Directory External Identities [Updated]
- INFO: Updated the children.
- A1428: Azure API Management [Updated]
- INFO: Updated the children.
- A1429: Azure Event Grid [Updated]
- INFO: Updated the children.
- A1433: Azure IoT Central [Updated]
- INFO: Updated the children.
- A1434: Azure IoT Hub [Updated]
- INFO: Updated the children.
- A1436: Azure Automation [Updated]
- INFO: Updated the children.
- A1437: Azure Cloud Shell [Updated]
- INFO: Updated the children.
- A1438: Azure Cost Management [Updated]
- INFO: Updated the children.
- A1446: Azure Database Migration Service [Updated]
- INFO: Updated the children.
- A1449: Azure Digital Twins [Updated]
- INFO: Updated the children.
- A1452: Azure Application Gateway [Updated]
- INFO: Updated the children.
- A1453: Azure Bastion [Updated]
- INFO: Updated the children.
- A1454: Azure Communications Gateway [Updated]
- INFO: Updated the children.
- A1455: Azure Content Delivery Network [Updated]
- INFO: Updated the children.
- A1456: Azure DDoS Protection [Updated]
- INFO: Updated the children.
- A1457: Azure DNS [Updated]
- INFO: Updated the children.
- A1458: Azure Firewall [Updated]
- INFO: Updated the children.
- A1459: Azure Firewall Manager [Updated]
- INFO: Updated the children.
- A1460: Azure Front Door [Updated]
- INFO: Updated the children.
- A1470: Azure Attestation [Updated]
- INFO: Updated the children.
- A1471: Azure Dedicated HSM [Updated]
- INFO: Updated the children.
- A1472: Azure Defender for Cloud [Updated]
- INFO: Updated the children.
- A1473: Azure Information Protection [Updated]
- INFO: Updated the children.
- A1474: Azure Key Vault Managed HSM [Updated]
- INFO: Updated the children.
- A1476: Azure Backup [Updated]
- INFO: Updated the children.
- A1477: Azure Data Box [Updated]
- INFO: Updated the children.
- A1478: Azure Data Share [Updated]
- INFO: Updated the children.
- A1479: Azure HPC Cache [Updated]
- INFO: Updated the children.
- A1482: Azure Communication Services [Updated]
- INFO: Updated the children.
- A1536: Azure Blob Storage [Updated]
- INFO: Updated the children.
- A1537: Azure Data Lake Storage [Updated]
- INFO: Updated the children.
- Q370: More Azure Services
- Q306: Azure Services
- Q363: Google Cloud Platform (GCP)
- Q309: Google Cloud Services
- A1213: Google Kubernetes Engine [Updated]
- INFO: Updated the text and children.
- A1236: Google Cloud IAM [Updated]
- INFO: Updated the text and children.
- A1237: Google Compute Engine [Updated]
- INFO: Updated the text and children.
- A1238: Google Cloud Key Management Service [Updated]
- INFO: Updated the text and children.
- A1239: Google Virtual Private Cloud (VPC) [Updated]
- INFO: Updated the text and children.
- A1240: Google Cloud Storage [Updated]
- INFO: Updated the text and children.
- A1241: Google Cloud Audit Logs [Updated]
- INFO: Updated the text and children.
- A1242: Google Cloud DNS [Updated]
- INFO: Updated the text and children.
- A1243: Google Cloud SQL [Updated]
- INFO: Updated the text and children.
- A1244: Google Stackdriver [Updated]
- INFO: Updated the text.
- A1337: Google BigQuery [Updated]
- INFO: Updated the text and children.
- A1592: Google Vertex AI Platform [Added]
- A1213: Google Kubernetes Engine [Updated]
- Q309: Google Cloud Services
- Q195: Language and Framework
Added Components
- SC38: User
- SC755: GCP Resource Manager
- SC756: GCP Media CDN
- SC757: API Gateway
- SC758: Salesforce
- SC759: Podman
- SC760: Circle CI
- SC761: Blank Component
- SC762: Attacker
Deactivated Components
- SC82: Azure Storage
Updated Components
- SC2: Database Server
- INFO: Updated the implied attributes.
- SC34: WebLogic
- INFO: Updated the implied attributes.
- SC47: Hardware
- INFO: Updated the answer mapping and implied attributes.
- SC76: Azure App Service
- INFO: Updated the implied attributes.
- SC101: Project Characteristics
- INFO: Updated the title and description.
- SC102: Azure PostgreSQL Database
- INFO: Updated the implied attributes.
- SC112: AWS Environment
- INFO: Updated the implied attributes.
- SC113: Azure Environment
- INFO: Updated the implied attributes.
- SC114: GCP Environment
- INFO: Updated the implied attributes.
- SC115: AWS Athena
- INFO: Updated the answer mapping and implied attributes.
- SC124: AWS Glue
- INFO: Updated the implied attributes.
- SC127: AWS Lake Formation
- INFO: Updated the implied attributes.
- SC137: AWS EventBridge
- INFO: Updated the answer mapping and implied attributes.
- SC165: AWS Fargate
- INFO: Updated the answer mapping and implied attributes.
- SC182: AWS Neptune
- INFO: Updated the answer mapping and implied attributes.
- SC190: AWS CodeArtifact
- INFO: Updated the description, answer mapping, and, implied attributes.
- SC195: AWS CodePipeline
- INFO: Updated the description, answer mapping, and, implied attributes.
- SC199: AWS X-Ray
- INFO: Updated the answer mapping and implied attributes.
- SC225: AWS Bedrock
- INFO: Updated the implied attributes.
- SC248: AWS Rekognition
- INFO: Updated the answer mapping and implied attributes.
- SC283: AWS DataSync
- INFO: Updated the answer mapping and implied attributes.
- SC288: AWS App Mesh
- INFO: Updated the implied attributes.
- SC290: AWS Direct Connect
- INFO: Updated the answer mapping and implied attributes.
- SC309: AWS GuardDuty
- INFO: Updated the answer mapping and implied attributes.
- SC311: AWS Inspector
- INFO: Updated the answer mapping and implied attributes.
- SC321: AWS S3 Glacier
- INFO: Updated the implied attributes.
- SC322: AWS Backup
- INFO: Updated the answer mapping and implied attributes.
- SC332: Azure AI Bot Service
- INFO: Updated the implied attributes.
- SC346: Azure Databricks
- INFO: Updated the implied attributes.
- SC350: Azure Machine Learning
- INFO: Updated the implied attributes.
- SC352: Azure OpenAI Service
- INFO: Updated the implied attributes.
- SC359: Azure Analysis Services
- INFO: Updated the implied attributes.
- SC362: Azure Data Explorer
- INFO: Updated the implied attributes.
- SC363: Azure Data Lake Analytics
- INFO: Updated the implied attributes.
- SC364: Azure Event Hubs
- INFO: Updated the implied attributes.
- SC371: Azure Stream Analytics
- INFO: Updated the implied attributes.
- SC372: Azure Synapse Analytics
- INFO: Updated the implied attributes.
- SC373: Azure Batch
- INFO: Updated the implied attributes.
- SC377: Azure Linux Virtual Machines
- INFO: Updated the implied attributes.
- SC381: Azure Spring Apps
- INFO: Updated the implied attributes.
- SC382: Azure Virtual Desktop
- INFO: Updated the implied attributes.
- SC383: Azure Virtual Machine Scale Sets
- INFO: Updated the implied attributes.
- SC385: Azure VMware Solution
- INFO: Updated the implied attributes.
- SC386: Azure Windows Virtual Machines
- INFO: Updated the implied attributes.
- SC387: Azure Container Apps
- INFO: Updated the implied attributes.
- SC388: Azure Container Instances
- INFO: Updated the implied attributes.
- SC389: Azure Container Registry
- INFO: Updated the implied attributes.
- SC392: Azure Red Hat OpenShift
- INFO: Updated the implied attributes.
- SC394: Azure Cache for Redis
- INFO: Updated the implied attributes.
- SC395: Azure Cosmos DB
- INFO: Updated the implied attributes.
- SC396: Azure Data Factory
- INFO: Updated the implied attributes.
- SC397: Azure Database for MariaDB
- INFO: Updated the implied attributes.
- SC398: Azure Database for MySQL
- INFO: Updated the implied attributes.
- SC399: Azure Managed Instance for Apache Cassandra
- INFO: Updated the implied attributes.
- SC400: Azure SQL
- INFO: Updated the implied attributes.
- SC402: Azure SQL Managed Instance
- INFO: Updated the description, answer mapping, and, implied attributes.
- SC405: Azure App Configuration
- INFO: Updated the implied attributes.
- SC417: Azure DevTest Labs
- INFO: Updated the implied attributes.
- SC424: Azure Arc
- INFO: Updated the implied attributes.
- SC430: Azure Stack Edge
- INFO: Updated the implied attributes.
- SC433: Azure Active Directory External Identities
- INFO: Updated the implied attributes.
- SC434: Azure API Management
- INFO: Updated the implied attributes.
- SC437: Azure Event Grid
- INFO: Updated the implied attributes.
- SC439: Azure Logic Apps
- INFO: Updated the implied attributes.
- SC440: Azure Service Bus
- INFO: Updated the implied attributes.
- SC441: Azure Web PubSub
- INFO: Updated the implied attributes.
- SC443: Azure IoT Central
- INFO: Updated the implied attributes.
- SC445: Azure IoT Hub
- INFO: Updated the implied attributes.
- SC447: Azure Notification Hubs
- INFO: Updated the implied attributes.
- SC455: Azure Automation
- INFO: Updated the implied attributes.
- SC457: Azure Cloud Shell
- INFO: Updated the implied attributes.
- SC459: Azure Cost Management
- INFO: Updated the implied attributes.
- SC460: Azure Lighthouse
- INFO: Updated the implied attributes.
- SC461: Azure Managed Applications
- INFO: Updated the implied attributes.
- SC463: Azure Policy
- INFO: Updated the implied attributes.
- SC465: Azure Purview
- INFO: Updated the implied attributes.
- SC466: Azure Resource Manager templates
- INFO: Updated the description and implied attributes.
- SC467: Azure Resource Mover
- INFO: Updated the implied attributes.
- SC474: Azure Media Services
- INFO: Updated the implied attributes.
- SC475: Azure Database Migration Service
- INFO: Updated the implied attributes.
- SC476: Azure Migrate
- INFO: Updated the implied attributes.
- SC477: Azure Site Recovery
- INFO: Updated the implied attributes.
- SC478: Azure Digital Twins
- INFO: Updated the implied attributes.
- SC481: Azure Remote Rendering
- INFO: Updated the implied attributes.
- SC482: Azure Spatial Anchors
- INFO: Updated the implied attributes.
- SC484: Azure Application Gateway
- INFO: Updated the implied attributes.
- SC485: Azure Bastion
- INFO: Updated the implied attributes.
- SC486: Azure Communications Gateway
- INFO: Updated the implied attributes.
- SC487: Azure Content Delivery Network
- INFO: Updated the implied attributes.
- SC488: Azure DDoS Protection
- INFO: Updated the implied attributes.
- SC489: Azure DNS
- INFO: Updated the implied attributes.
- SC491: Azure Firewall
- INFO: Updated the implied attributes.
- SC492: Azure Firewall Manager
- INFO: Updated the implied attributes.
- SC493: Azure Front Door
- INFO: Updated the implied attributes.
- SC495: Azure Load Balancer
- INFO: Updated the implied attributes.
- SC496: Azure NAT Gateway
- INFO: Updated the implied attributes.
- SC498: Azure Network Watcher
- INFO: Updated the implied attributes.
- SC502: Azure Private Link
- INFO: Updated the implied attributes.
- SC505: Azure Traffic Manager
- INFO: Updated the implied attributes.
- SC507: Azure Virtual WAN
- INFO: Updated the implied attributes.
- SC508: Azure VPN Gateway
- INFO: Updated the implied attributes.
- SC509: Azure Web Application Firewall
- INFO: Updated the implied attributes.
- SC510: Azure Attestation
- INFO: Updated the implied attributes.
- SC511: Azure Dedicated HSM
- INFO: Updated the implied attributes.
- SC513: Azure Defender for Cloud
- INFO: Updated the implied attributes.
- SC515: Azure Information Protection
- INFO: Updated the implied attributes.
- SC516: Azure Key Vault Managed HSM
- INFO: Updated the implied attributes.
- SC517: Azure Sentinel
- INFO: Updated the implied attributes.
- SC521: Azure Backup
- INFO: Updated the implied attributes.
- SC522: Azure Blob Storage
- INFO: Updated the implied attributes.
- SC524: Azure Data Box
- INFO: Updated the implied attributes.
- SC525: Azure Data Lake Storage
- INFO: Updated the implied attributes.
- SC527: Azure Data Share
- INFO: Updated the implied attributes.
- SC531: Azure HPC Cache
- INFO: Updated the implied attributes.
- SC532: Azure Managed Lustre
- INFO: Updated the implied attributes.
- SC533: Azure NetApp Files
- INFO: Updated the implied attributes.
- SC535: Azure Storage Accounts
- INFO: Updated the description, answer mapping, and, implied attributes.
- SC539: Azure Communication Services
- INFO: Updated the implied attributes.
- SC542: Azure SignalR Service
- INFO: Updated the implied attributes.
- SC543: Azure Static Web AppsAzure
- INFO: Updated the description, answer mapping, and, implied attributes.
- SC554: GCP Vertex AI Platform
- INFO: Updated the description, answer mapping, and, implied attributes.
- SC2: Database Server
2024.2
July 6, 2024
New features and enhancements
Library Weaknesses
- Added the following Library Weakness UI enhancements:
- Improved content management user experience
- Ability to copy an existing Weakness when creating a new one
- Display when a Weakness was edited last and by whom
- New applicability rule user experience when viewing, adding, or editing match conditions
- New dedicated page for related Countermeasures of a Weakness
- Added the API capability to POST, PATCH and DELETE Weaknesses
- Added the following Library Weakness UI enhancements:
Library Profiles
- The Library Profile page has been replaced with a new page that uses modern controls
Project Classifications
- Added the ability to create new classifications in addition to the five built-in options via the UI and API
- Added the ability to reorder project classifications via the API
- Added GET, POST, and PATCH for new project classifications
Team Onboarding
- Added a new getting started option to Scan a Repository within a Project
- Added the ability to connect to GitHub within SD Elements via OAuth
- Added the ability to select a Repo and Branch for an Authenticated GitHub connection to scan and answer the survey
- This includes repo scan API features released June 8
- Added a new getting started option to Scan a Repository within a Project
Python 3.12 upgrade
- Container images now use Python 3.12
- Remote Integration Agent (RIA) now uses Python 3.12
- Deprecated Python 3.8
- Existing deployments of RIA should continue to work, but only Python 3.12 RIA downloads will be available
Content improvements summary
Updates
August 3, 2024
Scan a Repository
- Added the ability to select Scan a Repository from the Project Survey page
New Content Updates Available widget
- Added the ability to selectively accept pending Countermeasure changes
August 17, 2024
- Update CWEs on Weaknesses
- Added the ability for a user to update the CWE mappings on a Weakness
- Added the ability for a user to revert CWE changes back to the latest content updates
Content improvements summary
EU AI Act
- This is the first regulatory framework aimed at ensuring the safety and fundamental rights of people and businesses while fostering the adoption of Artificial Intelligence (AI). Added 22 Countermeasures to cover related articles of the Act.
LLM-based Code Generation countermeasures
- Added three Countermeasures to cover the recommendations for the common use cases of code generation using AI.
ANSI/ISA 62443 4-1 (SDLA 312)
- Added a new compliance regulation for 62443 4-1 along with amendments and test amendments.
CWEs
- Updated the CWEs to v4.14.
AWS Services
- Added content for Certificate Manager, CloudFormation, Elastic Container Registry, Elastic File System, ElastiCache, Managed Streaming for Apache Kafka, MQ, OpenSearch Service, RedShift, Secrets Manager, Simple Email Service, Step Functions, Systems Manager, Transfer Family, App Mesh, Bedrock, S3 Glacier, Glue, and Lake Formation.
Azure Services
- Added content for Azure AI Bot Service, Azure Databricks, Azure Machine Learning, Azure OpenAI Service, Azure Analysis Services, Azure Data Explorer, Azure Data Lake Analytics, Azure Event Hubs, Azure Stream Analytics, Azure Synapse Analytics, Azure App Service, Azure Batch, Azure Linux Virtual Machines, Azure Spring Apps, Azure Virtual Desktop, Azure Virtual Machine Scale Sets, Azure VMware Solution, Azure Windows Virtual Machines, Azure Container Apps, Azure Container Instances, Azure Container Registry, Azure Red Hat OpenShift, Azure Cache for Redis, Azure Cosmos DB, Azure Data Factory, Azure Database for MariaDB, Azure Database for MySQL, Azure Managed Instance for Apache Cassandra, Azure SQL, Azure App Configuration, Azure DevTest Labs, Azure Arc, Azure Stack Edge, Azure Active Directory External Identities, Azure API Management, Azure Event Grid, Azure Logic Apps, Azure Service Bus, Azure Web PubSub, Azure IoT Central, Azure IoT Hub, Azure Notification Hubs, Azure Automation, Azure Cloud Shell, Azure Cost Management, Azure Lighthouse, Azure Managed Applications, Azure Policy, Azure Purview, Azure Resource Manager templates, Azure Resource Mover, Azure Media Services, Azure Database Migration Service, Azure Migrate, Azure Site Recovery, Azure Digital Twins, Azure Remote Rendering, Azure Spatial Anchors, Azure Application Gateway, Azure Bastion, Azure Communications Gateway, Azure Content Delivery Network, Azure DDoS Protection, Azure DNS, Azure Firewall, Azure Firewall Manager, Azure Front Door, Azure Load Balancer, Azure NAT Gateway, Azure Network Watcher, Azure Private Link, Azure Traffic Manager, Azure Virtual WAN, Azure VPN Gateway, Azure Web Application Firewall, Azure PostgreSQL Database, Azure Attestation, Azure Dedicated HSM, Azure Defender for Cloud, Azure Information Protection, Azure Key Vault Managed HSM, Azure Sentinel, Azure Backup, Azure Data Box, Azure Data Share, Azure HPC Cache, Azure Managed Lustre, Azure NetApp Files, Azure Communication Services, Azure SignalR Service, Azure Blob Storage, and Azure Data Lake Storage.
Databases
- Added content for InfluxDB, Neo4j, MariaDB, CockroachDB, Apache Cassandra, MarkLogic, and SQLite.
Network
- Added content for Directory Server, DNS Server, Firewall, FTP Server, IDS/IPS, Load Balancer, Message Broker, File Transfer Protocol (FTP), Virtual Private Network (VPN), Proxy Server, Router, Service Bus, Virtual Private Network (VPN) Server, 3G, 4G/LTE, 5G, LoRa, Modbus, Advanced Message Queuing Protocol (AMQP), Content Delivery Network (CDN)
Compliance Regulations and Mappings
- CIS GitHub Benchmark 1.0.0
Content additions and updates (as of June 19, 2024):
Compliance Regulations and Mappings
- Added ANSI/ISA 62443-4-1 (ISASecure SDLA 312)
- Added CIS GitHub Benchmark 1.0.0
- Added EU AI Act
Content Packs
- Added InfluxDB
- Added Neo4j
- Added MariaDB
- Added CockroachDB
- Added Apache Cassandra
- Added MarkLogic
- Added PostgreSQL
- Added GitHub
- Added EU AI Act
- Added Network
T38: Bind variables in SQL statements
- I1891: Use parameterized commands when an application interacts with the database (PostgreSQL) [Added]
- I1892: Prevent injection attacks by using parameterized commands (InfluxDB) [Added]
- I1893: Use parameterized commands when an application accesses the database (MariaDB) [Added]
- I1894: Use parameterized commands when an application interacts with the database (CockroachDB) [Added]
- I1895: Use parameterized commands when an application interacts with the database [Added]
- T177: Allow users to review and update their personal information
- TA6554: OWASP best practices for changing user account details [Added]
- T796: Configure DNS for Root Domain (AWS Route53) [Updated]
- INFO: Updated the title.
- P896: Misconfiguration of DNS for Root Domain (AWS Route53) [Updated]
- INFO: Updated the title and cwe set.
- T829: Test that DNS for Root Domain is configured correctly (AWS Route53) [Updated]
- INFO: Updated the title.
- P896: Misconfiguration of DNS for Root Domain (AWS Route53) [Updated]
- INFO: Updated the title and cwe set.
- T1366: Identify applicable compliance regulations
- TA6823: SDLA 312 Requirement (SM-3) [Added]
- TA6825: SDLA 312 Requirement (SM-5) [Added]
- T1373: Maintain the integrity of all software code
- TA6826: SDLA 312 Requirement (SM-6) [Added]
- T1374: Ensure the integrity of software release and update delivery
- TA6827: SDLA 312 Requirement (SM-7) [Added]
- TA6834: SDLA 312 Requirement (SUM-1) [Added]
- TA6837: SDLA 312 Requirement (SUM-4) [Added]
- TA6838: SDLA 312 Requirement (SUM-5) [Added]
- T1376: Provide and maintain guidance on secure installation, maintenance, and configuration of all software components
- TA6808: SDLA 312 Requirement (SG-1) [Added]
- TA6809: SDLA 312 Requirement (SG-2) [Added]
- TA6810: SDLA 312 Requirement (SG-3) [Added]
- TA6811: SDLA 312 Requirement (SG-4) [Added]
- TA6812: SDLA 312 Requirement (SG-5) [Added]
- TA6813: SDLA 312 Requirement (SG-6) [Added]
- TA6814: SDLA 312 Requirement (SG-7) [Added]
- T1377: Establish and maintain a bi-directional communication channel for receiving security reports and sending security notifications
- TA6798: SDLA 312 Requirement (DM-1) [Added]
- TA6802: SDLA 312 Requirement (DM-5) [Added]
- T1378: Release a change summary for each software update
- TA6835: SDLA 312 Requirement (SUM-2) [Added]
- TA6836: SDLA 312 Requirement (SUM-3) [Added]
- T1387: Ensure the security of products acquired through the supply chain and contractors
- TA6818: SDLA 312 Requirement (SM-10) [Added]
- T1388: Triage and fix vulnerabilities discovered during automated and manual security tests
- TA6799: SDLA 312 Requirement (DM-2) [Added]
- TA6800: SDLA 312 Requirement (DM-3) [Added]
- TA6801: SDLA 312 Requirement (DM-4) [Added]
- TA6803: SDLA 312 Requirement (DM-6) [Added]
- TA6819: SDLA 312 Requirement (SM-11) [Added]
- TA6820: SDLA 312 Requirement (SM-12) [Added]
- TA6821: SDLA 312 Requirement (SM-13) [Added]
- T1389: Perform penetration testing
- TA6841: SDLA 312 Requirement (SVV-3) [Added]
- TA6842: SDLA 312 Requirement (SVV-4) [Added]
- TA6843: SDLA 312 Requirement (SVV-5) [Added]
- T1453: Validate user input before transmitting it to the SQL server (Microsoft SQL Server) [Updated]
- INFO: Updated the text.
- T1892: Perform a Threat and Risk Assessment (TRA)
- TA6830: SDLA 312 Requirement (SR-2) [Added]
- T1921: Track and manage usage of third-party and commercial off the shelf (COTS) hardware or software
- TA6828: SDLA 312 Requirement (SM-9) [Added]
- T2343: Define security-related roles and provide role-base training
- TA6822: SDLA 312 Requirement (SM-2) [Added]
- TA6824: SDLA 312 Requirement (SM-4) [Added]
- T2345: Define and implement criteria for software security checks
- TA6815: SDLA 312 Requirement (SI-1) [Added]
- T2351: Verify that security-related roles and responsibilities are properly defined and assigned
- TA6867: SDLA 312 Test Requirement (SM-2) [Added]
- TA6869: SDLA 312 Test Requirement (SM-4) [Added]
- T2353: Verify that proper criteria for software security checks are defined and implemented
- TA6860: SDLA 312 Test Requirement (SI-1) [Added]
- T2498: Provide clear definitions for each component
- TA6829: SDLA 312 Requirement (SR-1) [Added]
- T2499: Verify that clear definitions for each component exist
- TA6874: SDLA 312 Test Requirement (SR-1) [Added]
- T2500: Verify that a Threat and Risk Assessment (TRA) is performed
- TA6875: SDLA 312 Test Requirement (SR-2) [Added]
- T2510: Define cybersecurity goals and requirements for a component
- TA6804: SDLA 312 Requirement (SD-1) [Added]
- TA6805: SDLA 312 Requirement (SD-2) [Added]
- TA6806: SDLA 312 Requirement (SD-3) [Added]
- TA6807: SDLA 312 Requirement (SD-4) [Added]
- TA6817: SDLA 312 Requirement (SM-1) [Added]
- TA6831: SDLA 312 Requirement (SR-3) [Added]
- TA6832: SDLA 312 Requirement (SR-4) [Added]
- TA6833: SDLA 312 Requirement (SR-5) [Added]
- T2513: Verify whether cybersecurity goals and requirements are clearly defined for a component
- TA6850: SDLA 312 Test Requirement (SD-1) [Added]
- TA6851: SDLA 312 Test Requirement (SD-2) [Added]
- TA6852: SDLA 312 Test Requirement (SD-3) [Added]
- TA6853: SDLA 312 Test Requirement (SD-4) [Added]
- TA6862: SDLA 312 Test Requirement (SM-1) [Added]
- TA6876: SDLA 312 Test Requirement (SR-3) [Added]
- TA6877: SDLA 312 Test Requirement (SR-4) [Added]
- TA6878: SDLA 312 Test Requirement (SR-5) [Added]
- T2514: Establish coding and testing guidelines
- TA6816: SDLA 312 Requirement (SI-2) [Added]
- TA6839: SDLA 312 Requirement (SVV-1) [Added]
- TA6840: SDLA 312 Requirement (SVV-2) [Added]
- T2515: Verify coding and testing guidelines
- TA6861: SDLA 312 Test Requirement (SI-2) [Added]
- TA6884: SDLA 312 Test Requirement (SVV-1) [Added]
- TA6885: SDLA 312 Test Requirement (SVV-2) [Added]
- T2615: Limit network access by blocking connections from unknown IP addresses (PostgreSQL) [Added]
- T2616: Use a secure authentication mechanism for database connections (PostgreSQL) [Added]
- P1771: Weak authentication for database users [Added]
- T2617: Create dedicated database user accounts with minimum privileges (PostgreSQL) [Added]
- T2618: Remove unecessary superuser accounts (PostgreSQL) [Added]
- P1773: Overuse of superuser accounts (PostgreSQL) [Added]
- T2619: Ensure that row-level security is correctly configured (PostgreSQL) [Added]
- P1774: Incorrect configuration of row-level security (PostgreSQL) [Added]
- T2620: Protect data in transit with TLS (PostgreSQL) [Added]
- T2621: Use file volume encryption and consider in-database encryption with pgcrypto (PostgreSQL) [Added]
- T2622: Monitor database activity and enable audit logging (PostgreSQL) [Added]
- P1772: Failure to monitor database activity [Added]
- T2623: Schedule regular database backups to protect availability (PostgreSQL) [Added]
- P2006: Failure to safeguard against data loss [Added]
- T2624: Change insecure configuration defaults and remove unnecessary features (InfluxDB) [Added]
- T2625: Follow best practices for token management (InfluxDB) [Added]
- T2626: Use volume encryption as a partial mitigation (InfluxDB) [Added]
- T2627: Protect data in transit with TLS (InfluxDB) [Added]
- T2628: Schedule regular database backups to protect availability (InfluxDB) [Added]
- P2006: Failure to safeguard against data loss [Added]
- T2629: Monitor database activity and enable audit logging (InfluxDB) [Added]
- P1772: Failure to monitor database activity [Added]
- T2630: Change insecure configuration defaults and remove unnecessary features (Neo4j) [Added]
- T2631: Restrict unecessary plugins and functions that use Neo4j's internal APIs (Neo4j) [Added]
- P1776: Unrestricted plugins (Neo4j) [Added]
- T2632: Use a secure authentication mechanism for database connections (Neo4j) [Added]
- P1771: Weak authentication for database users [Added]
- T2633: Create dedicated database user accounts with minimum privileges (Neo4j) [Added]
- T2634: Disable credential caching (Neo4j) [Added]
- P1777: Credentials stored in clear text in the browser (Neo4j) [Added]
- T2635: Use volume encryption as a partial mitigation (Neo4j) [Added]
- T2636: Use TLS for Bolt or HTTPS communication (Neo4j) [Added]
- T2637: Schedule regular database backups to protect availability (Neo4j) [Added]
- P2006: Failure to safeguard against data loss [Added]
- T2638: Monitor database activity and enable audit logging (Neo4j) [Added]
- P1772: Failure to monitor database activity [Added]
- T2639: Enable authentication and create at least one database user (MongoDB) [Added]
- P1778: Lack of authentication for database users (MongoDB) [Added]
- T2640: Implement RBAC with dedicated database user accounts (MongoDB) [Added]
- T2641: Protect sensitive data at rest with encryption (MongoDB) [Added]
- T2642: Protect data in transit with TLS (MongoDB) [Added]
- T2643: Monitor database activity and enable audit logging (MongoDB) [Added]
- P1772: Failure to monitor database activity [Added]
- T2644: Change insecure configuration defaults and remove unnecessary features (MongoDB) [Added]
- T2645: Create dedicated database user accounts with minimum privileges (MariaDB) [Added]
- T2646: Disable command history logging (MariaDB) [Added]
- P1779: Leaking sensitive information in the command history (MariaDB) [Added]
- T2647: Protect sensitive data at rest with encryption (MariaDB) [Added]
- T2648: Protect data in transit with TLS (MariaDB) [Added]
- T2649: Schedule regular database backups to protect availability (MariaDB) [Added]
- P2006: Failure to safeguard against data loss [Added]
- T2650: Monitor database activity and enable audit logging (MariaDB) [Added]
- P1772: Failure to monitor database activity [Added]
- T2651: Change insecure configuration defaults and remove unnecessary features (MariaDB) [Added]
- T2652: Consider adding plugins for stronger authentication protocols and stricter password complexity rules (MariaDB) [Added]
- P1771: Weak authentication for database users [Added]
- T2653: Do not use insecure mode (CockroadDB) [Added]
- T2654: Limit network access by blocking connections from unknown IP addresses (CockroachDB) [Added]
- T2655: Use a secure authentication mechanism for database connections (CockroachDB) [Added]
- P1771: Weak authentication for database users [Added]
- T2656: Create dedicated database user accounts with minimum privileges CockroachDB) [Added]
- T2657: Protect data in transit with TLS (CockroachDB) [Added]
- T2658: Protect sensitive data at rest with encryption (CockroachDB) [Added]
- T2659: Monitor database security logs and consider audit logging (CockroachDB) [Added]
- P1772: Failure to monitor database activity [Added]
- T2660: Schedule regular database backups to protect availability (CockroachDB) [Added]
- P2006: Failure to safeguard against data loss [Added]
- T2661: Change insecure configuration defaults and remove unnecessary features [Added]
- T2662: Restrict network access to the database server [Added]
- T2663: Use a secure authentication mechanism for database connections [Added]
- P1771: Weak authentication for database users [Added]
- T2664: Create dedicated database user accounts with minimum privileges [Added]
- T2665: Protect sensitive data at rest with encryption [Added]
- T2666: Protect data in transit with TLS [Added]
- T2667: Schedule regular database backups to protect availability [Added]
- P2006: Failure to safeguard against data loss [Added]
- T2668: Monitor database activity and enable audit logging [Added]
- P1772: Failure to monitor database activity [Added]
- T2669: Schedule regular database backups to protect availability (MongoDB) [Added]
- P2006: Failure to safeguard against data loss [Added]
- T2670: Verify that applicable compliance regulations are identified [Added]
- TA6868: SDLA 312 Test Requirement (SM-3) [Added]
- TA6870: SDLA 312 Test Requirement (SM-5) [Added]
- T2671: Verify that the integrity of all software code is maintained [Added]
- TA6871: SDLA 312 Test Requirement (SM-6) [Added]
- T2672: Verify that the integrity of software release and update delivery is protected [Added]
- TA6872: SDLA 312 Test Requirement (SM-7) [Added]
- TA6879: SDLA 312 Test Requirement (SUM-1) [Added]
- TA6882: SDLA 312 Test Requirement (SUM-4) [Added]
- TA6883: SDLA 312 Test Requirement (SUM-5) [Added]
- T2673: Verify that usage third-party and commercial off the shelf (COTS) hardware or software is tracked and managed [Added]
- TA6873: SDLA 312 Test Requirement (SM-9) [Added]
- T2674: Verify that products acquired through the supply chain and contractors are secure [Added]
- TA6863: SDLA 312 Test Requirement (SM-10) [Added]
- T2675: Verify that vulnerabilities discovered during automated and manual security tests are triaged and fixed [Added]
- TA6845: SDLA 312 Test Requirement (DM-2) [Added]
- TA6846: SDLA 312 Test Requirement (DM-3) [Added]
- TA6847: SDLA 312 Test Requirement (DM-4) [Added]
- TA6849: SDLA 312 Test Requirement (DM-6) [Added]
- TA6864: SDLA 312 Test Requirement (SM-11) [Added]
- TA6865: SDLA 312 Test Requirement (SM-12) [Added]
- TA6866: SDLA 312 Test Requirement (SM-13) [Added]
- T2676: Verify that a bi-directional communication channel is established and maintained for receiving security reports and sending notifications [Added]
- TA6844: SDLA 312 Test Requirement (DM-1) [Added]
- TA6848: SDLA 312 Test Requirement (DM-5) [Added]
- T2677: Verify that a change summary is released for each software update [Added]
- TA6880: SDLA 312 Test Requirement (SUM-2) [Added]
- TA6881: SDLA 312 Test Requirement (SUM-3) [Added]
- T2678: Verify that guidance is provided and maintained for secure installation, maintenance and configuration of all software components [Added]
- TA6854: SDLA 312 Test Requirement (SG-1) [Added]
- TA6855: SDLA 312 Test Requirement (SG-2) [Added]
- TA6856: SDLA 312 Test Requirement (SG-3) [Added]
- TA6857: SDLA 312 Test Requirement (SG-4) [Added]
- TA6858: SDLA 312 Test Requirement (SG-6) [Added]
- TA6859: SDLA 312 Test Requirement (SG-7) [Added]
- T2679: Verify that penetration testing has been performed [Added]
- TA6886: SDLA 312 Test Requirement (SVV-3) [Added]
- TA6887: SDLA 312 Test Requirement (SVV-4) [Added]
- TA6888: SDLA 312 Test Requirement (SVV-5) [Added]
- T2680: Establish network segmentation boundaries (Azure) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2681: Secure cloud native services with network controls (Azure) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T2682: Deploy firewall at the edge of enterprise network (Azure) [Added]
- P1782: Uncontrolled network access (Cloud) [Added]
- T2683: Deploy intrusion detection/intrusion prevention systems (IDS/IPS) (Azure) [Added]
- P1783: Unmonitored network traffic vulnerability (Cloud) [Added]
- T2684: Deploy DDOS protection (Azure) [Added]
- P1784: Insufficient traffic filtering and rate limiting (Cloud) [Added]
- T2685: Deploy web application firewall (Azure) [Added]
- P1785: Unprotected web applications (Cloud) [Added]
- T2686: Simplify network security configuration (Azure) [Added]
- P1786: Overly complex network security configurations (Cloud) [Added]
- T2687: Detect and disable insecure services and protocols (Azure) [Added]
- P1787: Outdated and vulnerable network services (Cloud) [Added]
- T2688: Connect on-premises or cloud network privately (Azure) [Added]
- P1788: Unsecured public network connections (Cloud) [Added]
- T2689: Ensure Domain Name System (DNS) security (Azure) [Added]
- P1789: Unsecured Domain Name System (DNS) (Cloud) [Added]
- T2690: Use centralized identity and authentication system (Azure) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T2691: Protect identity and authentication systems (Azure) [Added]
- P1791: Unsecured identity and authentication systems (Cloud) [Added]
- T2692: Manage application identities securely and automatically (Azure) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T2693: Authenticate server and services (Azure) [Added]
- P1793: Unverified server identity (Cloud) [Added]
- T2694: Use single sign-on (SSO) for application access (Azure) [Added]
- P1794: Insufficient authentication protocols (Cloud) [Added]
- T2695: Use strong authentication controls (Azure) [Added]
- P1795: Weak password-based authentication (Cloud) [Added]
- T2696: Restrict resource access based on conditions (Azure) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T2697: Restrict the exposure of credentials and secrets (Azure) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T2698: Secure user access to existing applications (Azure) [Added]
- P1798: Unsecured access to legacy applications (Cloud) [Added]
- T2699: Separate and limit highly privileged/administrative users (Azure) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T2700: Avoid standing access for user accounts and permissions (Azure) [Added]
- P1800: Overly broad access permissions (Cloud) [Added]
- T2701: Manage lifecycle of identities and entitlements (Azure) [Added]
- P1801: Uncontrolled identity and access management (Cloud) [Added]
- T2702: Review and reconcile user access regularly (Azure) [Added]
- P1802: Unmonitored privileged access (Cloud) [Added]
- T2703: Set up emergency access (Azure) [Added]
- P1803: Insufficient emergency access management (Cloud) [Added]
- T2704: Use privileged access workstations (Azure) [Added]
- P1804: Insufficiently secured administrative access (Cloud) [Added]
- T2705: Follow just enough administration (least privilege) principle (Azure) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T2706: Determine access process for cloud provider support (Azure) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T2707: Discover, classify, and label sensitive data (Azure) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T2708: Monitor anomalies and threats targeting sensitive data (Azure) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T2709: Encrypt sensitive data in transit (Azure) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T2710: Enable data at rest encryption by default (Azure) [Added]
- P1810: Unprotected data at rest (Cloud) [Added]
- T2711: Use customer-managed key option in data at rest encryption when required (Azure) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T2712: Use a secure key management process (Azure) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T2713: Use a secure certificate management process (Azure) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T2714: Ensure security of key and certificate repository (Azure) [Added]
- P1814: Unsecured key and certificate repository (Cloud) [Added]
- T2715: Track asset inventory and their risks (Azure) [Added]
- P1815: Untracked and unmonitored cloud assets (Cloud) [Added]
- T2716: Use only approved services (Azure) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T2717: Ensure security of asset lifecycle management (Azure) [Added]
- P1817: Outdated security configurations (Cloud) [Added]
- T2718: Limit access to asset management (Azure) [Added]
- P1818: Unauthorized access to asset management (Cloud) [Added]
- T2719: Use only approved applications in virtual machine (Azure) [Added]
- P1819: Uncontrolled execution of unauthorized software (Cloud) [Added]
- T2720: Enable threat detection capabilities (Azure) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T2721: Enable threat detection for identity and access management (Azure) [Added]
- P1821: Unmonitored identity and access management systems (Cloud) [Added]
- T2722: Enable logging for security investigation (Azure) [Added]
- P1822: Insufficient logging and monitoring (Cloud) [Added]
- T2723: Enable network logging for security investigation (Azure) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T2724: Centralize security log management and analysis (Azure) [Added]
- P1824: Decentralized security log management (Cloud) [Added]
- T2725: Configure log storage retention (Azure) [Added]
- P1825: Insufficient log storage retention periods (Cloud) [Added]
- T2726: Use approved time synchronization sources (Azure) [Added]
- P1826: Unreliable logging timestamps (Cloud) [Added]
- T2727: Preparation - update incident response plan and handling process (Azure) [Added]
- P1827: Inadequate incident response planning (Cloud) [Added]
- T2728: Preparation - setup incident notification (Azure) [Added]
- P1828: Inadequate incident notification setup (Cloud) [Added]
- T2729: Detection and analysis - create incidents based on high-quality alerts (Azure) [Added]
- P1829: Insufficient alert quality management (Cloud) [Added]
- T2730: Detection and analysis - investigate an incident (Azure) [Added]
- P1830: Inadequate data collection and analysis (Cloud) [Added]
- T2731: Detection and analysis - prioritize incidents (Azure) [Added]
- P1831: Insufficient incident prioritization (Cloud) [Added]
- T2732: Containment, eradication and recovery - automate the incident handling (Azure) [Added]
- P1832: Inefficient manual incident handling processes (Cloud) [Added]
- T2733: Post-incident activity - conduct lessons learned and retain evidence (Azure) [Added]
- P1833: Failure to document incident response efforts (Cloud) [Added]
- T2734: Define and establish secure configurations (Azure) [Added]
- P1834: Inconsistent cloud resource configurations (Cloud) [Added]
- T2735: Audit and enforce secure configurations (Azure) [Added]
- P1835: Unsecured system configurations (Cloud) [Added]
- T2736: Define and establish secure configurations for compute resources (Azure) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T2737: Audit and enforce secure configurations for compute resources (Azure) [Added]
- P1837: Unsecured compute resource configurations (Cloud) [Added]
- T2738: Perform vulnerability assessments (Azure) [Added]
- P1838: Lack of vulnerability assessments (Cloud) [Added]
- T2739: Rapidly and automatically remediate vulnerabilities (Azure) [Added]
- P1839: Unpatched vulnerabilities in cloud resources (Cloud) [Added]
- T2740: Conduct regular red team operations (Azure) [Added]
- P1840: Overreliance on traditional vulnerability scanning (Cloud) [Added]
- T2741: Use Endpoint Detection and Response (EDR) (Azure) [Added]
- P1841: Unmonitored endpoint activity (Cloud) [Added]
- T2742: Use modern anti-malware software (Azure) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T2743: Ensure anti-malware software and signatures are updated (Azure) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T2744: Ensure regular automated backups (Azure) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T2745: Protect backup and recovery data (Azure) [Added]
- P1845: Unsecured backup and recovery data (Cloud) [Added]
- T2746: Monitor backups (Azure) [Added]
- P1846: Inadequate backup monitoring (Cloud) [Added]
- T2747: Regularly test backup (Azure) [Added]
- P1847: Inadequate backup verification (Cloud) [Added]
- T2748: Conduct threat modeling (Azure) [Added]
- P1848: Inadequate threat identification and mitigation (Cloud) [Added]
- T2749: Ensure software supply chain security (Azure) [Added]
- P1849: Unsecured software supply chain (Cloud) [Added]
- T2750: Secure DevOps infrastructure (Azure) [Added]
- P1850: Unsecured DevOps infrastructure (Cloud) [Added]
- T2751: Integrate static application security testing into DevOps pipeline (Azure) [Added]
- P1851: Insufficient code review and testing (Cloud) [Added]
- T2752: Integrate dynamic application security testing into DevOps pipeline (Azure) [Added]
- P1852: Insufficient security testing in CI/CD pipelines (Cloud) [Added]
- T2753: Enforce security of workload throughout DevOps lifecycle (Azure) [Added]
- P1853: Inadequate DevOps security practices (Cloud) [Added]
- T2754: Enable logging and monitoring in DevOps (Azure) [Added]
- P1854: Inadequate logging and monitoring in DevOps (Cloud) [Added]
- T2755: Align organization roles, responsibilities and accountabilities (Azure) [Added]
- P1855: Lack of defined security roles and responsibilities (Cloud) [Added]
- T2756: Define and implement enterprise segmentation/separation of duties strategy (Azure) [Added]
- P1856: Insufficient access control and segmentation (Cloud) [Added]
- T2757: Define and implement data protection strategy (Azure) [Added]
- P1857: Inadequate data protection strategy (Cloud) [Added]
- T2758: Define and implement network security strategy (Azure) [Added]
- P1858: Lack of unified network security strategy (Cloud) [Added]
- T2759: Define and implement security posture management strategy (Azure) [Added]
- P1859: Inadequate cloud security configuration (Cloud) [Added]
- T2760: Define and implement identity and privileged access strategy (Azure) [Added]
- P1860: Inadequate identity and access management (Cloud) [Added]
- T2761: Define and implement logging, threat detection and incident response strategy (Azure) [Added]
- P1861: Inadequate logging and incident response (Cloud) [Added]
- T2762: Define and implement backup and recovery strategy (Azure) [Added]
- P1862: Inadequate data backup and recovery processes (Cloud) [Added]
- T2763: Define and implement endpoint security strategy (Azure) [Added]
- P1863: Unsecured endpoints (Cloud) [Added]
- T2764: Define and implement DevOps security strategy (Azure) [Added]
- P1864: Inadequate DevOps security strategy (Cloud) [Added]
- T2765: Define and implement multi-cloud security strategy (Azure) [Added]
- P1865: Lack of unified cloud security management (Cloud) [Added]
- T2766: Establish network segmentation boundaries (AWS) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2767: Secure cloud native services with network controls (AWS) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T2768: Deploy firewall at the edge of enterprise network (AWS) [Added]
- P1782: Uncontrolled network access (Cloud) [Added]
- T2769: Deploy intrusion detection/intrusion prevention systems (IDS/IPS) (AWS) [Added]
- P1783: Unmonitored network traffic vulnerability (Cloud) [Added]
- T2770: Deploy DDOS protection (AWS) [Added]
- P1784: Insufficient traffic filtering and rate limiting (Cloud) [Added]
- T2771: Deploy web application firewall (AWS) [Added]
- P1785: Unprotected web applications (Cloud) [Added]
- T2772: Simplify network security configuration (AWS) [Added]
- P1786: Overly complex network security configurations (Cloud) [Added]
- T2773: Detect and disable insecure services and protocols (AWS) [Added]
- P1787: Outdated and vulnerable network services (Cloud) [Added]
- T2774: Connect on-premises or cloud network privately (AWS) [Added]
- P1788: Unsecured public network connections (Cloud) [Added]
- T2775: Ensure Domain Name System (DNS) security (AWS) [Added]
- P1789: Unsecured Domain Name System (DNS) (Cloud) [Added]
- T2776: Use centralized identity and authentication system (AWS) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T2777: Protect identity and authentication systems (AWS) [Added]
- P1791: Unsecured identity and authentication systems (Cloud) [Added]
- T2778: Manage application identities securely and automatically (AWS) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T2779: Authenticate server and services (AWS) [Added]
- P1793: Unverified server identity (Cloud) [Added]
- T2780: Use single sign-on (SSO) for application access (AWS) [Added]
- P1794: Insufficient authentication protocols (Cloud) [Added]
- T2781: Use strong authentication controls (AWS) [Added]
- P1795: Weak password-based authentication (Cloud) [Added]
- T2782: Restrict resource access based on conditions (AWS) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T2783: Restrict the exposure of credentials and secrets (AWS) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T2784: Secure user access to existing applications (AWS) [Added]
- P1798: Unsecured access to legacy applications (Cloud) [Added]
- T2785: Separate and limit highly privileged/administrative users (AWS) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T2786: Avoid standing access for user accounts and permissions (AWS) [Added]
- P1800: Overly broad access permissions (Cloud) [Added]
- T2787: Manage lifecycle of identities and entitlements (AWS) [Added]
- P1801: Uncontrolled identity and access management (Cloud) [Added]
- T2788: Review and reconcile user access regularly (AWS) [Added]
- P1802: Unmonitored privileged access (Cloud) [Added]
- T2789: Set up emergency access (AWS) [Added]
- P1803: Insufficient emergency access management (Cloud) [Added]
- T2790: Use privileged access workstations (AWS) [Added]
- P1804: Insufficiently secured administrative access (Cloud) [Added]
- T2791: Follow just enough administration (least privilege) principle (AWS) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T2792: Determine access process for cloud provider support (AWS) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T2793: Discover, classify, and label sensitive data (AWS) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T2794: Monitor anomalies and threats targeting sensitive data (AWS) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T2795: Encrypt sensitive data in transit (AWS) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T2796: Enable data at rest encryption by default (AWS) [Added]
- P1810: Unprotected data at rest (Cloud) [Added]
- T2797: Use customer-managed key option in data at rest encryption when required (AWS) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T2798: Use a secure key management process (AWS) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T2799: Use a secure certificate management process (AWS) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T2800: Ensure security of key and certificate repository (AWS) [Added]
- P1814: Unsecured key and certificate repository (Cloud) [Added]
- T2801: Track asset inventory and their risks (AWS) [Added]
- P1815: Untracked and unmonitored cloud assets (Cloud) [Added]
- T2802: Use only approved services (AWS) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T2803: Ensure security of asset lifecycle management (AWS) [Added]
- P1817: Outdated security configurations (Cloud) [Added]
- T2804: Limit access to asset management (AWS) [Added]
- P1818: Unauthorized access to asset management (Cloud) [Added]
- T2805: Use only approved applications in virtual machine (AWS) [Added]
- P1819: Uncontrolled execution of unauthorized software (Cloud) [Added]
- T2806: Enable threat detection capabilities (AWS) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T2807: Enable threat detection for identity and access management (AWS) [Added]
- P1821: Unmonitored identity and access management systems (Cloud) [Added]
- T2808: Enable logging for security investigation (AWS) [Added]
- P1822: Insufficient logging and monitoring (Cloud) [Added]
- T2809: Enable network logging for security investigation (AWS) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T2810: Centralize security log management and analysis (AWS) [Added]
- P1824: Decentralized security log management (Cloud) [Added]
- T2811: Configure log storage retention (AWS) [Added]
- P1825: Insufficient log storage retention periods (Cloud) [Added]
- T2812: Use approved time synchronization sources (AWS) [Added]
- P1826: Unreliable logging timestamps (Cloud) [Added]
- T2813: Preparation - update incident response plan and handling process (AWS) [Added]
- P1827: Inadequate incident response planning (Cloud) [Added]
- T2814: Preparation - setup incident notification (AWS) [Added]
- P1828: Inadequate incident notification setup (Cloud) [Added]
- T2815: Detection and analysis - create incidents based on high-quality alerts (AWS) [Added]
- P1829: Insufficient alert quality management (Cloud) [Added]
- T2816: Detection and analysis - investigate an incident (AWS) [Added]
- P1830: Inadequate data collection and analysis (Cloud) [Added]
- T2817: Detection and analysis - prioritize incidents (AWS) [Added]
- P1831: Insufficient incident prioritization (Cloud) [Added]
- T2818: Containment, eradication and recovery - automate the incident handling (AWS) [Added]
- P1832: Inefficient manual incident handling processes (Cloud) [Added]
- T2819: Post-incident activity - conduct lessons learned and retain evidence (AWS) [Added]
- P1833: Failure to document incident response efforts (Cloud) [Added]
- T2820: Define and establish secure configurations (AWS) [Added]
- P1834: Inconsistent cloud resource configurations (Cloud) [Added]
- T2821: Audit and enforce secure configurations (AWS) [Added]
- P1835: Unsecured system configurations (Cloud) [Added]
- T2822: Define and establish secure configurations for compute resources (AWS) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T2823: Audit and enforce secure configurations for compute resources (AWS) [Added]
- P1837: Unsecured compute resource configurations (Cloud) [Added]
- T2824: Perform vulnerability assessments (AWS) [Added]
- P1838: Lack of vulnerability assessments (Cloud) [Added]
- T2825: Rapidly and automatically remediate vulnerabilities (AWS) [Added]
- P1839: Unpatched vulnerabilities in cloud resources (Cloud) [Added]
- T2826: Conduct regular red team operations (AWS) [Added]
- P1840: Overreliance on traditional vulnerability scanning (Cloud) [Added]
- T2827: Use Endpoint Detection and Response (EDR) (AWS) [Added]
- P1841: Unmonitored endpoint activity (Cloud) [Added]
- T2828: Use modern anti-malware software (AWS) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T2829: Ensure anti-malware software and signatures are updated (AWS) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T2830: Ensure regular automated backups (AWS) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T2831: Protect backup and recovery data (AWS) [Added]
- P1845: Unsecured backup and recovery data (Cloud) [Added]
- T2832: Monitor backups (AWS) [Added]
- P1846: Inadequate backup monitoring (Cloud) [Added]
- T2833: Regularly test backup (AWS) [Added]
- P1847: Inadequate backup verification (Cloud) [Added]
- T2834: Conduct threat modeling (AWS) [Added]
- P1848: Inadequate threat identification and mitigation (Cloud) [Added]
- T2835: Ensure software supply chain security (AWS) [Added]
- P1849: Unsecured software supply chain (Cloud) [Added]
- T2836: Secure DevOps infrastructure (AWS) [Added]
- P1850: Unsecured DevOps infrastructure (Cloud) [Added]
- T2837: Integrate static application security testing into DevOps pipeline (AWS) [Added]
- P1851: Insufficient code review and testing (Cloud) [Added]
- T2838: Integrate dynamic application security testing into DevOps pipeline (AWS) [Added]
- P1852: Insufficient security testing in CI/CD pipelines (Cloud) [Added]
- T2839: Enforce security of workload throughout DevOps lifecycle (AWS) [Added]
- P1853: Inadequate DevOps security practices (Cloud) [Added]
- T2840: Enable logging and monitoring in DevOps (AWS) [Added]
- P1854: Inadequate logging and monitoring in DevOps (Cloud) [Added]
- T2841: Align organization roles, responsibilities and accountabilities (AWS) [Added]
- P1855: Lack of defined security roles and responsibilities (Cloud) [Added]
- T2842: Define and implement enterprise segmentation/separation of duties strategy (AWS) [Added]
- P1856: Insufficient access control and segmentation (Cloud) [Added]
- T2843: Define and implement data protection strategy (AWS) [Added]
- P1857: Inadequate data protection strategy (Cloud) [Added]
- T2844: Define and implement network security strategy (AWS) [Added]
- P1858: Lack of unified network security strategy (Cloud) [Added]
- T2845: Define and implement security posture management strategy (AWS) [Added]
- P1859: Inadequate cloud security configuration (Cloud) [Added]
- T2846: Define and implement identity and privileged access strategy (AWS) [Added]
- P1860: Inadequate identity and access management (Cloud) [Added]
- T2847: Define and implement logging, threat detection and incident response strategy (AWS) [Added]
- P1861: Inadequate logging and incident response (Cloud) [Added]
- T2848: Define and implement backup and recovery strategy (AWS) [Added]
- P1862: Inadequate data backup and recovery processes (Cloud) [Added]
- T2849: Define and implement endpoint security strategy (AWS) [Added]
- P1863: Unsecured endpoints (Cloud) [Added]
- T2850: Define and implement DevOps security strategy (AWS) [Added]
- P1864: Inadequate DevOps security strategy (Cloud) [Added]
- T2851: Define and implement multi-cloud security strategy (AWS) [Added]
- P1865: Lack of unified cloud security management (Cloud) [Added]
- T2852: Establish network segmentation boundaries (GCP) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2853: Secure cloud native services with network controls (GCP) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T2854: Deploy firewall at the edge of enterprise network (GCP) [Added]
- P1782: Uncontrolled network access (Cloud) [Added]
- T2855: Deploy intrusion detection/intrusion prevention systems (IDS/IPS) (GCP) [Added]
- P1783: Unmonitored network traffic vulnerability (Cloud) [Added]
- T2856: Deploy DDOS protection (GCP) [Added]
- P1784: Insufficient traffic filtering and rate limiting (Cloud) [Added]
- T2857: Deploy web application firewall (GCP) [Added]
- P1785: Unprotected web applications (Cloud) [Added]
- T2858: Simplify network security configuration (GCP) [Added]
- P1786: Overly complex network security configurations (Cloud) [Added]
- T2859: Detect and disable insecure services and protocols (GCP) [Added]
- P1787: Outdated and vulnerable network services (Cloud) [Added]
- T2860: Connect on-premises or cloud network privately (GCP) [Added]
- P1788: Unsecured public network connections (Cloud) [Added]
- T2861: Ensure Domain Name System (DNS) security (GCP) [Added]
- P1789: Unsecured Domain Name System (DNS) (Cloud) [Added]
- T2862: Use centralized identity and authentication system (GCP) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T2863: Protect identity and authentication systems (GCP) [Added]
- P1791: Unsecured identity and authentication systems (Cloud) [Added]
- T2864: Manage application identities securely and automatically (GCP) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T2865: Authenticate server and services (GCP) [Added]
- P1793: Unverified server identity (Cloud) [Added]
- T2866: Use single sign-on (SSO) for application access (GCP) [Added]
- P1794: Insufficient authentication protocols (Cloud) [Added]
- T2867: Use strong authentication controls (GCP) [Added]
- P1795: Weak password-based authentication (Cloud) [Added]
- T2868: Restrict resource access based on conditions (GCP) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T2869: Restrict the exposure of credentials and secrets (GCP) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T2870: Secure user access to existing applications (GCP) [Added]
- P1798: Unsecured access to legacy applications (Cloud) [Added]
- T2871: Separate and limit highly privileged/administrative users (GCP) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T2872: Avoid standing access for user accounts and permissions (GCP) [Added]
- P1800: Overly broad access permissions (Cloud) [Added]
- T2873: Manage lifecycle of identities and entitlements (GCP) [Added]
- P1801: Uncontrolled identity and access management (Cloud) [Added]
- T2874: Review and reconcile user access regularly (GCP) [Added]
- P1802: Unmonitored privileged access (Cloud) [Added]
- T2875: Set up emergency access (GCP) [Added]
- P1803: Insufficient emergency access management (Cloud) [Added]
- T2876: Use privileged access workstations (GCP) [Added]
- P1804: Insufficiently secured administrative access (Cloud) [Added]
- T2877: Follow just enough administration (least privilege) principle (GCP) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T2878: Determine access process for cloud provider support (GCP) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T2879: Discover, classify, and label sensitive data (GCP) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T2880: Monitor anomalies and threats targeting sensitive data (GCP) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T2881: Encrypt sensitive data in transit (GCP) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T2882: Enable data at rest encryption by default (GCP) [Added]
- P1810: Unprotected data at rest (Cloud) [Added]
- T2883: Use customer-managed key option in data at rest encryption when required (GCP) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T2884: Use a secure key management process (GCP) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T2885: Use a secure certificate management process (GCP) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T2886: Ensure security of key and certificate repository (GCP) [Added]
- P1814: Unsecured key and certificate repository (Cloud) [Added]
- T2887: Track asset inventory and their risks (GCP) [Added]
- P1815: Untracked and unmonitored cloud assets (Cloud) [Added]
- T2888: Use only approved services (GCP) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T2889: Ensure security of asset lifecycle management (GCP) [Added]
- P1817: Outdated security configurations (Cloud) [Added]
- T2890: Limit access to asset management (GCP) [Added]
- P1818: Unauthorized access to asset management (Cloud) [Added]
- T2891: Use only approved applications in virtual machine (GCP) [Added]
- P1819: Uncontrolled execution of unauthorized software (Cloud) [Added]
- T2892: Enable threat detection capabilities (GCP) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T2893: Enable threat detection for identity and access management (GCP) [Added]
- P1821: Unmonitored identity and access management systems (Cloud) [Added]
- T2894: Enable logging for security investigation (GCP) [Added]
- P1822: Insufficient logging and monitoring (Cloud) [Added]
- T2895: Enable network logging for security investigation (GCP) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T2896: Centralize security log management and analysis (GCP) [Added]
- P1824: Decentralized security log management (Cloud) [Added]
- T2897: Configure log storage retention (GCP) [Added]
- P1825: Insufficient log storage retention periods (Cloud) [Added]
- T2898: Use approved time synchronization sources (GCP) [Added]
- P1826: Unreliable logging timestamps (Cloud) [Added]
- T2899: Preparation - update incident response plan and handling process (GCP) [Added]
- P1827: Inadequate incident response planning (Cloud) [Added]
- T2900: Preparation - setup incident notification (GCP) [Added]
- P1828: Inadequate incident notification setup (Cloud) [Added]
- T2901: Detection and analysis - create incidents based on high-quality alerts (GCP) [Added]
- P1829: Insufficient alert quality management (Cloud) [Added]
- T2902: Detection and analysis - investigate an incident (GCP) [Added]
- P1830: Inadequate data collection and analysis (Cloud) [Added]
- T2903: Detection and analysis - prioritize incidents (GCP) [Added]
- P1831: Insufficient incident prioritization (Cloud) [Added]
- T2904: Containment, eradication and recovery - automate the incident handling (GCP) [Added]
- P1832: Inefficient manual incident handling processes (Cloud) [Added]
- T2905: Post-incident activity - conduct lessons learned and retain evidence (GCP) [Added]
- P1833: Failure to document incident response efforts (Cloud) [Added]
- T2906: Define and establish secure configurations (GCP) [Added]
- P1834: Inconsistent cloud resource configurations (Cloud) [Added]
- T2907: Audit and enforce secure configurations (GCP) [Added]
- P1835: Unsecured system configurations (Cloud) [Added]
- T2908: Define and establish secure configurations for compute resources (GCP) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T2909: Audit and enforce secure configurations for compute resources (GCP) [Added]
- P1837: Unsecured compute resource configurations (Cloud) [Added]
- T2910: Perform vulnerability assessments (GCP) [Added]
- P1838: Lack of vulnerability assessments (Cloud) [Added]
- T2911: Rapidly and automatically remediate vulnerabilities (GCP) [Added]
- P1839: Unpatched vulnerabilities in cloud resources (Cloud) [Added]
- T2912: Conduct regular red team operations (GCP) [Added]
- P1840: Overreliance on traditional vulnerability scanning (Cloud) [Added]
- T2913: Use Endpoint Detection and Response (EDR) (GCP) [Added]
- P1841: Unmonitored endpoint activity (Cloud) [Added]
- T2914: Use modern anti-malware software (GCP) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T2915: Ensure anti-malware software and signatures are updated (GCP) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T2916: Ensure regular automated backups (GCP) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T2917: Protect backup and recovery data (GCP) [Added]
- P1845: Unsecured backup and recovery data (Cloud) [Added]
- T2918: Monitor backups (GCP) [Added]
- P1846: Inadequate backup monitoring (Cloud) [Added]
- T2919: Regularly test backup (GCP) [Added]
- P1847: Inadequate backup verification (Cloud) [Added]
- T2920: Conduct threat modeling (GCP) [Added]
- P1848: Inadequate threat identification and mitigation (Cloud) [Added]
- T2921: Ensure software supply chain security (GCP) [Added]
- P1849: Unsecured software supply chain (Cloud) [Added]
- T2922: Secure DevOps infrastructure (GCP) [Added]
- P1850: Unsecured DevOps infrastructure (Cloud) [Added]
- T2923: Integrate static application security testing into DevOps pipeline (GCP) [Added]
- P1851: Insufficient code review and testing (Cloud) [Added]
- T2924: Integrate dynamic application security testing into DevOps pipeline (GCP) [Added]
- P1852: Insufficient security testing in CI/CD pipelines (Cloud) [Added]
- T2925: Enforce security of workload throughout DevOps lifecycle (GCP) [Added]
- P1853: Inadequate DevOps security practices (Cloud) [Added]
- T2926: Enable logging and monitoring in DevOps (GCP) [Added]
- P1854: Inadequate logging and monitoring in DevOps (Cloud) [Added]
- T2927: Align organization roles, responsibilities and accountabilities (GCP) [Added]
- P1855: Lack of defined security roles and responsibilities (Cloud) [Added]
- T2928: Define and implement enterprise segmentation/separation of duties strategy (GCP) [Added]
- P1856: Insufficient access control and segmentation (Cloud) [Added]
- T2929: Define and implement data protection strategy (GCP) [Added]
- P1857: Inadequate data protection strategy (Cloud) [Added]
- T2930: Define and implement network security strategy (GCP) [Added]
- P1858: Lack of unified network security strategy (Cloud) [Added]
- T2931: Define and implement security posture management strategy (GCP) [Added]
- P1859: Inadequate cloud security configuration (Cloud) [Added]
- T2932: Define and implement identity and privileged access strategy (GCP) [Added]
- P1860: Inadequate identity and access management (Cloud) [Added]
- T2933: Define and implement logging, threat detection and incident response strategy (GCP) [Added]
- P1861: Inadequate logging and incident response (Cloud) [Added]
- T2934: Define and implement backup and recovery strategy (GCP) [Added]
- P1862: Inadequate data backup and recovery processes (Cloud) [Added]
- T2935: Define and implement endpoint security strategy (GCP) [Added]
- P1863: Unsecured endpoints (Cloud) [Added]
- T2936: Define and implement DevOps security strategy (GCP) [Added]
- P1864: Inadequate DevOps security strategy (Cloud) [Added]
- T2937: Define and implement multi-cloud security strategy (GCP) [Added]
- P1865: Lack of unified cloud security management (Cloud) [Added]
- T2938: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Bastion) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T2939: Configure Azure Policy Support (Azure Bastion) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T2940: Configure Key Management in Azure Key Vault (Azure Bastion) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T2941: Configure Network Security Group Support (Azure Bastion) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2942: Configure Azure Resource Logs (Azure Bastion) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T2943: Configure Virtual Network Integration (Azure Bastion) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2944: Configure Azure Policy Support (Azure Key Vault Managed HSM) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T2945: Configure Conditional Access for Data Plane (Azure Key Vault Managed HSM) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T2946: Configure Data at Rest Encryption Using CMK (Azure Key Vault Managed HSM) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T2947: Configure Disable Public Network Access (Azure Key Vault Managed HSM) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T2948: Configure Key Management in Azure Key Vault (Azure Key Vault Managed HSM) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T2949: Configure Service Native Backup Capability (Azure Key Vault Managed HSM) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T2950: Configure Azure Private Link (Azure Key Vault Managed HSM) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T2951: Configure Azure Resource Logs (Azure Key Vault Managed HSM) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T2952: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Databricks) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T2953: Configure Azure Policy Support (Azure Databricks) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T2954: Configure Customer Lockbox (Azure Databricks) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T2955: Configure Data at Rest Encryption Using CMK (Azure Databricks) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T2956: Configure Data in Transit Encryption (Azure Databricks) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T2957: Configure Disable Public Network Access (Azure Databricks) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T2958: Configure Key Management in Azure Key Vault (Azure Databricks) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T2959: Configure Service Native Backup Capability (Azure Databricks) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T2960: Configure Network Security Group Support (Azure Databricks) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2961: Configure Azure Resource Logs (Azure Databricks) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T2962: Configure Service Principals (Azure Databricks) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T2963: Configure Virtual Network Integration (Azure Databricks) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2964: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Key Vault) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T2965: Configure Azure Policy Support (Azure Key Vault) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T2966: Configure Azure RBAC for Data Plane (Azure Key Vault) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T2967: Configure Certificate Management in Azure Key Vault (Azure Key Vault) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T2968: Configure Conditional Access for Data Plane (Azure Key Vault) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T2969: Configure Data at Rest Encryption Using CMK (Azure Key Vault) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T2970: Configure Microsoft Defender for Service / Product Offering (Azure Key Vault) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T2971: Configure Disable Public Network Access (Azure Key Vault) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T2972: Configure Key Management in Azure Key Vault (Azure Key Vault) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T2973: Configure Managed Identities (Azure Key Vault) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T2974: Configure Service Native Backup Capability (Azure Key Vault) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T2975: Configure Network Security Group Support (Azure Key Vault) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2976: Configure Azure Private Link (Azure Key Vault) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T2977: Configure Azure Resource Logs (Azure Key Vault) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T2978: Configure Service Principals (Azure Key Vault) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T2979: Configure Virtual Network Integration (Azure Key Vault) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2980: Configure Azure RBAC for Data Plane (Azure Resource Mover) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T2981: Configure Managed Identities (Azure Resource Mover) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T2982: Configure Service Principals (Azure Resource Mover) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T2983: Configure Azure AD Authentication Required for Data Plane Access (Azure Database for MySQL) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T2984: Configure Conditional Access for Data Plane (Azure Database for MySQL) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T2985: Configure Customer Lockbox (Azure Database for MySQL) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T2986: Configure Data at Rest Encryption Using CMK (Azure Database for MySQL) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T2987: Configure Disable Public Network Access (Azure Database for MySQL) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T2988: Configure Key Management in Azure Key Vault (Azure Database for MySQL) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T2989: Configure Network Security Group Support (Azure Database for MySQL) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2990: Configure Azure Resource Logs (Azure Database for MySQL) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T2991: Configure Virtual Network Integration (Azure Database for MySQL) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2992: Configure Azure AD Authentication Required for Data Plane Access (Azure Spring Apps) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T2993: Configure Azure RBAC for Data Plane (Azure Spring Apps) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T2994: Configure Certificate Management in Azure Key Vault (Azure Spring Apps) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T2995: Configure Customer Lockbox (Azure Spring Apps) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T2996: Configure Managed Identities (Azure Spring Apps) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T2997: Configure Network Security Group Support (Azure Spring Apps) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T2998: Configure Azure Resource Logs (Azure Spring Apps) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T2999: Configure Service Principals (Azure Spring Apps) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3000: Configure Virtual Network Integration (Azure Spring Apps) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3001: Configure Azure Policy Support (Azure Virtual Network) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3002: Configure Azure Resource Logs (Azure Virtual Network) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3003: Configure Azure AD Authentication Required for Data Plane Access (Azure Functions) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3004: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Functions) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3005: Configure Azure Policy Support (Azure Functions) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3006: Configure Azure RBAC for Data Plane (Azure Functions) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3007: Configure Certificate Management in Azure Key Vault (Azure Functions) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3008: Configure Conditional Access for Data Plane (Azure Functions) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3009: Configure Customer Lockbox (Azure Functions) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3010: Configure Data at Rest Encryption Using CMK (Azure Functions) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3011: Configure Data in Transit Encryption (Azure Functions) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3012: Configure Microsoft Defender for Service / Product Offering (Azure Functions) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3013: Configure Disable Public Network Access (Azure Functions) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3014: Configure Key Management in Azure Key Vault (Azure Functions) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3015: Configure Managed Identities (Azure Functions) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3016: Configure Service Native Backup Capability (Azure Functions) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3017: Configure Network Security Group Support (Azure Functions) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3018: Configure Azure Private Link (Azure Functions) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3019: Configure Azure Resource Logs (Azure Functions) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3020: Configure Service Principals (Azure Functions) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3021: Configure Virtual Network Integration (Azure Functions) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3022: Configure Azure AD Authentication Required for Data Plane Access (Azure DevTest Labs) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3023: Configure Microsoft Defender for Cloud - Adaptive Application Controls (Azure DevTest Labs) [Added]
- P1819: Uncontrolled execution of unauthorized software (Cloud) [Added]
- T3024: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure DevTest Labs) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3025: Configure Anti-Malware Solution (Azure DevTest Labs) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T3026: Configure Anti-Malware Solution Health Monitoring (Azure DevTest Labs) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T3027: Configure Azure Automation State Configuration (Azure DevTest Labs) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3028: Configure Azure Automation Update Management (Azure DevTest Labs) [Added]
- P1839: Unpatched vulnerabilities in cloud resources (Cloud) [Added]
- T3029: Configure Azure Backup (Azure DevTest Labs) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3030: Configure Azure Policy Guest Configuration Agent (Azure DevTest Labs) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3031: Configure Azure Policy Support (Azure DevTest Labs) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3032: Configure Azure RBAC for Data Plane (Azure DevTest Labs) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3033: Configure Certificate Management in Azure Key Vault (Azure DevTest Labs) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3034: Configure Conditional Access for Data Plane (Azure DevTest Labs) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3035: Configure Disable Public Network Access (Azure DevTest Labs) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3036: Configure Key Management in Azure Key Vault (Azure DevTest Labs) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3037: Configure Managed Identities (Azure DevTest Labs) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3038: Configure Network Security Group Support (Azure DevTest Labs) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3039: Configure Service Principals (Azure DevTest Labs) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3040: Configure Vulnerability Assessment using Microsoft Defender (Azure DevTest Labs) [Added]
- P1838: Lack of vulnerability assessments (Cloud) [Added]
- T3041: Configure Azure Policy Support (Azure Load Balancer) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3042: Configure Network Security Group Support (Azure Load Balancer) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3043: Configure Virtual Network Integration (Azure Load Balancer) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3044: Configure Azure Policy Support (Azure Content Delivery Network) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3045: Configure Azure RBAC for Data Plane (Azure Content Delivery Network) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3046: Configure Certificate Management in Azure Key Vault (Azure Content Delivery Network) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3047: Configure Data in Transit Encryption (Azure Content Delivery Network) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3048: Configure Azure Resource Logs (Azure Content Delivery Network) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3049: Configure Azure Policy Support (Azure Private Link) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3050: Configure Network Security Group Support (Azure Private Link) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3051: Configure Azure Policy Support (Azure Digital Twins) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3052: Configure Azure RBAC for Data Plane (Azure Digital Twins) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3053: Configure Conditional Access for Data Plane (Azure Digital Twins) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3054: Configure Disable Public Network Access (Azure Digital Twins) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3055: Configure Managed Identities (Azure Digital Twins) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3056: Configure Azure Private Link (Azure Digital Twins) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3057: Configure Azure Resource Logs (Azure Digital Twins) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3058: Configure Service Principals (Azure Digital Twins) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3059: Configure Azure AD Authentication Required for Data Plane Access (Azure Kubernetes Service (AKS)) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3060: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Kubernetes Service (AKS)) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3061: Configure Azure Backup (Azure Kubernetes Service (AKS)) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3062: Configure Azure Policy Support (Azure Kubernetes Service (AKS)) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3063: Configure Azure RBAC for Data Plane (Azure Kubernetes Service (AKS)) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3064: Configure Certificate Management in Azure Key Vault (Azure Kubernetes Service (AKS)) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3065: Configure Conditional Access for Data Plane (Azure Kubernetes Service (AKS)) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3066: Configure Customer Lockbox (Azure Kubernetes Service (AKS)) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3067: Configure Data at Rest Encryption Using CMK (Azure Kubernetes Service (AKS)) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3068: Configure Data at Rest Encryption Using Platform Keys (Azure Kubernetes Service (AKS)) [Added]
- P1810: Unprotected data at rest (Cloud) [Added]
- T3069: Configure Data in Transit Encryption (Azure Kubernetes Service (AKS)) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3070: Configure Data Leakage/Loss Prevention (Azure Kubernetes Service (AKS)) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3071: Configure Microsoft Defender for Service / Product Offering (Azure Kubernetes Service (AKS)) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3072: Configure Disable Public Network Access (Azure Kubernetes Service (AKS)) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3073: Configure Key Management in Azure Key Vault (Azure Kubernetes Service (AKS)) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3074: Configure Local Admin Accounts (Azure Kubernetes Service (AKS)) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T3075: Configure Local Authentication Methods for Data Plane Access (Azure Kubernetes Service (AKS)) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3076: Configure Azure Private Link (Azure Kubernetes Service (AKS)) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3077: Configure Azure Resource Logs (Azure Kubernetes Service (AKS)) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3078: Configure Service Principals (Azure Kubernetes Service (AKS)) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3079: Configure Azure AD Authentication Required for Data Plane Access (Azure Media Services) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3080: Configure Azure Policy Support (Azure Media Services) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3081: Configure Azure RBAC for Data Plane (Azure Media Services) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3082: Configure Data at Rest Encryption Using CMK (Azure Media Services) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3083: Configure Disable Public Network Access (Azure Media Services) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3084: Configure Azure Private Link (Azure Media Services) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3085: Configure Azure Resource Logs (Azure Media Services) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3086: Configure Service Principals (Azure Media Services) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3087: Configure Azure Policy Support (Azure Data Lake Analytics) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3088: Configure Disable Public Network Access (Azure Data Lake Analytics) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3089: Configure Azure Policy Support (Azure Firewall Manager) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3090: Configure Certificate Management in Azure Key Vault (Azure Firewall Manager) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3091: Configure Azure AD Authentication Required for Data Plane Access (Azure IoT Central) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3092: Configure Azure Policy Support (Azure IoT Central) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3093: Configure Disable Public Network Access (Azure IoT Central) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3094: Configure Local Authentication Methods for Data Plane Access (Azure IoT Central) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3095: Configure Managed Identities (Azure IoT Central) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3096: Configure Azure Private Link (Azure IoT Central) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3097: Configure Service Principals (Azure IoT Central) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3098: Configure Azure AD Authentication Required for Data Plane Access (Azure Virtual Desktop) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3099: Configure Anti-Malware Solution (Azure Virtual Desktop) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T3100: Configure Anti-Malware Solution Health Monitoring (Azure Virtual Desktop) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T3101: Configure Azure Backup (Azure Virtual Desktop) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3102: Configure Azure Policy Support (Azure Virtual Desktop) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3103: Configure Azure RBAC for Data Plane (Azure Virtual Desktop) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3104: Configure Conditional Access for Data Plane (Azure Virtual Desktop) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3105: Configure Custom VM Images (Azure Virtual Desktop) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3106: Configure Data Leakage/Loss Prevention (Azure Virtual Desktop) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3107: Configure Microsoft Defender for Service / Product Offering (Azure Virtual Desktop) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3108: Configure EDR Solution (Azure Virtual Desktop) [Added]
- P1841: Unmonitored endpoint activity (Cloud) [Added]
- T3109: Configure Local Admin Accounts (Azure Virtual Desktop) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T3110: Configure Managed Identities (Azure Virtual Desktop) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3111: Configure Network Security Group Support (Azure Virtual Desktop) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3112: Configure Azure Private Link (Azure Virtual Desktop) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3113: Configure Azure Resource Logs (Azure Virtual Desktop) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3114: Configure Sensitive Data Discovery and Classification (Azure Virtual Desktop) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3115: Configure Service Principals (Azure Virtual Desktop) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3116: Configure Virtual Network Integration (Azure Virtual Desktop) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3117: Configure Vulnerability Assessment using Microsoft Defender (Azure Virtual Desktop) [Added]
- P1838: Lack of vulnerability assessments (Cloud) [Added]
- T3118: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Stack Edge) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3119: Configure Azure Backup (Azure Stack Edge) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3120: Configure Azure Policy Support (Azure Stack Edge) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3121: Configure Data at Rest Encryption Using CMK (Azure Stack Edge) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3122: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Application Gateway) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3123: Configure Azure Policy Support (Azure Application Gateway) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3124: Configure Certificate Management in Azure Key Vault (Azure Application Gateway) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3125: Configure Data in Transit Encryption (Azure Application Gateway) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3126: Configure Network Security Group Support (Azure Application Gateway) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3127: Configure Azure Private Link (Azure Application Gateway) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3128: Configure Azure Resource Logs (Azure Application Gateway) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3129: Configure Azure AD Authentication Required for Data Plane Access (Azure Web PubSub) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3130: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Web PubSub) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3131: Configure Azure Policy Support (Azure Web PubSub) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3132: Configure Azure RBAC for Data Plane (Azure Web PubSub) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3133: Configure Conditional Access for Data Plane (Azure Web PubSub) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3134: Configure Disable Public Network Access (Azure Web PubSub) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3135: Configure Key Management in Azure Key Vault (Azure Web PubSub) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3136: Configure Managed Identities (Azure Web PubSub) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3137: Configure Azure Private Link (Azure Web PubSub) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3138: Configure Azure Resource Logs (Azure Web PubSub) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3139: Configure Service Principals (Azure Web PubSub) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3140: Configure Azure AD Authentication Required for Data Plane Access (Azure Container Apps) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3141: Configure Azure Policy Support (Azure Container Apps) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3142: Configure Data in Transit Encryption (Azure Container Apps) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3143: Configure Disable Public Network Access (Azure Container Apps) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3144: Configure Managed Identities (Azure Container Apps) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3145: Configure Network Security Group Support (Azure Container Apps) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3146: Configure Service Principals (Azure Container Apps) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3147: Configure Virtual Network Integration (Azure Container Apps) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3148: Configure Azure AD Authentication Required for Data Plane Access (Azure Purview) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3149: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Purview) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3150: Configure Azure Policy Support (Azure Purview) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3151: Configure Azure RBAC for Data Plane (Azure Purview) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3152: Configure Conditional Access for Data Plane (Azure Purview) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3153: Configure Disable Public Network Access (Azure Purview) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3154: Configure Key Management in Azure Key Vault (Azure Purview) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3155: Configure Managed Identities (Azure Purview) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3156: Configure Network Security Group Support (Azure Purview) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3157: Configure Azure Private Link (Azure Purview) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3158: Configure Azure Resource Logs (Azure Purview) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3159: Configure Service Principals (Azure Purview) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3160: Configure Virtual Network Integration (Azure Purview) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3161: Configure Azure AD Authentication Required for Data Plane Access (Azure VPN Gateway) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3162: Configure Azure Policy Support (Azure VPN Gateway) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3163: Configure Conditional Access for Data Plane (Azure VPN Gateway) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3164: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Virtual WAN) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3165: Configure Azure Policy Support (Azure Virtual WAN) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3166: Configure Data in Transit Encryption (Azure Virtual WAN) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3167: Configure Key Management in Azure Key Vault (Azure Virtual WAN) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3168: Configure Azure Resource Logs (Azure Virtual WAN) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3169: Configure Azure AD Authentication Required for Data Plane Access (Azure Site Recovery) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3170: Configure Azure Policy Support (Azure Site Recovery) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3171: Configure Azure RBAC for Data Plane (Azure Site Recovery) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3172: Configure Certificate Management in Azure Key Vault (Azure Site Recovery) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3173: Configure Data at Rest Encryption Using CMK (Azure Site Recovery) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3174: Configure Key Management in Azure Key Vault (Azure Site Recovery) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3175: Configure Azure Private Link (Azure Site Recovery) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3176: Configure Azure Resource Logs (Azure Site Recovery) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3177: Configure Service Principals (Azure Site Recovery) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3178: Configure Conditional Access for Data Plane (Azure Analysis Services) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3179: Configure Managed Identities (Azure Analysis Services) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3180: Configure Service Native Backup Capability (Azure Analysis Services) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3181: Configure Azure Resource Logs (Azure Analysis Services) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3182: Configure Service Principals (Azure Analysis Services) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3183: Configure Azure Policy Support (Azure Data Box) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3184: Configure Azure RBAC for Data Plane (Azure Data Box) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3185: Configure Customer Lockbox (Azure Data Box) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3186: Configure Data at Rest Encryption Using CMK (Azure Data Box) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3187: Configure Azure Policy Support (Azure Container Instances) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3188: Configure Azure RBAC for Data Plane (Azure Container Instances) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3189: Configure Conditional Access for Data Plane (Azure Container Instances) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3190: Configure Data at Rest Encryption Using CMK (Azure Container Instances) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3191: Configure Data at Rest Encryption Using Platform Keys (Azure Container Instances) [Added]
- P1810: Unprotected data at rest (Cloud) [Added]
- T3192: Configure Key Management in Azure Key Vault (Azure Container Instances) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3193: Configure Managed Identities (Azure Container Instances) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3194: Configure Network Security Group Support (Azure Container Instances) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3195: Configure Azure Resource Logs (Azure Container Instances) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3196: Configure Virtual Network Integration (Azure Container Instances) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3197: Configure Azure Policy Support (Azure Arc) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3198: Configure Microsoft Defender for Service / Product Offering (Azure Arc) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3199: Configure Disable Public Network Access (Azure Arc) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3200: Configure Local Admin Accounts (Azure Arc) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T3201: Configure Local Authentication Methods for Data Plane Access (Azure Arc) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3202: Configure Azure Private Link (Azure Arc) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3203: Configure Service Principals (Azure Arc) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3204: Configure Azure AD Authentication Required for Data Plane Access (Azure Logic Apps) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3205: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Logic Apps) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3206: Configure Azure Policy Support (Azure Logic Apps) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3207: Configure Certificate Management in Azure Key Vault (Azure Logic Apps) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3208: Configure Customer Lockbox (Azure Logic Apps) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3209: Configure Data at Rest Encryption Using CMK (Azure Logic Apps) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3210: Configure Microsoft Defender for Service / Product Offering (Azure Logic Apps) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3211: Configure Disable Public Network Access (Azure Logic Apps) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3212: Configure Key Management in Azure Key Vault (Azure Logic Apps) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3213: Configure Local Authentication Methods for Data Plane Access (Azure Logic Apps) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3214: Configure Managed Identities (Azure Logic Apps) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3215: Configure Network Security Group Support (Azure Logic Apps) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3216: Configure Azure Private Link (Azure Logic Apps) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3217: Configure Azure Resource Logs (Azure Logic Apps) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3218: Configure Service Principals (Azure Logic Apps) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3219: Configure Virtual Network Integration (Azure Logic Apps) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3220: Configure Azure Policy Support (Azure Monitor) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3221: Configure Conditional Access for Data Plane (Azure Monitor) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3222: Configure Customer Lockbox (Azure Monitor) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3223: Configure Data at Rest Encryption Using CMK (Azure Monitor) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3224: Configure Data in Transit Encryption (Azure Monitor) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3225: Configure Disable Public Network Access (Azure Monitor) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3226: Configure Managed Identities (Azure Monitor) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3227: Configure Network Security Group Support (Azure Monitor) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3228: Configure Azure Private Link (Azure Monitor) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3229: Configure Service Principals (Azure Monitor) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3230: Configure Virtual Network Integration (Azure Monitor) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3231: Configure Azure AD Authentication Required for Data Plane Access (Azure App Configuration) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3232: Configure Azure Policy Support (Azure App Configuration) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3233: Configure Azure RBAC for Data Plane (Azure App Configuration) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3234: Configure Conditional Access for Data Plane (Azure App Configuration) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3235: Configure Data at Rest Encryption Using CMK (Azure App Configuration) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3236: Configure Disable Public Network Access (Azure App Configuration) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3237: Configure Managed Identities (Azure App Configuration) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3238: Configure Network Security Group Support (Azure App Configuration) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3239: Configure Azure Private Link (Azure App Configuration) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3240: Configure Azure Resource Logs (Azure App Configuration) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3241: Configure Service Principals (Azure App Configuration) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3242: Configure Virtual Network Integration (Azure App Configuration) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3243: Configure Azure AD Authentication Required for Data Plane Access (Azure API Management) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3244: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure API Management) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3245: Configure Azure Policy Support (Azure API Management) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3246: Configure Azure RBAC for Data Plane (Azure API Management) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3247: Configure Certificate Management in Azure Key Vault (Azure API Management) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3248: Configure Customer Lockbox (Azure API Management) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3249: Configure Disable Public Network Access (Azure API Management) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3250: Configure Key Management in Azure Key Vault (Azure API Management) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3251: Configure Local Admin Accounts (Azure API Management) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T3252: Configure Local Authentication Methods for Data Plane Access (Azure API Management) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3253: Configure Managed Identities (Azure API Management) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3254: Configure Service Native Backup Capability (Azure API Management) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3255: Configure Network Security Group Support (Azure API Management) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3256: Configure Azure Private Link (Azure API Management) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3257: Configure Azure Resource Logs (Azure API Management) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3258: Configure Service Principals (Azure API Management) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3259: Configure Virtual Network Integration (Azure API Management) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3260: Configure Azure AD Authentication Required for Data Plane Access (Azure Windows Virtual Machines) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3261: Configure Microsoft Defender for Cloud - Adaptive Application Controls (Azure Windows Virtual Machines) [Added]
- P1819: Uncontrolled execution of unauthorized software (Cloud) [Added]
- T3262: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Windows Virtual Machines) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3263: Configure Anti-Malware Solution (Azure Windows Virtual Machines) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T3264: Configure Anti-Malware Solution Health Monitoring (Azure Windows Virtual Machines) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T3265: Configure Azure Automation State Configuration (Azure Windows Virtual Machines) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3266: Configure Azure Automation Update Management (Azure Windows Virtual Machines) [Added]
- P1839: Unpatched vulnerabilities in cloud resources (Cloud) [Added]
- T3267: Configure Azure Backup (Azure Windows Virtual Machines) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3268: Configure Azure Policy Guest Configuration Agent (Azure Windows Virtual Machines) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3269: Configure Azure Policy Support (Azure Windows Virtual Machines) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3270: Configure Azure RBAC for Data Plane (Azure Windows Virtual Machines) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3271: Configure Conditional Access for Data Plane (Azure Windows Virtual Machines) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3272: Configure Customer Lockbox (Azure Windows Virtual Machines) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3273: Configure Custom VM Images (Azure Windows Virtual Machines) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3274: Configure Data at Rest Encryption Using CMK (Azure Windows Virtual Machines) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3275: Configure Data in Transit Encryption (Azure Windows Virtual Machines) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3276: Configure Microsoft Defender for Service / Product Offering (Azure Windows Virtual Machines) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3277: Configure Disable Public Network Access (Azure Windows Virtual Machines) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3278: Configure EDR Solution (Azure Windows Virtual Machines) [Added]
- P1841: Unmonitored endpoint activity (Cloud) [Added]
- T3279: Configure Key Management in Azure Key Vault (Azure Windows Virtual Machines) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3280: Configure Managed Identities (Azure Windows Virtual Machines) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3281: Configure Network Security Group Support (Azure Windows Virtual Machines) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3282: Configure Azure Resource Logs (Azure Windows Virtual Machines) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3283: Configure Service Principals (Azure Windows Virtual Machines) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3284: Configure Vulnerability Assessment using Microsoft Defender (Azure Windows Virtual Machines) [Added]
- P1838: Lack of vulnerability assessments (Cloud) [Added]
- T3285: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Front Door) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3286: Configure Certificate Management in Azure Key Vault (Azure Front Door) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3287: Configure Key Management in Azure Key Vault (Azure Front Door) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3288: Configure Azure Private Link (Azure Front Door) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3289: Configure Azure Resource Logs (Azure Front Door) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3290: Configure Azure AD Authentication Required for Data Plane Access (Azure Data Factory) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3291: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Data Factory) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3292: Configure Azure Policy Support (Azure Data Factory) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3293: Configure Certificate Management in Azure Key Vault (Azure Data Factory) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3294: Configure Conditional Access for Data Plane (Azure Data Factory) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3295: Configure Customer Lockbox (Azure Data Factory) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3296: Configure Data at Rest Encryption Using CMK (Azure Data Factory) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3297: Configure Disable Public Network Access (Azure Data Factory) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3298: Configure Key Management in Azure Key Vault (Azure Data Factory) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3299: Configure Local Authentication Methods for Data Plane Access (Azure Data Factory) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3300: Configure Managed Identities (Azure Data Factory) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3301: Configure Service Native Backup Capability (Azure Data Factory) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3302: Configure Network Security Group Support (Azure Data Factory) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3303: Configure Azure Private Link (Azure Data Factory) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3304: Configure Sensitive Data Discovery and Classification (Azure Data Factory) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3305: Configure Service Principals (Azure Data Factory) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3306: Configure Virtual Network Integration (Azure Data Factory) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3307: Configure Azure AD Authentication Required for Data Plane Access (Azure Remote Rendering) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3308: Configure Azure RBAC for Data Plane (Azure Remote Rendering) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3309: Configure Service Principals (Azure Remote Rendering) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3310: Configure Azure Policy Support (Azure DDoS Protection) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3311: Configure Azure Resource Logs (Azure DDoS Protection) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3312: Configure Azure Policy Support (Azure Traffic Manager) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3313: Configure Azure Resource Logs (Azure Traffic Manager) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3314: Configure Azure Policy Support (Azure DNS) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3315: Configure Azure RBAC for Data Plane (Azure DNS) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3316: Configure Microsoft Defender for Service / Product Offering (Azure DNS) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3317: Configure Azure Resource Logs (Azure DNS) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3318: Configure Azure Policy Support (Azure Container Registry) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3319: Configure Customer Lockbox (Azure Container Registry) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3320: Configure Data at Rest Encryption Using CMK (Azure Container Registry) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3321: Configure Data Leakage/Loss Prevention (Azure Container Registry) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3322: Configure Microsoft Defender for Service / Product Offering (Azure Container Registry) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3323: Configure Disable Public Network Access (Azure Container Registry) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3324: Configure Local Admin Accounts (Azure Container Registry) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T3325: Configure Local Authentication Methods for Data Plane Access (Azure Container Registry) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3326: Configure Managed Identities (Azure Container Registry) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3327: Configure Azure Private Link (Azure Container Registry) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3328: Configure Azure Resource Logs (Azure Container Registry) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3329: Configure Service Principals (Azure Container Registry) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3330: Configure Azure Policy Support (Azure Data Share) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3331: Configure Azure Resource Logs (Azure Data Share) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3332: Configure Azure AD Authentication Required for Data Plane Access (Azure Event Hubs) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3333: Configure Azure Policy Support (Azure Event Hubs) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3334: Configure Azure RBAC for Data Plane (Azure Event Hubs) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3335: Configure Conditional Access for Data Plane (Azure Event Hubs) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3336: Configure Data at Rest Encryption Using CMK (Azure Event Hubs) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3337: Configure Key Management in Azure Key Vault (Azure Event Hubs) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3338: Configure Managed Identities (Azure Event Hubs) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3339: Configure Network Security Group Support (Azure Event Hubs) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3340: Configure Azure Private Link (Azure Event Hubs) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3341: Configure Azure Resource Logs (Azure Event Hubs) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3342: Configure Service Principals (Azure Event Hubs) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3343: Configure Virtual Network Integration (Azure Event Hubs) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3344: Configure Azure AD Authentication Required for Data Plane Access (Azure Network Watcher) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3345: Configure Azure Policy Support (Azure Network Watcher) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3346: Configure Azure RBAC for Data Plane (Azure Network Watcher) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3347: Configure Azure Policy Support (Azure Defender for Cloud) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3348: Configure Azure RBAC for Data Plane (Azure Defender for Cloud) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3349: Configure Conditional Access for Data Plane (Azure Defender for Cloud) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3350: Configure Data at Rest Encryption Using CMK (Azure Defender for Cloud) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3351: Configure Key Management in Azure Key Vault (Azure Defender for Cloud) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3352: Configure Managed Identities (Azure Defender for Cloud) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3353: Configure Service Principals (Azure Defender for Cloud) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3354: Configure Azure Policy Support (Azure Cache for Redis) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3355: Configure Network Security Group Support (Azure Cache for Redis) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3356: Configure Azure Private Link (Azure Cache for Redis) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3357: Configure Azure Resource Logs (Azure Cache for Redis) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3358: Configure Virtual Network Integration (Azure Cache for Redis) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3359: Configure Azure RBAC for Data Plane (Azure Database Migration Service) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3360: Configure Network Security Group Support (Azure Database Migration Service) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3361: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Machine Learning) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3362: Configure Anti-Malware Solution (Azure Machine Learning) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T3363: Configure Anti-Malware Solution Health Monitoring (Azure Machine Learning) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T3364: Configure Azure Policy Guest Configuration Agent (Azure Machine Learning) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3365: Configure Azure Policy Support (Azure Machine Learning) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3366: Configure Azure RBAC for Data Plane (Azure Machine Learning) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3367: Configure Conditional Access for Data Plane (Azure Machine Learning) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3368: Configure Custom Containers Images (Azure Machine Learning) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3369: Configure Data at Rest Encryption Using CMK (Azure Machine Learning) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3370: Configure Data Leakage/Loss Prevention (Azure Machine Learning) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3371: Configure Disable Public Network Access (Azure Machine Learning) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3372: Configure Key Management in Azure Key Vault (Azure Machine Learning) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3373: Configure Managed Identities (Azure Machine Learning) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3374: Configure Network Security Group Support (Azure Machine Learning) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3375: Configure Azure Private Link (Azure Machine Learning) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3376: Configure Azure Resource Logs (Azure Machine Learning) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3377: Configure Sensitive Data Discovery and Classification (Azure Machine Learning) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3378: Configure Service Principals (Azure Machine Learning) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3379: Configure Virtual Network Integration (Azure Machine Learning) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3380: Configure Certificate Management in Azure Key Vault (Azure Automation) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3381: Configure Data at Rest Encryption Using CMK (Azure Automation) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3382: Configure Disable Public Network Access (Azure Automation) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3383: Configure Key Management in Azure Key Vault (Azure Automation) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3384: Configure Local Authentication Methods for Data Plane Access (Azure Automation) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3385: Configure Azure Private Link (Azure Automation) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3386: Configure Azure Resource Logs (Azure Automation) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3387: Configure Virtual Network Integration (Azure Automation) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3388: Configure Azure AD Authentication Required for Data Plane Access (Azure Linux Virtual Machines) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3389: Configure Microsoft Defender for Cloud - Adaptive Application Controls (Azure Linux Virtual Machines) [Added]
- P1819: Uncontrolled execution of unauthorized software (Cloud) [Added]
- T3390: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Linux Virtual Machines) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3391: Configure Anti-Malware Solution (Azure Linux Virtual Machines) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T3392: Configure Anti-Malware Solution Health Monitoring (Azure Linux Virtual Machines) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T3393: Configure Azure Automation State Configuration (Azure Linux Virtual Machines) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3394: Configure Azure Automation Update Management (Azure Linux Virtual Machines) [Added]
- P1839: Unpatched vulnerabilities in cloud resources (Cloud) [Added]
- T3395: Configure Azure Backup (Azure Linux Virtual Machines) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3396: Configure Azure Policy Guest Configuration Agent (Azure Linux Virtual Machines) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3397: Configure Azure Policy Support (Azure Linux Virtual Machines) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3398: Configure Azure RBAC for Data Plane (Azure Linux Virtual Machines) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3399: Configure Conditional Access for Data Plane (Azure Linux Virtual Machines) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3400: Configure Customer Lockbox (Azure Linux Virtual Machines) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3401: Configure Custom VM Images (Azure Linux Virtual Machines) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3402: Configure Data at Rest Encryption Using CMK (Azure Linux Virtual Machines) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3403: Configure Data in Transit Encryption (Azure Linux Virtual Machines) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3404: Configure Microsoft Defender for Service / Product Offering (Azure Linux Virtual Machines) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3405: Configure Disable Public Network Access (Azure Linux Virtual Machines) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3406: Configure EDR Solution (Azure Linux Virtual Machines) [Added]
- P1841: Unmonitored endpoint activity (Cloud) [Added]
- T3407: Configure Key Management in Azure Key Vault (Azure Linux Virtual Machines) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3408: Configure Managed Identities (Azure Linux Virtual Machines) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3409: Configure Network Security Group Support (Azure Linux Virtual Machines) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3410: Configure Azure Resource Logs (Azure Linux Virtual Machines) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3411: Configure Service Principals (Azure Linux Virtual Machines) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3412: Configure Vulnerability Assessment using Microsoft Defender (Azure Linux Virtual Machines) [Added]
- P1838: Lack of vulnerability assessments (Cloud) [Added]
- T3413: Configure Azure Policy Support (Azure Service Bus) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3414: Configure Azure RBAC for Data Plane (Azure Service Bus) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3415: Configure Conditional Access for Data Plane (Azure Service Bus) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3416: Configure Data at Rest Encryption Using CMK (Azure Service Bus) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3417: Configure Disable Public Network Access (Azure Service Bus) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3418: Configure Key Management in Azure Key Vault (Azure Service Bus) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3419: Configure Managed Identities (Azure Service Bus) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3420: Configure Network Security Group Support (Azure Service Bus) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3421: Configure Azure Private Link (Azure Service Bus) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3422: Configure Azure Resource Logs (Azure Service Bus) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3423: Configure Service Principals (Azure Service Bus) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3424: Configure Virtual Network Integration (Azure Service Bus) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3425: Configure Azure Policy Support (Azure SignalR Service) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3426: Configure Certificate Management in Azure Key Vault (Azure SignalR Service) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3427: Configure Disable Public Network Access (Azure SignalR Service) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3428: Configure Azure AD Authentication Required for Data Plane Access (Azure AI Bot Service) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3429: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure AI Bot Service) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3430: Configure Azure Policy Support (Azure AI Bot Service) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3431: Configure Data at Rest Encryption Using CMK (Azure AI Bot Service) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3432: Configure Disable Public Network Access (Azure AI Bot Service) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3433: Configure Key Management in Azure Key Vault (Azure AI Bot Service) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3434: Configure Local Authentication Methods for Data Plane Access (Azure AI Bot Service) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3435: Configure Managed Identities (Azure AI Bot Service) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3436: Configure Network Security Group Support (Azure AI Bot Service) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3437: Configure Azure Private Link (Azure AI Bot Service) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3438: Configure Azure Resource Logs (Azure AI Bot Service) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3439: Configure Service Principals (Azure AI Bot Service) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3440: Configure Virtual Network Integration (Azure AI Bot Service) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3441: Configure Azure Policy Support (Azure HPC Cache) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3442: Configure Data at Rest Encryption Using CMK (Azure HPC Cache) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3443: Configure Data in Transit Encryption (Azure HPC Cache) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3444: Configure Key Management in Azure Key Vault (Azure HPC Cache) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3445: Configure Managed Identities (Azure HPC Cache) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3446: Configure Network Security Group Support (Azure HPC Cache) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3447: Configure Azure AD Authentication Required for Data Plane Access (Azure Stream Analytics) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3448: Configure Azure Policy Support (Azure Stream Analytics) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3449: Configure Data at Rest Encryption Using CMK (Azure Stream Analytics) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3450: Configure Managed Identities (Azure Stream Analytics) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3451: Configure Service Native Backup Capability (Azure Stream Analytics) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3452: Configure Azure Private Link (Azure Stream Analytics) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3453: Configure Azure Resource Logs (Azure Stream Analytics) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3454: Configure Service Principals (Azure Stream Analytics) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3455: Configure Azure AD Authentication Required for Data Plane Access (Azure Virtual Machine Scale Sets) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3456: Configure Microsoft Defender for Cloud - Adaptive Application Controls (Azure Virtual Machine Scale Sets) [Added]
- P1819: Uncontrolled execution of unauthorized software (Cloud) [Added]
- T3457: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Virtual Machine Scale Sets) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3458: Configure Anti-Malware Solution (Azure Virtual Machine Scale Sets) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T3459: Configure Anti-Malware Solution Health Monitoring (Azure Virtual Machine Scale Sets) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T3460: Configure Azure Automation State Configuration (Azure Virtual Machine Scale Sets) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3461: Configure Azure Backup (Azure Virtual Machine Scale Sets) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3462: Configure Azure Policy Guest Configuration Agent (Azure Virtual Machine Scale Sets) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3463: Configure Azure Policy Support (Azure Virtual Machine Scale Sets) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3464: Configure Azure RBAC for Data Plane (Azure Virtual Machine Scale Sets) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3465: Configure Customer Lockbox (Azure Virtual Machine Scale Sets) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3466: Configure Custom VM Images (Azure Virtual Machine Scale Sets) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3467: Configure Data at Rest Encryption Using CMK (Azure Virtual Machine Scale Sets) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3468: Configure Data in Transit Encryption (Azure Virtual Machine Scale Sets) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3469: Configure Microsoft Defender for Service / Product Offering (Azure Virtual Machine Scale Sets) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3470: Configure Disable Public Network Access (Azure Virtual Machine Scale Sets) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3471: Configure EDR Solution (Azure Virtual Machine Scale Sets) [Added]
- P1841: Unmonitored endpoint activity (Cloud) [Added]
- T3472: Configure Key Management in Azure Key Vault (Azure Virtual Machine Scale Sets) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3473: Configure Managed Identities (Azure Virtual Machine Scale Sets) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3474: Configure Network Security Group Support (Azure Virtual Machine Scale Sets) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3475: Configure Azure Resource Logs (Azure Virtual Machine Scale Sets) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3476: Configure Service Principals (Azure Virtual Machine Scale Sets) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3477: Configure Vulnerability Assessment using Microsoft Defender (Azure Virtual Machine Scale Sets) [Added]
- P1838: Lack of vulnerability assessments (Cloud) [Added]
- T3478: Configure Azure Backup (Azure VMware Solution) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3479: Configure Microsoft Defender for Service / Product Offering (Azure VMware Solution) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3480: Configure Local Admin Accounts (Azure VMware Solution) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T3481: Configure Local Authentication Methods for Data Plane Access (Azure VMware Solution) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3482: Configure Service Native Backup Capability (Azure VMware Solution) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3483: Configure Network Security Group Support (Azure VMware Solution) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3484: Configure Virtual Network Integration (Azure VMware Solution) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3485: Configure Azure Policy Support (Azure Firewall) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3486: Configure Certificate Management in Azure Key Vault (Azure Firewall) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3487: Configure Data in Transit Encryption (Azure Firewall) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3488: Configure Azure Resource Logs (Azure Firewall) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3489: Configure Data in Transit Encryption (Azure Active Directory External Identities) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3490: Configure Local Authentication Methods for Data Plane Access (Azure Active Directory External Identities) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3491: Configure Network Security Group Support (Azure Active Directory External Identities) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3492: Configure Azure Resource Logs (Azure Active Directory External Identities) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3493: Configure Azure AD Authentication Required for Data Plane Access (Azure Spatial Anchors) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3494: Configure Azure Policy Support (Azure Spatial Anchors) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3495: Configure Azure RBAC for Data Plane (Azure Spatial Anchors) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3496: Configure Service Principals (Azure Spatial Anchors) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3497: Configure Azure AD Authentication Required for Data Plane Access (Azure Red Hat OpenShift) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3498: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Red Hat OpenShift) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3499: Configure Azure Policy Support (Azure Red Hat OpenShift) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3500: Configure Customer Lockbox (Azure Red Hat OpenShift) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3501: Configure Data at Rest Encryption Using CMK (Azure Red Hat OpenShift) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3502: Configure Disable Public Network Access (Azure Red Hat OpenShift) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3503: Configure Key Management in Azure Key Vault (Azure Red Hat OpenShift) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3504: Configure Service Native Backup Capability (Azure Red Hat OpenShift) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3505: Configure Azure Private Link (Azure Red Hat OpenShift) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3506: Configure Azure Resource Logs (Azure Red Hat OpenShift) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3507: Configure Service Principals (Azure Red Hat OpenShift) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3508: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Database for PostgreSQL) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3509: Configure Certificate Management in Azure Key Vault (Azure Database for PostgreSQL) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3510: Configure Conditional Access for Data Plane (Azure Database for PostgreSQL) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3511: Configure Data at Rest Encryption Using CMK (Azure Database for PostgreSQL) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3512: Configure Disable Public Network Access (Azure Database for PostgreSQL) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3513: Configure Key Management in Azure Key Vault (Azure Database for PostgreSQL) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3514: Configure Managed Identities (Azure Database for PostgreSQL) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3515: Configure Network Security Group Support (Azure Database for PostgreSQL) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3516: Configure Service Principals (Azure Database for PostgreSQL) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3517: Configure Virtual Network Integration (Azure Database for PostgreSQL) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3518: Configure Azure Policy Support (Azure Web Application Firewall) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3519: Configure Certificate Management in Azure Key Vault (Azure Web Application Firewall) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3520: Configure Data in Transit Encryption (Azure Web Application Firewall) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3521: Configure Microsoft Defender for Service / Product Offering (Azure Web Application Firewall) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3522: Configure Disable Public Network Access (Azure Web Application Firewall) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3523: Configure Network Security Group Support (Azure Web Application Firewall) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3524: Configure Azure Private Link (Azure Web Application Firewall) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3525: Configure Azure Resource Logs (Azure Web Application Firewall) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3526: Configure Sensitive Data Discovery and Classification (Azure Web Application Firewall) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3527: Configure Azure Policy Support (Azure Migrate) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3528: Configure Data at Rest Encryption Using CMK (Azure Migrate) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3529: Configure Disable Public Network Access (Azure Migrate) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3530: Configure Managed Identities (Azure Migrate) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3531: Configure Azure Private Link (Azure Migrate) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3532: Configure Service Principals (Azure Migrate) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3533: Configure Azure RBAC for Data Plane (Azure Sentinel) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3534: Configure Conditional Access for Data Plane (Azure Sentinel) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3535: Configure Data at Rest Encryption Using CMK (Azure Sentinel) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3536: Configure Data Leakage/Loss Prevention (Azure Sentinel) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3537: Configure Key Management in Azure Key Vault (Azure Sentinel) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3538: Configure Managed Identities (Azure Sentinel) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3539: Configure Azure Resource Logs (Azure Sentinel) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3540: Configure Sensitive Data Discovery and Classification (Azure Sentinel) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3541: Configure Service Principals (Azure Sentinel) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3542: Configure Azure Policy Support (Azure Managed Instance for Apache Cassandra) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3543: Configure Data at Rest Encryption Using CMK (Azure Managed Instance for Apache Cassandra) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3544: Configure Key Management in Azure Key Vault (Azure Managed Instance for Apache Cassandra) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3545: Configure Local Authentication Methods for Data Plane Access (Azure Managed Instance for Apache Cassandra) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3546: Configure Azure Resource Logs (Azure Managed Instance for Apache Cassandra) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3547: Configure Azure Policy Support (Azure Managed Lustre) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3548: Configure Data at Rest Encryption Using CMK (Azure Managed Lustre) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3549: Configure Key Management in Azure Key Vault (Azure Managed Lustre) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3550: Configure Azure Resource Logs (Azure Managed Lustre) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3551: Configure Azure AD Authentication Required for Data Plane Access (Azure Communication Services) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3552: Configure Azure RBAC for Data Plane (Azure Communication Services) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3553: Configure Azure Resource Logs (Azure Communication Services) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3554: Configure Service Principals (Azure Communication Services) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3555: Configure Azure AD Authentication Required for Data Plane Access (Azure Data Explorer) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3556: Configure Azure Policy Support (Azure Data Explorer) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3557: Configure Conditional Access for Data Plane (Azure Data Explorer) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3558: Configure Data at Rest Encryption Using CMK (Azure Data Explorer) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3559: Configure Data Leakage/Loss Prevention (Azure Data Explorer) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3560: Configure Disable Public Network Access (Azure Data Explorer) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3561: Configure Network Security Group Support (Azure Data Explorer) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3562: Configure Azure Private Link (Azure Data Explorer) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3563: Configure Azure Resource Logs (Azure Data Explorer) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3564: Configure Sensitive Data Discovery and Classification (Azure Data Explorer) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3565: Configure Virtual Network Integration (Azure Data Explorer) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3566: Configure Local Authentication Methods for Data Plane Access (Azure Dedicated HSM) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3567: Configure Azure Policy Support (Azure Database for MariaDB) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3568: Configure Microsoft Defender for Service / Product Offering (Azure Database for MariaDB) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3569: Configure Network Security Group Support (Azure Database for MariaDB) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3570: Configure Azure Private Link (Azure Database for MariaDB) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3571: Configure Azure AD Authentication Required for Data Plane Access (Azure Event Grid) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3572: Configure Azure Policy Support (Azure Event Grid) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3573: Configure Azure RBAC for Data Plane (Azure Event Grid) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3574: Configure Disable Public Network Access (Azure Event Grid) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3575: Configure Managed Identities (Azure Event Grid) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3576: Configure Network Security Group Support (Azure Event Grid) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3577: Configure Azure Private Link (Azure Event Grid) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3578: Configure Azure Resource Logs (Azure Event Grid) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3579: Configure Service Principals (Azure Event Grid) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3580: Configure Azure RBAC for Data Plane (Azure Cost Management) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3581: Configure Conditional Access for Data Plane (Azure Cost Management) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3582: Configure Service Principals (Azure Cost Management) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3583: Configure Azure Policy Support (Azure IoT Hub) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3584: Configure Azure RBAC for Data Plane (Azure IoT Hub) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3585: Configure Conditional Access for Data Plane (Azure IoT Hub) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3586: Configure Disable Public Network Access (Azure IoT Hub) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3587: Configure Key Management in Azure Key Vault (Azure IoT Hub) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3588: Configure Local Authentication Methods for Data Plane Access (Azure IoT Hub) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3589: Configure Managed Identities (Azure IoT Hub) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3590: Configure Azure Private Link (Azure IoT Hub) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3591: Configure Azure Resource Logs (Azure IoT Hub) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3592: Configure Service Principals (Azure IoT Hub) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3593: Configure Azure AD Authentication Required for Data Plane Access (Azure Cosmos DB) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3594: Configure Azure Policy Support (Azure Cosmos DB) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3595: Configure Azure RBAC for Data Plane (Azure Cosmos DB) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3596: Configure Conditional Access for Data Plane (Azure Cosmos DB) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3597: Configure Data at Rest Encryption Using CMK (Azure Cosmos DB) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3598: Configure Data Leakage/Loss Prevention (Azure Cosmos DB) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3599: Configure Microsoft Defender for Service / Product Offering (Azure Cosmos DB) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3600: Configure Disable Public Network Access (Azure Cosmos DB) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3601: Configure Key Management in Azure Key Vault (Azure Cosmos DB) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3602: Configure Managed Identities (Azure Cosmos DB) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3603: Configure Azure Private Link (Azure Cosmos DB) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3604: Configure Azure Resource Logs (Azure Cosmos DB) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3605: Configure Sensitive Data Discovery and Classification (Azure Cosmos DB) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3606: Configure Service Principals (Azure Cosmos DB) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3607: Configure Virtual Network Integration (Azure Cosmos DB) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3608: Configure Azure AD Authentication Required for Data Plane Access (Azure Synapse Analytics) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3609: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Synapse Analytics) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3610: Configure Azure Policy Support (Azure Synapse Analytics) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3611: Configure Conditional Access for Data Plane (Azure Synapse Analytics) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3612: Configure Customer Lockbox (Azure Synapse Analytics) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3613: Configure Data at Rest Encryption Using CMK (Azure Synapse Analytics) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3614: Configure Data Leakage/Loss Prevention (Azure Synapse Analytics) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3615: Configure Microsoft Defender for Service / Product Offering (Azure Synapse Analytics) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3616: Configure Disable Public Network Access (Azure Synapse Analytics) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3617: Configure Key Management in Azure Key Vault (Azure Synapse Analytics) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3618: Configure Local Admin Accounts (Azure Synapse Analytics) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T3619: Configure Local Authentication Methods for Data Plane Access (Azure Synapse Analytics) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3620: Configure Service Native Backup Capability (Azure Synapse Analytics) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3621: Configure Network Security Group Support (Azure Synapse Analytics) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3622: Configure Azure Private Link (Azure Synapse Analytics) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3623: Configure Azure Resource Logs (Azure Synapse Analytics) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3624: Configure Sensitive Data Discovery and Classification (Azure Synapse Analytics) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3625: Configure Virtual Network Integration (Azure Synapse Analytics) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3626: Configure Azure Policy Support (Azure Resource Manager) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3627: Configure Microsoft Defender for Service / Product Offering (Azure Resource Manager) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3628: Configure Azure Private Link (Azure Resource Manager) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3629: Configure Azure Resource Logs (Azure Resource Manager) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3630: Configure Azure AD Authentication Required for Data Plane Access (Azure App Service) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3631: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure App Service) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3632: Configure Azure Backup (Azure App Service) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3633: Configure Azure Policy Support (Azure App Service) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3634: Configure Certificate Management in Azure Key Vault (Azure App Service) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3635: Configure Conditional Access for Data Plane (Azure App Service) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3636: Configure Customer Lockbox (Azure App Service) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3637: Configure Data at Rest Encryption Using CMK (Azure App Service) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3638: Configure Data in Transit Encryption (Azure App Service) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3639: Configure Microsoft Defender for Service / Product Offering (Azure App Service) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3640: Configure Disable Public Network Access (Azure App Service) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3641: Configure Key Management in Azure Key Vault (Azure App Service) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3642: Configure Local Authentication Methods for Data Plane Access (Azure App Service) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3643: Configure Managed Identities (Azure App Service) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3644: Configure Azure Private Link (Azure App Service) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3645: Configure Azure Private Link (Azure App Service) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3646: Configure Azure Resource Logs (Azure App Service) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3647: Configure Service Principals (Azure App Service) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3648: Configure Virtual Network Integration (Azure App Service) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3649: Configure Azure Policy Support (Azure NetApp Files) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3650: Configure Data in Transit Encryption (Azure NetApp Files) [Added]
- P1809: Unprotected data in transit (Cloud) [Added]
- T3651: Configure Service Native Backup Capability (Azure NetApp Files) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3652: Configure Network Security Group Support (Azure NetApp Files) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3653: Configure Virtual Network Integration (Azure NetApp Files) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3654: Configure Azure Policy Support (Azure Lighthouse) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3655: Configure Managed Identities (Azure Policy) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3656: Configure Virtual Network Integration (Azure Cloud Shell) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3657: Configure Service Native Backup Capability (Azure Notification Hubs) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3658: Configure Azure Resource Logs (Azure Notification Hubs) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3659: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure OpenAI Service) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3660: Configure Azure Policy Support (Azure OpenAI Service) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3661: Configure Azure RBAC for Data Plane (Azure OpenAI Service) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3662: Configure Conditional Access for Data Plane (Azure OpenAI Service) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3663: Configure Customer Lockbox (Azure OpenAI Service) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3664: Configure Data at Rest Encryption Using CMK (Azure OpenAI Service) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3665: Configure Data Leakage/Loss Prevention (Azure OpenAI Service) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3666: Configure Disable Public Network Access (Azure OpenAI Service) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3667: Configure Key Management in Azure Key Vault (Azure OpenAI Service) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3668: Configure Local Authentication Methods for Data Plane Access (Azure OpenAI Service) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3669: Configure Managed Identities (Azure OpenAI Service) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3670: Configure Azure Private Link (Azure OpenAI Service) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3671: Configure Azure Resource Logs (Azure OpenAI Service) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3672: Configure Service Principals (Azure OpenAI Service) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3673: Configure Azure AD Authentication Required for Data Plane Access (Azure Batch) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3674: Configure Azure Policy Support (Azure Batch) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3675: Configure Azure RBAC for Data Plane (Azure Batch) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3676: Configure Certificate Management in Azure Key Vault (Azure Batch) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3677: Configure Custom Containers Images (Azure Batch) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3678: Configure Custom VM Images (Azure Batch) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3679: Configure Data at Rest Encryption Using CMK (Azure Batch) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3680: Configure Disable Public Network Access (Azure Batch) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3681: Configure Key Management in Azure Key Vault (Azure Batch) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3682: Configure Local Authentication Methods for Data Plane Access (Azure Batch) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3683: Configure Managed Identities (Azure Batch) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3684: Configure Azure Private Link (Azure Batch) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3685: Configure Azure Resource Logs (Azure Batch) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3686: Configure Service Principals (Azure Batch) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3687: Configure Virtual Network Integration (Azure Batch) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3688: Configure Azure AD Authentication Required for Data Plane Access (Azure SQL) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3689: Configure Azure Policy Support (Azure SQL) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3690: Configure Conditional Access for Data Plane (Azure SQL) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3691: Configure Customer Lockbox (Azure SQL) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3692: Configure Data at Rest Encryption Using CMK (Azure SQL) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3693: Configure Microsoft Defender for Service / Product Offering (Azure SQL) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3694: Configure Key Management in Azure Key Vault (Azure SQL) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3695: Configure Local Authentication Methods for Data Plane Access (Azure SQL) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3696: Configure Managed Identities (Azure SQL) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3697: Configure Network Security Group Support (Azure SQL) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3698: Configure Azure Private Link (Azure SQL) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3699: Configure Azure Resource Logs (Azure SQL) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3700: Configure Virtual Network Integration (Azure SQL) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3701: Configure Azure RBAC for Data Plane (Azure Attestation) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3702: Configure Azure Resource Logs (Azure Attestation) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3703: Configure Data at Rest Encryption Using CMK (Azure Communications Gateway) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3704: Configure Key Management in Azure Key Vault (Azure Communications Gateway) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3705: Configure Azure Policy Support (Azure NAT Gateway) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3706: Configure Virtual Network Integration (Azure NAT Gateway) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3707: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Backup) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3708: Configure Certificate Management in Azure Key Vault (Azure Backup) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3709: Configure Data at Rest Encryption Using CMK (Azure Backup) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3710: Configure Data Leakage/Loss Prevention (Azure Backup) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3711: Configure Disable Public Network Access (Azure Backup) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3712: Configure Key Management in Azure Key Vault (Azure Backup) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3713: Configure Azure Private Link (Azure Backup) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3714: Configure Azure Resource Logs (Azure Backup) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3715: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Information Protection) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3716: Configure Certificate Management in Azure Key Vault (Azure Information Protection) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3717: Configure Conditional Access for Data Plane (Azure Information Protection) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3718: Configure Data at Rest Encryption Using CMK (Azure Information Protection) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3719: Configure Data Leakage/Loss Prevention (Azure Information Protection) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3720: Configure Key Management in Azure Key Vault (Azure Information Protection) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3721: Configure Local Admin Accounts (Azure Information Protection) [Added]
- P1799: Excessive privileged access (Cloud) [Added]
- T3722: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Storage) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3723: Configure Azure Backup (Azure Storage) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3724: Configure Azure Policy Support (Azure Storage) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3725: Configure Azure RBAC for Data Plane (Azure Storage) [Added]
- P1805: Overly broad access privileges (Cloud) [Added]
- T3726: Configure Conditional Access for Data Plane (Azure Storage) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3727: Configure Customer Lockbox (Azure Storage) [Added]
- P1806: Uncontrolled vendor access (Cloud) [Added]
- T3728: Configure Data at Rest Encryption Using CMK (Azure Storage) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3729: Configure Data Leakage/Loss Prevention (Azure Storage) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3730: Configure Microsoft Defender for Service / Product Offering (Azure Storage) [Added]
- P1820: Inadequate threat detection and alerting (Cloud) [Added]
- T3731: Configure Disable Public Network Access (Azure Storage) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3732: Configure Key Management in Azure Key Vault (Azure Storage) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3733: Configure Local Authentication Methods for Data Plane Access (Azure Storage) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3734: Configure Managed Identities (Azure Storage) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3735: Configure Service Native Backup Capability (Azure Storage) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3736: Configure Azure Private Link (Azure Storage) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3737: Configure Azure Resource Logs (Azure Storage) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3738: Configure Sensitive Data Discovery and Classification (Azure Storage) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3739: Configure Service Principals (Azure Storage) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3740: Configure Microsoft Defender for Cloud - Adaptive Application Controls (Azure Managed Applications) [Added]
- P1819: Uncontrolled execution of unauthorized software (Cloud) [Added]
- T3741: Configure Service Credential and Secrets Support Integration and Storage in Azure Key Vault (Azure Managed Applications) [Added]
- P1797: Unsecured storage of credentials and secrets (Cloud) [Added]
- T3742: Configure Anti-Malware Solution (Azure Managed Applications) [Added]
- P1842: Outdated malware protection mechanisms (Cloud) [Added]
- T3743: Configure Anti-Malware Solution Health Monitoring (Azure Managed Applications) [Added]
- P1843: Outdated anti-malware signatures (Cloud) [Added]
- T3744: Configure Azure Automation State Configuration (Azure Managed Applications) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3745: Configure Azure Automation Update Management (Azure Managed Applications) [Added]
- P1839: Unpatched vulnerabilities in cloud resources (Cloud) [Added]
- T3746: Configure Azure Backup (Azure Managed Applications) [Added]
- P1844: Inadequate data backup practices (Cloud) [Added]
- T3747: Configure Azure Policy Guest Configuration Agent (Azure Managed Applications) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3748: Configure Azure Policy Support (Azure Managed Applications) [Added]
- P1816: Uncontrolled cloud service provisioning (Cloud) [Added]
- T3749: Configure Certificate Management in Azure Key Vault (Azure Managed Applications) [Added]
- P1813: Inadequate certificate management (Cloud) [Added]
- T3750: Configure Conditional Access for Data Plane (Azure Managed Applications) [Added]
- P1796: Insufficient resource access control (Cloud) [Added]
- T3751: Configure Custom Containers Images (Azure Managed Applications) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3752: Configure Custom VM Images (Azure Managed Applications) [Added]
- P1836: Inadequate compute resource configuration (Cloud) [Added]
- T3753: Configure Data at Rest Encryption Using CMK (Azure Managed Applications) [Added]
- P1811: Unsecured data at rest encryption keys (Cloud) [Added]
- T3754: Configure Data Leakage/Loss Prevention (Azure Managed Applications) [Added]
- P1808: Unmonitored sensitive data transfers (Cloud) [Added]
- T3755: Configure Disable Public Network Access (Azure Managed Applications) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3756: Configure EDR Solution (Azure Managed Applications) [Added]
- P1841: Unmonitored endpoint activity (Cloud) [Added]
- T3757: Configure Key Management in Azure Key Vault (Azure Managed Applications) [Added]
- P1812: Unsecured cryptographic key management (Cloud) [Added]
- T3758: Configure Local Authentication Methods for Data Plane Access (Azure Managed Applications) [Added]
- P1790: Decentralized identity management (Cloud) [Added]
- T3759: Configure Managed Identities (Azure Managed Applications) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3760: Configure Network Security Group Support (Azure Managed Applications) [Added]
- P1780: Insufficient network segmentation (Cloud) [Added]
- T3761: Configure Azure Private Link (Azure Managed Applications) [Added]
- P1781: Unsecured cloud service access (Cloud) [Added]
- T3762: Configure Azure Resource Logs (Azure Managed Applications) [Added]
- P1823: Insufficient network logging (Cloud) [Added]
- T3763: Configure Sensitive Data Discovery and Classification (Azure Managed Applications) [Added]
- P1807: Unidentified and unprotected sensitive data (Cloud) [Added]
- T3764: Configure Service Principals (Azure Managed Applications) [Added]
- P1792: Unsecured application identities (Cloud) [Added]
- T3765: Configure Vulnerability Assessment using Microsoft Defender (Azure Managed Applications) [Added]
- P1838: Lack of vulnerability assessments (Cloud) [Added]
- T3766: Use SecureString for sensitive values in Parameter Store (AWS Systems Manager) [Added]
- P1866: Sensitive parameter data stored in plaintext (AWS Systems Manager) [Added]
- T3767: Encrypt all data in S3 buckets (AWS Systems Manager) [Added]
- P1867: Sensitive data stored in plaintext (AWS Systems Manager) [Added]
- T3768: Give the least privilege access to users (AWS Systems Manager) [Added]
- P1868: Excessive user permissions (AWS Systems Manager) [Added]
- T3769: Set parameter constraints in an SSM document (AWS Systems Manager) [Added]
- P1869: Allowing invalid or dangerous values in an SSM document (AWS Systems Manager) [Added]
- T3770: Block public sharing of SSM documents (AWS Systems Manager) [Added]
- P1870: Leaking information about system configuration (AWS Systems Manager) [Added]
- T3771: Keep components up to date (AWS Systems Manager) [Added]
- P1871: Out-of-date components (AWS Systems Manager) [Added]
- T3772: Restrict Session Manager commands with an SSM document (AWS Systems Manager) [Added]
- P1872: Poor session management (AWS Systems Manager) [Added]
- T3773: Monitor sessions in Session Manager (AWS Systems Manager) [Added]
- P1873: Suspicious session activity (AWS Systems Manager) [Added]
- T3774: Test the use of SecureString for sensitive values in Parameter Store (AWS Systems Manager) [Added]
- P1866: Sensitive parameter data stored in plaintext (AWS Systems Manager) [Added]
- T3775: Test data ecnryption in S3 buckets (AWS Systems Manager) [Added]
- P1867: Sensitive data stored in plaintext (AWS Systems Manager) [Added]
- T3776: Test least privilege access to users (AWS Systems Manager) [Added]
- P1868: Excessive user permissions (AWS Systems Manager) [Added]
- T3777: Verify parameter constraints in an SSM document (AWS Systems Manager) [Added]
- P1869: Allowing invalid or dangerous values in an SSM document (AWS Systems Manager) [Added]
- T3778: Verify public sharing of SSM documents (AWS Systems Manager) [Added]
- P1870: Leaking information about system configuration (AWS Systems Manager) [Added]
- T3779: Verify components are up to date (AWS Systems Manager) [Added]
- P1871: Out-of-date components (AWS Systems Manager) [Added]
- T3780: Verify the restriction of Session Manager commands with an SSM document (AWS Systems Manager) [Added]
- P1872: Poor session management (AWS Systems Manager) [Added]
- T3781: Verify session monitoring in Session Manager (AWS Systems Manager) [Added]
- P1873: Suspicious session activity (AWS Systems Manager) [Added]
- T3782: Replace sensitive values with dynamic references (AWS CloudFormation) [Added]
- P1874: Hard-coded secrets in templates (AWS CloudFormation) [Added]
- T3783: Set parameter constraints (AWS CloudFormation) [Added]
- P1875: Allowing invalid or dangerous values (AWS CloudFormation) [Added]
- T3784: Store templates in a version control system (AWS CloudFormation) [Added]
- P1876: Lack of change tracking (AWS CloudFormation) [Added]
- T3785: Use a service role to implement least-privilege access (AWS CloudFormation) [Added]
- P1877: Overly broad user permissions (AWS CloudFormation) [Added]
- T3786: Assign a stack policy to protect resources (AWS CloudFormation) [Added]
- P1878: Stack resources can be accidentally updated or removed (AWS CloudFormation) [Added]
- T3787: Ensure CloudFormation events are logged (AWS CloudFormation) [Added]
- P1879: Failing to monitor for security incidents and errors (AWS CloudFormation) [Added]
- T3788: Verify sensitive values replacement with dynamic references (AWS CloudFormation) [Added]
- P1874: Hard-coded secrets in templates (AWS CloudFormation) [Added]
- T3789: Verify parameter constraints (AWS CloudFormation) [Added]
- P1875: Allowing invalid or dangerous values (AWS CloudFormation) [Added]
- T3790: Verify template storage in a version control system (AWS CloudFormation) [Added]
- P1876: Lack of change tracking (AWS CloudFormation) [Added]
- T3791: Verify the use of a service role to implement least-privilege access (AWS CloudFormation) [Added]
- P1877: Overly broad user permissions (AWS CloudFormation) [Added]
- T3792: Verify resource protection by stack policies [Added]
- P1878: Stack resources can be accidentally updated or removed (AWS CloudFormation) [Added]
- T3793: Verify logs of CloudFormation events (AWS CloudFormation) [Added]
- P1879: Failing to monitor for security incidents and errors (AWS CloudFormation) [Added]
- T3794: Protect against leaking secrets in a shell window (AWS Secrets Manager) [Added]
- P1880: Secret leaking from the shell command history (AWS Secrets Manager) [Added]
- T3795: Set a rotation schedule for secrets (AWS Secrets Manager) [Added]
- P1881: Compromised secrets (AWS Secrets Manager) [Added]
- T3796: Use appropriate naming and documentation for secrets (AWS Secrets Manager) [Added]
- P1882: Poor secret management (AWS Secrets Manager) [Added]
- T3797: Use CloudTrail to audit secrets (AWS Secrets Manager) [Added]
- P1883: Failing to monitor secret usage (AWS Secrets Manager) [Added]
- T3798: Use a VPC endpoint to communicate (AWS Secrets Manager) [Added]
- P1884: Communication over the public internet (AWS Secrets Manager) [Added]
- T3799: Verify secret leaking in a shell window (AWS Secrets Manager) [Added]
- P1880: Secret leaking from the shell command history (AWS Secrets Manager) [Added]
- T3800: Test secret rotation schedule (AWS Secrets Manager) [Added]
- P1881: Compromised secrets (AWS Secrets Manager) [Added]
- T3801: Verify naming and documentation for secrets (AWS Secrets Manager) [Added]
- P1882: Poor secret management (AWS Secrets Manager) [Added]
- T3802: Verify secret audit (AWS Secrets Manager) [Added]
- P1883: Failing to monitor secret usage (AWS Secrets Manager) [Added]
- T3803: Test VPC endpoint communication (AWS Secrets Manager) [Added]
- P1884: Communication over the public internet (AWS Secrets Manager) [Added]
- T3804: Ensure state machines have the correct permissions (AWS Step Functions) [Added]
- P1885: Excessive or insufficient permissions (AWS Step Functions) [Added]
- T3805: Choose an appropriate logging level for state machines (AWS Step Functions) [Added]
- P1886: Failure to monitor events for errors and security incidents (AWS Step Functions) [Added]
- T3806: Verify permissions for state machines (AWS Step Functions) [Added]
- P1885: Excessive or insufficient permissions (AWS Step Functions) [Added]
- T3807: Verify logging level for state machines (AWS Step Functions) [Added]
- P1886: Failure to monitor events for errors and security incidents (AWS Step Functions) [Added]
- T3808: Do not use wildcard domain names in certificates (AWS Certificate Manager) [Added]
- P1887: Single-point of failure and vulnerability to ALPACA exploits (AWS Certificate Manager) [Added]
- T3809: Monitor non-AWS certificates for expiry (AWS Certificate Manager) [Added]
- P1888: Interruption in availability due to expired certificates (AWS Certificate Manager) [Added]
- T3810: Do not use certificate pinning (AWS Certificate Manager) [Added]
- P1889: Obsolete and less-secure protocol (AWS Certificate Manager) [Added]
- T3811: Verify the use of wildcard domain names in certificates (AWS Certificate Manager) [Added]
- P1887: Single-point of failure and vulnerability to ALPACA exploits (AWS Certificate Manager) [Added]
- T3812: Verify that non-AWS certificates are monitored for expiry (AWS Certificate Manager) [Added]
- P1888: Interruption in availability due to expired certificates (AWS Certificate Manager) [Added]
- T3813: Verify the use of certificate pinning (AWS Certificate Manager) [Added]
- P1889: Obsolete and less-secure protocol (AWS Certificate Manager) [Added]
- T3814: Follow standard domain security practices (AWS Route53) [Added]
- P1890: Unprotected domain records (AWS Route53) [Added]
- T3815: Consider supporting DNSSEC signing with your domains (AWS Route53) [Added]
- P1891: Vulnerability to domain spoofing (AWS Route53) [Added]
- T3816: Test standard domain security practices (AWS Route53) [Added]
- P1890: Unprotected domain records (AWS Route53) [Added]
- T3817: Verify the support of DNSSEC signing with your domains (AWS Route53) [Added]
- P1891: Vulnerability to domain spoofing (AWS Route53) [Added]
- T3818: Incorporate regular scanning to detect ECR image vulnerabilities (AWS Elastic Container Registry) [Added]
- P1892: Undetected vulnerabilities in images (AWS Elastic Container Registry) [Added]
- T3819: Do not allow public access to ECR images (AWS Elastic Container Registry) [Added]
- P1893: Information leaks through public images (AWS Elastic Container Registry) [Added]
- T3820: Consider using a customer-managed key for ECR encryption (AWS Elastic Container Registry) [Added]
- P1894: Lack of control over encryption (AWS Elastic Container Registry) [Added]
- T3821: Verify ECR image vulnerability detection (AWS Elastic Container Registry) [Added]
- P1892: Undetected vulnerabilities in images (AWS Elastic Container Registry) [Added]
- T3822: Verify public access to ECR images (AWS Elastic Container Registry) [Added]
- P1893: Information leaks through public images (AWS Elastic Container Registry) [Added]
- T3823: Verify customer-managed keys for ECR encryption (AWS Elastic Container Registry) [Added]
- P1894: Lack of control over encryption (AWS Elastic Container Registry) [Added]
- T3824: Enable encryption at rest (AWS Elastic File System) [Added]
- P1895: Plaintext storage of data (AWS Elastic File System) [Added]
- T3825: Consider using a customer-managed key for encryption (AWS Elastic File System) [Added]
- P1896: Lack of control over encryption (AWS Elastic File System) [Added]
- T3826: Mount volumes with TLS enabled (AWS Elastic File System) [Added]
- P1897: Failure to provide encryption for data in transit (AWS Elastic File System) [Added]
- T3827: Enable and configure automatic backups (AWS Elastic File System) [Added]
- P1898: Failure to safeguard data against failures and error (AWS Elastic File System) [Added]
- T3828: Use access points to segregate application access with shared data sets (AWS Elastic File System) [Added]
- P1899: Excessive application permissions for file access (AWS Elastic File System) [Added]
- T3829: Verify encryption at rest (AWS Elastic File System) [Added]
- P1895: Plaintext storage of data (AWS Elastic File System) [Added]
- T3830: Verify customer-managed key for encryption (AWS Elastic File System) [Added]
- P1896: Lack of control over encryption (AWS Elastic File System) [Added]
- T3831: Verify mounted volumes security (AWS Elastic File System) [Added]
- P1897: Failure to provide encryption for data in transit (AWS Elastic File System) [Added]
- T3832: Verify automatic backups configuration (AWS Elastic File System) [Added]
- P1898: Failure to safeguard data against failures and error (AWS Elastic File System) [Added]
- T3833: Verify access points segregation to access shared data sets (AWS Elastic File System) [Added]
- P1899: Excessive application permissions for file access (AWS Elastic File System) [Added]
- T3834: Enable DKIM to prevent email spoofing (AWS Simple Email Service) [Added]
- P1900: Potential use of email domains in spam, spoofing, and phishing attacks (AWS Simple Email Service) [Added]
- T3835: Delete personal data when no longer in use (AWS Simple Email Service) [Added]
- P1901: Potential disclosure of PII (AWS Simple Email Service) [Added]
- T3836: Restrict permissions with IAM conditions (AWS Simple Email Service) [Added]
- P1902: Insufficient restrictions on email identities (AWS Simple Email Service) [Added]
- T3837: Review sending authorization policies to prevent unauthorized delegate senders (AWS Simple Email Service) [Added]
- P1903: Unintended cross-account use of email identities (AWS Simple Email Service) [Added]
- T3838: Monitor sending activity (AWS Simple Email Service) [Added]
- P1904: Undetected email delivery issues (AWS Simple Email Service) [Added]
- T3839: Use VPC endpoints to keep SMTP traffic off of the public internet (AWS Simple Email Service) [Added]
- P1905: Exposed service communication with public endpoints (AWS Simple Email Service) [Added]
- T3840: Test email spoofing prevention (AWS Simple Email Service) [Added]
- P1900: Potential use of email domains in spam, spoofing, and phishing attacks (AWS Simple Email Service) [Added]
- T3841: Verify unused personal data (AWS Simple Email Service) [Added]
- P1901: Potential disclosure of PII (AWS Simple Email Service) [Added]
- T3842: Verify permissions restricted with IAM conditions (AWS Simple Email Service) [Added]
- P1902: Insufficient restrictions on email identities (AWS Simple Email Service) [Added]
- T3843: Verify sending authorization policies (AWS Simple Email Service) [Added]
- P1903: Unintended cross-account use of email identities (AWS Simple Email Service) [Added]
- T3844: Verify sending activity monitoring (AWS Simple Email Service) [Added]
- P1904: Undetected email delivery issues (AWS Simple Email Service) [Added]
- T3845: Verify VPC endpoints (AWS Simple Email Service) [Added]
- P1905: Exposed service communication with public endpoints (AWS Simple Email Service) [Added]
- T3846: Do not create FTP-enabled servers (AWS Transfer Family) [Added]
- P1906: Unencrypted network connection (AWS Transfer Family) [Added]
- T3847: Use the strongest supported security policy for SFTP/FTPS encryption (AWS Transfer Family) [Added]
- P1907: Potentially weak encryption (AWS Transfer Family) [Added]
- T3848: Grant permissions to users with managed policies (AWS Transfer Family) [Added]
- P1908: Mismatched permissions (AWS Transfer Family) [Added]
- T3849: Verify FTP-enabled servers (AWS Transfer Family) [Added]
- P1906: Unencrypted network connection (AWS Transfer Family) [Added]
- T3850: Verify security policy for SFTP/FTPS encryption (AWS Transfer Family) [Added]
- P1907: Potentially weak encryption (AWS Transfer Family) [Added]
- T3851: Verify user permissions (AWS Transfer Family) [Added]
- P1908: Mismatched permissions (AWS Transfer Family) [Added]
- T3852: Encrypt clusters when storing sensitive data (AWS RedShift) [Added]
- P1909: Unencrypted data at rest (AWS RedShift) [Added]
- T3853: Require TLS to encrypt data in transit (AWS RedShift) [Added]
- P1910: Failure to provide encryption for data in transit (AWS RedShift) [Added]
- T3854: Do not use default names for a database or the admin account (AWS RedShift) [Added]
- P1911: Using the default database name and admin account name (AWS RedShift) [Added]
- T3855: Ensure clusters are not publicly accessible (AWS RedShift) [Added]
- P1912: Publicly accessible clusters (AWS RedShift) [Added]
- T3856: Enable audit logging for databases (AWS RedShift) [Added]
- P1913: Failure to monitor database activity (AWS RedShift) [Added]
- T3857: Use managed IAM policies to grant permissions to users (AWS RedShift) [Added]
- P1914: Excessive permissions (AWS RedShift) [Added]
- T3858: Use an automated backup schedule with databases (AWS RedShift) [Added]
- P1915: Failure to safeguard against data loss (AWS RedShift) [Added]
- T3859: Verify cluster encryption (AWS RedShift) [Added]
- P1909: Unencrypted data at rest (AWS RedShift) [Added]
- T3860: Verify data in transit encryption(AWS RedShift) [Added]
- P1910: Failure to provide encryption for data in transit (AWS RedShift) [Added]
- T3861: Verify names for database and admin account (AWS RedShift) [Added]
- P1911: Using the default database name and admin account name (AWS RedShift) [Added]
- T3862: Verify cluster accessibility (AWS RedShift) [Added]
- P1912: Publicly accessible clusters (AWS RedShift) [Added]
- T3863: Verify audit logging for databases (AWS RedShift) [Added]
- P1913: Failure to monitor database activity (AWS RedShift) [Added]
- T3864: Verify users' IAM policies (AWS RedShift) [Added]
- P1914: Excessive permissions (AWS RedShift) [Added]
- T3865: Verify automated backup schedule (AWS RedShift) [Added]
- P1915: Failure to safeguard against data loss (AWS RedShift) [Added]
- T3866: Do not use publicly accessible MQ brokers (AWS MQ) [Added]
- P1916: Publicly accessible brokers (AWS MQ) [Added]
- T3867: Block unnecessary protocols (AWS MQ) [Added]
- P1917: Unnecessary features that create a larger attack surface (AWS MQ) [Added]
- T3868: Keep MQ current with automatic updates (AWS MQ) [Added]
- P1918: Out-of-date software (AWS MQ) [Added]
- T3869: Ensure activity is logged (AWS MQ) [Added]
- P1919: Failure to store a log of MQ events (AWS MQ) [Added]
- T3870: Verify MQ brokers accessibility(AWS MQ) [Added]
- P1916: Publicly accessible brokers (AWS MQ) [Added]
- T3871: Verify protocols (AWS MQ) [Added]
- P1917: Unnecessary features that create a larger attack surface (AWS MQ) [Added]
- T3872: Verify MQ automatic updates (AWS MQ) [Added]
- P1918: Out-of-date software (AWS MQ) [Added]
- T3873: Verify activity logging (AWS MQ) [Added]
- P1919: Failure to store a log of MQ events (AWS MQ) [Added]
- T3874: Enable at-rest encryption (AWS OpenSearch Service) [Added]
- P1920: Sensitive information stored in plaintext (AWS OpenSearch Service) [Added]
- T3875: Enable node-to-node encryption (AWS OpenSearch Service) [Added]
- P1921: Failure to provide encryption for data in transit (AWS OpenSearch Service) [Added]
- T3876: Do not expose a public endpoint to domains (AWS OpenSearch Service) [Added]
- P1922: Exposed services with public endpoints (AWS OpenSearch Service) [Added]
- T3877: Restrict domains to known IP addresses (AWS OpenSearch Service) [Added]
- P1923: Overly accessible OpenSearch domains (AWS OpenSearch Service) [Added]
- T3878: Enable audit logging with fine-grained access controls (AWS OpenSearch Service) [Added]
- P1924: Failure to monitor events for errors and security incidents (AWS OpenSearch Service) [Added]
- T3879: Verify at-rest encryption (AWS OpenSearch Service) [Added]
- P1920: Sensitive information stored in plaintext (AWS OpenSearch Service) [Added]
- T3880: Verify node-to-node encryption (AWS OpenSearch Service) [Added]
- P1921: Failure to provide encryption for data in transit (AWS OpenSearch Service) [Added]
- T3881: Verify public endpoint to domain exposure (AWS OpenSearch Service) [Added]
- P1922: Exposed services with public endpoints (AWS OpenSearch Service) [Added]
- T3882: Verify domain restrictions (AWS OpenSearch Service) [Added]
- P1923: Overly accessible OpenSearch domains (AWS OpenSearch Service) [Added]
- T3883: Verify audit logging and access controls (AWS OpenSearch Service) [Added]
- P1924: Failure to monitor events for errors and security incidents (AWS OpenSearch Service) [Added]
- T3884: Ensure provisioned clusters are not publicly accessible (AWS MSK) [Added]
- P1925: Publicly accessible clusters (AWS MSK) [Added]
- T3885: Enable logs for provisioned clusters (AWS MSK) [Added]
- P1926: Failure to monitor cluster activity (AWS MSK) [Added]
- T3886: Consider placing ZooKeper nodes in a separate security group (AWS MSK) [Added]
- P1927: Overly permissive network access policy (AWS MSK) [Added]
- T3887: Verify provisioned clusters accessibility (AWS MSK) [Added]
- P1925: Publicly accessible clusters (AWS MSK) [Added]
- T3888: Verify logs for provisioned clusters (AWS MSK) [Added]
- P1926: Failure to monitor cluster activity (AWS MSK) [Added]
- T3889: Verify groups of ZooKeper nodes (AWS MSK) [Added]
- P1927: Overly permissive network access policy (AWS MSK) [Added]
- T3890: Enable at-rest encryption for Redis clusters (AWS ElastiCache) [Added]
- P1928: Plaintext storage of data (AWS ElastiCache) [Added]
- T3891: Enable in-transit encryption for Redis clusters (AWS ElastiCache) [Added]
- P1929: Unencrypted transmission of data and lack of authentication (AWS ElastiCache) [Added]
- T3892: Enable Redis failover support for clusters that require high availability (AWS ElastiCache) [Added]
- P1930: Lack of fault tolerance (AWS ElastiCache) [Added]
- T3893: Ensure you are using secure configuration defaults when creating a new ElastiCache cluster (AWS ElastiCache) [Added]
- P1931: Poor configuration leading to reduced availability and exposure to known vulnerabilities (AWS ElastiCache) [Added]
- T3894: Monitor authentication metrics for Redis clusters (AWS ElastiCache) [Added]
- P1932: Failure to monitor for security incidents (AWS ElastiCache) [Added]
- T3895: Verify at-rest encryption for Redis clusters is enabled (AWS ElastiCache) [Added]
- P1928: Plaintext storage of data (AWS ElastiCache) [Added]
- T3896: Verify in-transit encryption for Redis clusters is enabled (AWS ElastiCache) [Added]
- P1929: Unencrypted transmission of data and lack of authentication (AWS ElastiCache) [Added]
- T3897: Verify Redis failover support for clusters that require high availability is enabled (AWS ElastiCache) [Added]
- P1930: Lack of fault tolerance (AWS ElastiCache) [Added]
- T3898: Verify secure configuration defaults are set for ElastiCache clusters (AWS ElastiCache) [Added]
- P1931: Poor configuration leading to reduced availability and exposure to known vulnerabilities (AWS ElastiCache) [Added]
- T3899: Verify authentication metrics for Redis clusters are monitored (AWS ElastiCache) [Added]
- P1932: Failure to monitor for security incidents (AWS ElastiCache) [Added]
- T3900: Implement and use code change management strategy (GitHub) [Added]
- P1933: Inadequate code governance and security (GitHub) [Added]
- TA6555: Ensure any changes to code are tracked in a version control platform [Added]
- TA6556: Ensure any change to code can be traced back to its associated task [Added]
- TA6557: Ensure any change to code receives approval of two strongly authenticated users [Added]
- TA6558: Ensure previous approvals are dismissed when updates are introduced to a code change proposal [Added]
- TA6559: Ensure there are restrictions on who can dismiss code change reviews [Added]
- TA6560: Ensure code owners are set for extra sensitive code or configuration [Added]
- TA6561: Ensure code owner's review is required when a change affects owned code [Added]
- TA6562: Ensure inactive branches are periodically reviewed and removed [Added]
- TA6563: Ensure all checks have passed before merging new code [Added]
- TA6564: Ensure open Git branches are up to date before they can be merged into code base [Added]
- TA6565: Ensure branch protection rules are enforced for administrators [Added]
- TA6566: Ensure force push code to branches is denied [Added]
- TA6567: Ensure branch deletions are denied [Added]
- TA6568: Ensure any merging of code is automatically scanned for risks [Added]
- TA6569: Ensure any changes to branch protection rules are audited [Added]
- TA6570: Ensure branch protection is enforced on the default branch [Added]
- TA6646: Ensure all open comments are resolved before allowing code change merging [Added]
- TA6647: Ensure verification of signed commits for new changes before merging [Added]
- TA6648: Ensure linear history is required [Added]
- TA6649: Ensure pushing or merging of new code is restricted to specific individuals or teams [Added]
- T3901: Enforce repository management and security strategies (GitHub) [Added]
- P1934: Insufficient repository management and security (GitHub) [Added]
- TA6571: Ensure all public repositories contain a SECURITY.md file [Added]
- TA6572: Ensure repository creation is limited to specific members [Added]
- TA6573: Ensure repository deletion is limited to specific users [Added]
- TA6574: Ensure issue deletion is limited to specific users [Added]
- TA6575: Ensure all copies (forks) of code are tracked and accounted for [Added]
- TA6576: Ensure all code projects are tracked for changes in visibility status [Added]
- TA6577: Ensure inactive repositories are reviewed and archived periodically [Added]
- T3902: Ensure regular review and inactive users removal (GitHub) [Added]
- P1935: Insufficient organizational and access controls (GitHub) [Added]
- TA6578: Ensure team creation is limited to specific members [Added]
- TA6579: Ensure minimum number of administrators are set for the organization [Added]
- TA6580: Ensure strict base permissions are set for repositories [Added]
- TA6581: Ensure anomalous code behavior is tracked [Added]
- TA6650: Ensure inactive users are reviewed and removed periodically [Added]
- TA6651: Ensure Multi-Factor Authentication (MFA) is required for contributors of new code [Added]
- TA6652: Ensure the organization is requiring members to use Multi-Factor Authentication (MFA) [Added]
- TA6653: Ensure new members are required to be invited using company-approved email [Added]
- TA6654: Ensure two administrators are set for each repository [Added]
- TA6655: Ensure an organization’s identity is confirmed with a “Verified” badge [Added]
- TA6656: Ensure Source Code Management (SCM) email notifications are restricted to verified domains [Added]
- TA6657: Ensure an organization provides SSH certificates [Added]
- TA6658: Ensure Git access is limited based on IP addresses [Added]
- T3903: Implement application and webhook security strategies (GitHub) [Added]
- P1936: Insufficient application and integration management (GitHub) [Added]
- TA6582: Ensure administrator approval is required for every installed application [Added]
- TA6583: Ensure stale applications are reviewed and inactive ones are removed [Added]
- TA6584: Ensure the access granted to each installed application is limited to the least privilege needed [Added]
- TA6585: Ensure only secured webhooks are used [Added]
- T3904: Implement comprehensive scanning and security measures (GitHub) [Added]
- P1937: Inadequate automated security scanning (GitHub) [Added]
- TA6659: Ensure scanners are in place to identify and prevent sensitive data in code [Added]
- TA6660: Ensure scanners are in place to secure Continuous Integration (CI) pipeline instructions [Added]
- TA6661: Ensure scanners are in place to secure Infrastructure as Code (IaC) instructions [Added]
- TA6662: Ensure scanners are in place for code vulnerabilities [Added]
- TA6663: Ensure scanners are in place for open-source vulnerabilities in used packages [Added]
- TA6664: Ensure scanners are in place for open-source license issues in used packages [Added]
- T3905: Ensure pipeline efficiency and security (GitHub) [Added]
- P1938: Insufficient build environment security and management (GitHub) [Added]
- TA6586: Ensure all aspects of the pipeline infrastructure and configuration are immutable [Added]
- TA6587: Ensure the build environment is logged [Added]
- TA6588: Ensure the creation of the build environment is automated [Added]
- TA6589: Ensure access to build environments is limited [Added]
- TA6590: Ensure users must authenticate to access the build environment [Added]
- TA6591: Ensure the build infrastructure is automatically scanned for vulnerabilities [Added]
- TA6592: Ensure default passwords are not used [Added]
- TA6593: Ensure webhooks of the build environment are secured [Added]
- TA6594: Ensure minimum number of administrators are set for the build environment [Added]
- TA6665: Ensure each pipeline has a single responsibility [Added]
- TA6666: Ensure build secrets are limited to the minimal necessary scope [Added]
- T3906: Implement secure build worker management (GitHub) [Added]
- P1939: Insufficient build worker security and management (GitHub) [Added]
- TA6595: Ensure build workers are single-used [Added]
- TA6596: Ensure build worker environments and commands are passed and not pulled [Added]
- TA6597: Ensure the duties of each build worker are segregated [Added]
- TA6598: Ensure build workers have minimal network connectivity [Added]
- TA6599: Ensure run-time security is enforced for build workers [Added]
- TA6600: Ensure build workers are automatically scanned for vulnerabilities [Added]
- TA6601: Ensure build workers' deployment configuration is stored in a version control platform [Added]
- TA6602: Ensure resource consumption of build workers is monitored [Added]
- T3907: Ensure pipeline definition and security (GitHub) [Added]
- P1940: Inadequate pipeline security and configuration management (GitHub) [Added]
- TA6603: Ensure all build steps are defined as code [Added]
- TA6604: Ensure steps have clearly defined build stage input and output [Added]
- TA6605: Ensure output is written to a separate, secured storage repository [Added]
- TA6606: Ensure changes to pipeline files are tracked and reviewed [Added]
- TA6607: Ensure access to build process triggering is minimized [Added]
- TA6608: Ensure pipelines are automatically scanned for misconfigurations [Added]
- TA6609: Ensure pipelines are automatically scanned for vulnerabilities [Added]
- TA6667: Ensure scanners are in place to identify and prevent sensitive data in pipeline files [Added]
- T3908: Enforce artifact signing (GitHub) [Added]
- P1941: Insufficient artifact and dependency security (GitHub) [Added]
- TA6610: Ensure all artifacts on all releases are signed [Added]
- TA6611: Ensure all external dependencies used in the build process are locked [Added]
- TA6612: Ensure dependencies are validated before being used [Added]
- TA6613: Ensure the build pipeline creates reproducible artifacts [Added]
- TA6614: Ensure pipeline steps produce a Software Bill of Materials (SBOM) [Added]
- TA6615: Ensure pipeline steps sign the Software Bill of Materials (SBOM) produced [Added]
- TA6668: Ensure all artifacts on all releases are signed (level 2) [Added]
- T3909: Ensure third-party artifact security (GitHub) [Added]
- P1942: Insufficient third-party and open-source security (GitHub) [Added]
- TA6616: Ensure third-party artifacts and open-source libraries are verified [Added]
- TA6617: Ensure Software Bill of Materials (SBOM) is required from all third-party suppliers [Added]
- TA6618: Ensure signed metadata of the build process is required and verified [Added]
- TA6619: Ensure dependencies are monitored between open-source components [Added]
- TA6620: Ensure trusted package managers and repositories are defined and prioritized [Added]
- TA6621: Ensure a signed Software Bill of Materials (SBOM) of the code is supplied [Added]
- TA6622: Ensure dependencies are pinned to a specific, verified version [Added]
- TA6669: Ensure all packages used are more than 60 days old [Added]
- T3910: Implement dependency management strategy (GitHub) [Added]
- P1943: Inadequate dependency management and security (GitHub) [Added]
- TA6623: Ensure an organization-wide dependency usage policy is enforced [Added]
- TA6624: Ensure packages are automatically scanned for known vulnerabilities [Added]
- TA6625: Ensure packages are automatically scanned for license implications [Added]
- TA6626: Ensure packages are automatically scanned for ownership change [Added]
- T3911: Ensure distributed artifact security (GitHub) [Added]
- P1944: Insufficient artifact security and distribution control (GitHub) [Added]
- TA6670: Ensure all artifacts are signed by the build pipeline itself [Added]
- TA6671: Ensure artifacts are encrypted before distribution [Added]
- TA6672: Ensure only authorized platforms have decryption capabilities of artifacts [Added]
- T3912: Enforce artifact certification and uploading rules (GitHub) [Added]
- P1945: Insufficient control and security of package registry (GitHub) [Added]
- TA6627: Ensure the authority to certify artifacts is limited [Added]
- TA6628: Ensure number of permitted users who may upload new artifacts is minimized [Added]
- TA6629: Ensure user management of the package registry is not local [Added]
- TA6630: Ensure anonymous access to artifacts is revoked [Added]
- TA6631: Ensure minimum number of administrators are set for the package registry [Added]
- TA6673: Ensure user access to the package registry utilizes Multi-Factor Authentication (MFA) [Added]
- T3913: Implement package registry security (GitHub) [Added]
- P1946: Inadequate package registry validation and security (GitHub) [Added]
- TA6632: Ensure all signed artifacts are validated upon uploading the package registry [Added]
- TA6633: Ensure all versions of an existing artifact have their signatures validated [Added]
- TA6634: Ensure changes in package registry configuration are audited [Added]
- TA6635: Ensure webhooks of the repository are secured [Added]
- T3914: Implement artifact origin information policy (GitHub) [Added]
- P1947: Lack of artifact origin information (GitHub) [Added]
- TA6636: Ensure artifacts contain information about their origin [Added]
- T3915: Enforce separation of deployment configuration files (GitHub) [Added]
- P1948: Inadequate deployment configuration management and security (GitHub) [Added]
- TA6637: Ensure changes in deployment configuration are audited [Added]
- TA6638: Ensure scanners are in place to identify and prevent sensitive data in deployment configuration [Added]
- TA6639: Limit access to deployment configurations [Added]
- TA6640: Ensure deployment configuration manifests are verified [Added]
- TA6641: Ensure deployment configuration manifests are pinned to a specific, verified version [Added]
- TA6674: Ensure deployment configuration files are separated from source code [Added]
- TA6675: Scan Infrastructure as Code (IaC) [Added]
- T3916: Ensure automated and secure deployment (GitHub) [Added]
- P1949: Insecure and uncontrolled deployment practices (GitHub) [Added]
- TA6642: Ensure deployments are automated [Added]
- TA6643: Ensure the deployment environment is reproducible [Added]
- TA6644: Ensure access to production environment is limited [Added]
- TA6645: Ensure default passwords are not used [Added]
- T3917: Test code change management strategies (GitHub) [Added]
- P1933: Inadequate code governance and security (GitHub) [Added]
- TA6676: Test code tracking in a version control platform [Added]
- TA6677: Test traceability of code changes to their associated tasks [Added]
- TA6678: Test approval process for code changes by two strongly authenticated users [Added]
- TA6679: Test dismissal of previous approvals when updates are introduced to a code change proposal [Added]
- TA6680: Test restrictions on who can dismiss code change reviews [Added]
- TA6681: Test code owner settings for extra sensitive code or configuration [Added]
- TA6682: Test requirement of code owner's review when a change affects owned code [Added]
- TA6683: Test periodic review and removal of inactive branches [Added]
- TA6684: Test passing of all checks before merging new code [Added]
- TA6685: Test updating of open Git branches before merging into the code base [Added]
- TA6686: Test branch protection rules enforcement for administrators [Added]
- TA6687: Test denial of force push code to branches [Added]
- TA6688: Test denial of branch deletions [Added]
- TA6689: Test automatic scanning for risks when merging code [Added]
- TA6690: Test auditing of changes to branch protection rules [Added]
- TA6691: Test enforcement of branch protection on the default branch [Added]
- TA6767: Test resolution of all open comments before allowing code change merging [Added]
- TA6768: Test verification of signed commits for new changes before merging [Added]
- TA6769: Test enforcement of linear history [Added]
- TA6770: Test restriction of pushing or merging new code to specific individuals or teams [Added]
- T3918: Test repository management and security strategies (GitHub) [Added]
- P1934: Insufficient repository management and security (GitHub) [Added]
- TA6692: Test presence of SECURITY.md file in all public repositories [Added]
- TA6693: Test restriction of repository creation to specific members [Added]
- TA6694: Test restriction of repository deletion to specific users [Added]
- TA6695: Test restriction of issue deletion to specific users [Added]
- TA6696: Test tracking and accounting of all copies (forks) of code [Added]
- TA6697: Test tracking of changes in visibility status for all code projects [Added]
- TA6698: Test periodic review and archiving of inactive repositories [Added]
- T3919: Test regular review and inactive users removal (GitHub) [Added]
- P1935: Insufficient organizational and access controls (GitHub) [Added]
- TA6699: Test restriction of team creation to specific members [Added]
- TA6700: Test setting of minimum number of administrators for the organization [Added]
- TA6701: Test enforcement of strict base permissions for repositories [Added]
- TA6702: Test tracking of anomalous code behavior [Added]
- TA6771: Test periodic review and removal of inactive users [Added]
- TA6772: Test requirement of Multi-Factor Authentication (MFA) for contributors of new code [Added]
- TA6773: Test enforcement of Multi-Factor Authentication (MFA) for organization members [Added]
- TA6774: Test requirement of company-approved email for inviting new members [Added]
- TA6775: Test setting of two administrators for each repository [Added]
- TA6776: Test confirmation of an organization’s identity with a “Verified” badge [Added]
- TA6777: Test restriction of Source Code Management (SCM) email notifications to verified domains [Added]
- TA6778: Test provision of SSH certificates by the organization [Added]
- TA6779: Test limitation of Git access based on IP addresses [Added]
- T3920: Test application and webhook security strategies (GitHub) [Added]
- P1936: Insufficient application and integration management (GitHub) [Added]
- TA6703: Test requirement of administrator approval for every installed application [Added]
- TA6704: Test periodic review and removal of stale applications [Added]
- TA6705: Test limiting of access granted to each installed application to the least privilege needed [Added]
- TA6706: Test usage of only secured webhooks [Added]
- T3921: Test scanning and security measures (GitHub) [Added]
- P1937: Inadequate automated security scanning (GitHub) [Added]
- TA6780: Test presence of scanners to identify and prevent sensitive data in code [Added]
- TA6781: Test presence of scanners to secure Continuous Integration (CI) pipeline instructions [Added]
- TA6782: Test presence of scanners to secure Infrastructure as Code (IaC) instructions [Added]
- TA6783: Test presence of scanners for code vulnerabilities [Added]
- TA6784: Test presence of scanners for open-source vulnerabilities in used packages [Added]
- TA6785: Test presence of scanners for open-source license issues in used packages [Added]
- T3922: Test pipeline efficiency and security (GitHub) [Added]
- P1938: Insufficient build environment security and management (GitHub) [Added]
- TA6707: Test immutability of all aspects of the pipeline infrastructure and configuration [Added]
- TA6708: Test logging of the build environment [Added]
- TA6709: Test automation of the build environment creation [Added]
- TA6710: Test limitation of access to build environments [Added]
- TA6711: Test requirement of user authentication to access the build environment [Added]
- TA6712: Test automatic scanning of build infrastructure for vulnerabilities [Added]
- TA6713: Test non-usage of default passwords [Added]
- TA6714: Test securing of webhooks in the build environment [Added]
- TA6715: Test setting of minimum number of administrators for the build environment [Added]
- TA6786: Test ensuring each pipeline has a single responsibility [Added]
- TA6787: Test limiting of build secrets to the minimal necessary scope [Added]
- T3923: Test secure build worker management (GitHub) [Added]
- P1939: Insufficient build worker security and management (GitHub) [Added]
- TA6716: Test single-use policy for build workers [Added]
- TA6717: Test passing of build worker environments and commands, not pulling [Added]
- TA6718: Test segregation of duties for each build worker [Added]
- TA6719: Test minimal network connectivity for build workers [Added]
- TA6720: Test enforcement of run-time security for build workers [Added]
- TA6721: Test automatic scanning of build workers for vulnerabilities [Added]
- TA6722: Test storage of build workers' deployment configuration in a version control platform [Added]
- TA6723: Test monitoring of resource consumption by build workers [Added]
- T3924: Test pipeline definition and security (GitHub) [Added]
- P1940: Inadequate pipeline security and configuration management (GitHub) [Added]
- TA6724: Test defining of all build steps as code [Added]
- TA6725: Test clearly defined build stage input and output for steps [Added]
- TA6726: Test writing of output to a separate, secured storage repository [Added]
- TA6727: Test tracking and reviewing of changes to pipeline files [Added]
- TA6728: Test minimizing access to build process triggering [Added]
- TA6729: Test automatic scanning of pipelines for misconfigurations [Added]
- TA6730: Test automatic scanning of pipelines for vulnerabilities [Added]
- TA6788: Test presence of scanners to identify and prevent sensitive data in pipeline files [Added]
- T3925: Test artifact signing (GitHub) [Added]
- P1941: Insufficient artifact and dependency security (GitHub) [Added]
- TA6731: Test signing of all artifacts on all releases [Added]
- TA6732: Test locking of all external dependencies used in the build process [Added]
- TA6733: Test validation of dependencies before use [Added]
- TA6734: Test creation of reproducible artifacts by the build pipeline [Added]
- TA6735: Test production of a Software Bill of Materials (SBOM) by pipeline steps [Added]
- TA6736: Test signing of the Software Bill of Materials (SBOM) produced by pipeline steps [Added]
- TA6789: Test signing of all artifacts on all releases (level 2) [Added]
- T3926: Test third-party artifact security (GitHub) [Added]
- P1942: Insufficient third-party and open-source security (GitHub) [Added]
- TA6737: Test verification of third-party artifacts and open-source libraries [Added]
- TA6738: Test requirement of a signed Software Bill of Materials (SBOM) from all third-party suppliers [Added]
- TA6739: Test requirement and verification of signed metadata of the build process [Added]
- TA6740: Test monitoring of dependencies between open-source components [Added]
- TA6741: Test defining and prioritizing of trusted package managers and repositories [Added]
- TA6742: Test supplying of a signed Software Bill of Materials (SBOM) of the code [Added]
- TA6743: Test pinning of dependencies to a specific, verified version [Added]
- TA6790: Test ensuring all packages used are more than 60 days old [Added]
- T3927: Test dependency management strategy (GitHub) [Added]
- P1943: Inadequate dependency management and security (GitHub) [Added]
- TA6744: Test enforcement of an organization-wide dependency usage policy [Added]
- TA6745: Test automatic scanning of packages for known vulnerabilities [Added]
- TA6746: Test automatic scanning of packages for license implications [Added]
- TA6747: Test automatic scanning of packages for ownership change [Added]
- T3928: Test distributed artifact security (GitHub) [Added]
- P1944: Insufficient artifact security and distribution control (GitHub) [Added]
- TA6791: Test signing of all artifacts by the build pipeline itself [Added]
- TA6792: Test encryption of artifacts before distribution [Added]
- TA6793: Test ensuring only authorized platforms have decryption capabilities of artifacts [Added]
- T3929: Test artifact certification and uploading rules (GitHub) [Added]
- P1945: Insufficient control and security of package registry (GitHub) [Added]
- TA6748: Test limiting of the authority to certify artifacts [Added]
- TA6749: Test minimizing the number of permitted users who may upload new artifacts [Added]
- TA6750: Test non-local user management of the package registry [Added]
- TA6751: Test revocation of anonymous access to artifacts [Added]
- TA6752: Test setting of minimum number of administrators for the package registry [Added]
- TA6794: Test requirement of Multi-Factor Authentication (MFA) for user access to the package registry [Added]
- T3930: Test package registry security (GitHub) [Added]
- P1946: Inadequate package registry validation and security (GitHub) [Added]
- TA6753: Test validation of all signed artifacts upon uploading to the package registry [Added]
- TA6754: Test validation of signatures for all versions of an existing artifact [Added]
- TA6755: Test auditing of changes in package registry configuration [Added]
- TA6756: Test securing of repository webhooks [Added]
- T3931: Test artifact origin information policy (GitHub) [Added]
- P1947: Lack of artifact origin information (GitHub) [Added]
- TA6757: Test ensuring artifacts contain information about their origin [Added]
- T3932: Test separation of deployment configuration files (GitHub) [Added]
- P1948: Inadequate deployment configuration management and security (GitHub) [Added]
- TA6758: Test auditing of changes in deployment configuration [Added]
- TA6759: Test presence of scanners to identify and prevent sensitive data in deployment configuration [Added]
- TA6760: Test limitation of access to deployment configurations [Added]
- TA6761: Test verification of deployment configuration manifests [Added]
- TA6762: Test pinning of deployment configuration manifests to a specific, verified version [Added]
- TA6795: Test separation of deployment configuration files from source code [Added]
- TA6796: Test scanning of Infrastructure as Code (IaC) [Added]
- T3933: Test automated and secure deployment (GitHub) [Added]
- P1949: Insecure and uncontrolled deployment practices (GitHub) [Added]
- TA6763: Test automation of deployments [Added]
- TA6764: Test reproducibility of the deployment environment [Added]
- TA6765: Test limitation of access to the production environment [Added]
- TA6766: Test non-usage of default passwords [Added]
- T3934: Implement policies for secure handling of business data [Added]
- P1950: Insecure handling of business data in Amazon business applications [Added]
- T3935: Protect sensitive cost and billing data [Added]
- P1951: Exposure of sensitive billing data [Added]
- T3936: Isolate application workloads according to security requirements [Added]
- P1952: Insufficient isolation of application workloads [Added]
- T3937: Ensure compute services have sufficient resources and are fault tolerant [Added]
- P1953: Denial of service attacks against application workloads [Added]
- T3938: Monitor application workloads and patch vulnerabilities [Added]
- P1954: Undetected vulnerabilities in application workloads [Added]
- T3939: Deploy and manage application environments through automation [Added]
- P1955: Manual application management processes [Added]
- T3940: Use trusted container images [Added]
- P1956: Vulnerable container images [Added]
- T3941: Protect images against supply chain attacks [Added]
- P1957: Supply chain attacks that target container images [Added]
- T3942: Run containers with a least privilege identity [Added]
- P1958: Containers with excessive privileges [Added]
- T3943: Use IAM authentication for databases if supported [Added]
- P1959: Weaknesses in credential management [Added]
- T3944: Create dedicated database user accounts with minimum privileges [Added]
- P1960: Excessive permissions for database user accounts [Added]
- T3945: Use encryption to protect data at rest [Added]
- P1961: Unencrypted data at rest [Added]
- T3946: Schedule regular database backups to protect availability [Added]
- P1962: Failure to safeguard against data loss in cloud database [Added]
- T3947: Monitor database activity and consider audit logging [Added]
- P1963: Failure to monitor database activity in AWS databases [Added]
- T3948: Use a centralized artifact store to manage dependencies [Added]
- P1964: Vulnerable or malicious application dependencies [Added]
- T3949: Deploy software using automated processes [Added]
- P1965: Poor dependency management with manual deployment [Added]
- T3950: Integrate application security testing into the CI/CD pipeline [Added]
- P1966: Insufficient controls to detect vulnerable code [Added]
- T3951: Give developers least privilege access to the development environment [Added]
- P1967: Excessive permissions in the development environment [Added]
- T3952: Log activity in the development environment [Added]
- P1968: Insufficient monitoring of development activity and CI/CD processes [Added]
- T3953: Strengthen authentication and verification for WorkSpaces and AppStream clients [Added]
- P1969: Weak client authentication for application streaming [Added]
- T3954: Prevent data leakage in WorksSpaces and AppStream environments [Added]
- P1970: Data exfiltration in application workspaces [Added]
- T3955: Use the AWS Web Application Firewall (WAF) with AWS AppSync and AWS Amplify [Added]
- P1971: Failure to protect against common web attacks [Added]
- T3956: Identify authentication requirements for web application clients [Added]
- P1972: Incorrect or insufficient authentication for web APIs or web applications [Added]
- T3957: Add only secure hardware to your system [Added]
- P1973: Vulnerable device hardware or software [Added]
- T3958: Assign a unique, secure identity to each IoT device using client certificates [Added]
- P1974: Insecure identity management for IoT devices [Added]
- T3959: Protect sensitive data on the device [Added]
- P1975: Insecure storage of device data at rest [Added]
- T3960: Use AWS IoT Device Defender as part of your IoT logging strategy [Added]
- P1976: Failure to monitor device activity [Added]
- T3961: Use network segmentation strategies and a secure method to connect devices to the AWS cloud [Added]
- P1977: Weak network protections for IoT devices [Added]
- T3962: Use AWS Organizations to manage multi-account setups [Added]
- P1978: Lack of isolation due to monolithic AWS architecture [Added]
- T3963: Use automated processes to keep people away from data [Added]
- P1979: Manual management processes with insufficient security controls [Added]
- T3964: Implement an autoscaling infrastructure [Added]
- P1980: Compromised availability due to lack of resources [Added]
- T3965: Follow best practices for logging and monitoring [Added]
- P1981: Insecure or insufficient system logging [Added]
- T3966: Implement token-based authentication or signed URLs [Added]
- P1982: Insufficient protection for high-value media content [Added]
- T3967: Look for logging anomalies and consider watermarking content [Added]
- P1983: Failure to detect unauthorized media access [Added]
- T3968: Secure communication from the publisher to your AWS account [Added]
- P1984: Failure to protect the entire content pipeline [Added]
- T3969: Defend media workloads against denial of service attacks [Added]
- P1985: Denial of service attacks against streaming services [Added]
- T3970: Follow the assess, mobilize, migrate pattern [Added]
- P1986: Lack of migration planning [Added]
- T3971: Understand how discovery tools use data and ensure it is handled securely. [Added]
- P1987: Excessive permissions for discovery tools [Added]
- T3972: Begin migrations by establishing a landing zone [Added]
- P1988: Incomplete or insecure deployment [Added]
- T3973: Protect migration data with validation and a secure connection method [Added]
- P1989: Failure to safeguard data during migration [Added]
- T3974: Vet data and monitor models according to best practices [Added]
- P1990: Data poisoning attacks [Added]
- T3975: Vet training data sets for sensitive data and sanitize them [Added]
- P1991: Exposure of sensitive or confidential data [Added]
- T3976: Isolate ML workloads [Added]
- P1992: Unecessary exposure of ML environments [Added]
- T3977: Limit access to ML artifacts [Added]
- P1993: Insufficient protection for ML artifacts [Added]
- T3978: Review the AWS Responsible AI Policy and ensure your application is in compliance [Added]
- P1994: Failure to meet the AWS Responsible AI Policy requirements [Added]
- T3979: Segment your network and implement security controls between zones [Added]
- P1995: Insufficient network isolation in an AWS environment [Added]
- T3980: Put public endpoints behind a content delivery network, gateway, or load balancer [Added]
- P1996: Failure to protect public endpoints [Added]
- T3981: Harden VPCs against denial of service attacks [Added]
- P1997: Denial of service attacks against networks and public endpoints [Added]
- T3982: Implement best practices for hybrid networks [Added]
- P1998: Weak security controls for hybrid networks [Added]
- T3983: Follow best practices for key management and monitoring [Added]
- P1999: Insecure key management in AWS [Added]
- T3984: Ensure security events trigger notifications and responses [Added]
- P2000: Insufficient monitoring of security events [Added]
- T3985: Conduct regular security audits [Added]
- P2001: Failing to follow business security policy [Added]
- T3986: Consider attribute-based access control (ABAC) for authorization at scale [Added]
- P2002: Inflexible IAM policies for large and dynamic systems [Added]
- T3987: Implement access controls based on the sensitivity and criticality of data [Added]
- P2003: Insufficient data access controls [Added]
- T3988: Use detective controls and data auditing to detect anomalous activity [Added]
- P2004: Failure to monitor storage access [Added]
- T3989: Use policies to enforce automatic encryption [Added]
- P2005: Unencrypted data at rest in cloud storage [Added]
- T3990: Schedule regular backups [Added]
- P2006: Failure to safeguard against data loss [Added]
- T3991: Anonymize sensitive data so it is not visible in the analytics environment [Added]
- P2007: Insufficient privacy of data in analytics workloads [Added]
- T3992: Ensure all types of data are reviewed and classified [Added]
- P2008: Insufficient data classification and data controls [Added]
- T3993: Record data classification attributes in your data catalog [Added]
- P2009: Failure to maintain data classification and data controls in different workloads [Added]
- T3994: Validate messages for sensitive data and implement masking and redaction [Added]
- P2010: Sensitive data in messaging services [Added]
- T3995: Follow a least privilege approach when granting permissions to a service [Added]
- P2011: Overly broad permissions for AWS services [Added]
- T3996: Disable public access [Added]
- P2012: Publicly accessible AWS services [Added]
- T3997: Protect internal service communication with VPC endpoints [Added]
- P2013: Network eavesdropping or interception attacks in AWS services [Added]
- T3998: Protect data in transit using TLS [Added]
- P2014: Unencrypted data in transit in AWS services [Added]
- T3999: Protect data at rest with encryption [Added]
- P2015: Unencrypted data at rest in AWS services [Added]
- T4000: Consider using customer-managed keys (CMKs) [Added]
- P2016: Lack of control over encryption keys in AWS services [Added]
- T4001: Ensure logging features are enabled and configured appropriately [Added]
- P2017: Failure to monitor service activity in AWS services [Added]
- T4002: Use conditions to limit policies to specific resources and accounts [Added]
- P2018: Confused deputy attacks in AWS services [Added]
- T4003: Implement strict key processes for storing, handling, and using blockchain keys [Added]
- P2019: Insecure key management in AWS blockchain services [Added]
- T4004: Use established patterns to hide private data and link it to blockchain transactions [Added]
- P2020: Disclosure of private business data [Added]
- T4005: Have a plan for modifying smart contracts or mitigating newly discovered vulnerabilities [Added]
- P2021: Smart contract vulnerabilities [Added]
- T4006: Follow security best practices when utilizing AI tools for code generation [Added]
- P2022: Insecure coding and hallucinations [Added]
- T4007: Follow security best practices when utilizing AI tools for code documentation [Added]
- P2022: Insecure coding and hallucinations [Added]
- T4008: Use a Human-in-the-Loop approach when utilizing AI tools [Added]
- P2023: Lack of expert oversight on AI-generated code [Added]
- T4009: Do not use AI systems for prohibited practices [Added]
- P2024: Lack of complience with EU AI Act [Added]
- T4010: Determine the risk level of your AI systems [Added]
- P2024: Lack of complience with EU AI Act [Added]
- T4011: Implement transparency for end users of General Purpose AI systems [Added]
- P2025: Lack of transparency and accountability in AI systems [Added]
- T4012: Implement requirments for your low risk AI systems [Added]
- P2025: Lack of transparency and accountability in AI systems [Added]
- T4013: Establish a risk management system for high-risk AI systems [Added]
- T4014: Ensure data integrity and governance for high-risk AI systems [Added]
- T4015: Provide comprehensive technical documentation for high-risk AI systems [Added]
- P2025: Lack of transparency and accountability in AI systems [Added]
- T4016: Implement robust record-keeping (logging) for high-risk AI systems [Added]
- T4017: Ensure human oversight for high-risk AI systems [Added]
- P2026: Insufficient human oversight [Added]
- T4018: Ensure transparency with deployers for high-risk AI systems [Added]
- P2025: Lack of transparency and accountability in AI systems [Added]
- T4019: Implement transparency with users of high-risk AI systems [Added]
- P2025: Lack of transparency and accountability in AI systems [Added]
- T4020: Ensure accuracy, robustness, and cybersecurity of high-risk AI systems [Added]
- T4021: Establish a comprehensive quality management system (QMS) for high-risk AI systems [Added]
- P2027: Inadequate quality management of high-risk AI systems [Added]
- T4022: Acquire a conformity certificate for high-risk AI systems via Comformity Assessment [Added]
- P2028: Insufficient validation of high-risk AI systems before market placement [Added]
- T4023: Register high-risk AI systems and provide CE markings [Added]
- P2029: Lack of compliance and traceability for high-risk AI systems [Added]
- T4024: Ensure the responsible and compliant use of high-risk AI systems by deployers [Added]
- P2030: Inadequate implementation and monitoring of high-risk AI systems by deployers [Added]
- T4025: Provide Fundamental Rights Impact Assessment before deploying a high-risk AI system [Added]
- P2028: Insufficient validation of high-risk AI systems before market placement [Added]
- T4026: Technical documentation for general-purpose AI models [Added]
- P2025: Lack of transparency and accountability in AI systems [Added]
- T4027: Implement protocols and ensure compliance for General-Purpose AI models with systemic risk [Added]
- P2031: Inadequate managment of systemic risks associated with GPAI models [Added]
- T4028: Appoint an authorized EU representative for general-purpose AI models (Non-EU providers) [Added]
- P2032: Lack of accountability for non-EU providers of AI models in the EU market [Added]
- T4029: Establish post-market monitoring for high-risk AI systems [Added]
- P2033: Lack of post-market monitoring of AI systems [Added]
- T4030: Adjust reporting policy/incident response plan for serious incidents involving high-risk AI systems [Added]
- P2034: Insufficient reporting and response to serious incidents [Added]
- T4031: Consider using customer-managed encryption keys (CMKs) (AWS Bedrock) [Added]
- P2035: Lack of control with service-managed encryption keys (AWS Bedrock) [Added]
- T4032: Prevent App Mesh nodes from forwarding external traffic (AWS App Mesh) [Added]
- P2036: Exposure to external (public) traffic (AWS App Mesh) [Added]
- T4033: Require TLS for all App Mesh virtual gateways (AWS App Mesh) [Added]
- P2037: Unencrypted communication to mesh gateways (AWS App Mesh) [Added]
- T4034: Regularly check that you are using the latest Envoy image (AWS App Mesh) [Added]
- P2038: Using an old version of the Envoy proxy (AWS App Mesh) [Added]
- T4035: Use vault lock policies to prevent archive deletions (AWS S3 Glacier) [Added]
- P2039: Vault changes could violate compliance requirements (AWS S3 Glacier) [Added]
- T4036: Always use certificate verification during uploads (AWS S3 Glacier) [Added]
- P2040: Uploading archives without certificate validation (AWS S3 Glacier) [Added]
- T4037: Use CloudTrail to monitor Glacier vaults (AWS S3 Glacier) [Added]
- P2041: Failure to monitor vault activity (AWS S3 Glacier) [Added]
- T4038: Enable encryption or configure a security policy for ETL jobs (AWS Glue) [Added]
- P2042: Unencrypted destination and temporary data (AWS Glue) [Added]
- T4039: Enable encryption for the Data Catalog (AWS Glue) [Added]
- P2043: Unencrypted data in the Data Catalog (AWS Glue) [Added]
- T4040: Create a limited service role for AWS Glue jobs and tasks (AWS Glue) [Added]
- P2044: Excessive permissions for the AWS Glue service (AWS Glue) [Added]
- T4041: Consider using a customer managed key for encryption (AWS Glue) [Added]
- P2045: Lack of control over encryption keys (AWS Glue) [Added]
- T4042: Use encrypted data stores with Lake Formation services (AWS Lake Formation) [Added]
- P2046: Unencrypted data at rest (AWS Lake Formation) [Added]
- T4043: Enforce fine-grained access control (AWS Lake Formation) [Added]
- P2047: Incorrect configuration of Lake Formation permissions (AWS Lake Formation) [Added]
- T4044: Grant minimum access to tables, columns, and rows (AWS Lake Formation) [Added]
- P2048: Excessive permissions for Lake Formation data access (AWS Lake Formation) [Added]
- T4045: Use managed identities and follow a least privilege approach to granting permissions [Added]
- P2049: Overly broad permissions for a service [Added]
- T4046: Disable public access and configure service endpoints [Added]
- P2050: Publicly accessible services [Added]
- T4047: Protect internal service communication with Private Link [Added]
- P2051: Network eavesdropping or interception attacks [Added]
- T4048: Protect data in transit using TLS [Added]
- P2052: Unencrypted data in transit in Azure [Added]
- T4049: Protect data at rest with encryption [Added]
- P2053: Unencrypted data at rest in Azure [Added]
- T4050: Consider using customer-managed keys (CMKs) [Added]
- P2054: Lack of control over encryption keys in Azure [Added]
- T4051: Ensure logging features are enabled and configured appropriately [Added]
- P2055: Failure to monitor service activity in Azure [Added]
- T4052: Follow best practices to harden Azure user accounts [Added]
- P2056: Insecure user account management practices in Azure [Added]
- T4053: Restrict the use of highly privileged accounts [Added]
- P2057: Performing adminstrative tasks as the global administrator in Azure [Added]
- T4054: Segregate Azure resources to limit risk [Added]
- P2058: Insufficient isolation in Azure environments [Added]
- T4055: Disable cross-tenant object replication (Azure Blob Storage) [Added]
- P2059: Allowing cross-tenant object replication (Azure Blob Storage) [Added]
- T4056: Enable point-in-time restores for containers (Azure Blob Storage) [Added]
- P2060: Insufficient protection against data loss or corruption (Azure Blob Storage) [Added]
- T4057: Use best practices to limit security risks of SAS (Azure Blob Storage) [Added]
- P2061: Insecure use of SAS (Shared Access Signatures) (Azure Blob Storage) [Added]
- T4058: Limit network access with an IP firewall (Azure Cosmos DB) [Added]
- P2062: Insufficient network-level protection (Azure Cosmos DB) [Added]
- T4059: Enforce a minimum TLS version for database communication (Azure Cosmos DB) [Added]
- P2063: Weak encryption for data in transit (Azure Cosmos DB) [Added]
- T4060: Create dedicated database user accounts with minimum privileges (Azure Cosmos DB) [Added]
- P2064: Excessive permissions for database access (Azure Cosmos DB) [Added]
- T4061: Consider using customer-managed encryption keys (CMKs) (Azure Cosmos DB) [Added]
- P2065: Lack of control with service-managed encryption keys (Azure Cosmos DB) [Added]
- T4062: Consider diagnostic settings for audit logging (Azure Cosmos DB) [Added]
- P2066: Failure to monitor database activity (Azure Cosmos DB) [Added]
- T4063: Limit network access with firewall settings (Azure Data Factory) [Added]
- P2067: Insufficient network-level protection (Azure Data Factory) [Added]
- T4064: Use outbound rules to limit outgoing traffic (Azure Data Factory) [Added]
- P2068: Unrestricted outgoing traffic (Azure Data Factory) [Added]
- T4065: Consider using customer-managed encryption keys (CMKs) (Azure Data Factory) [Added]
- P2069: Lack of control with service-managed encryption keys (Azure Data Factory) [Added]
- T4066: Store data factory secrets in Key Vault (Azure Data Factory) [Added]
- P2070: Inadequate protection of connection strings and credentials (Azure Data Factory) [Added]
- T4067: Use ACLs and follow least privilege guidelines (Azure Data Lake Storage) [Added]
- P2071: Excessive file permissions (Azure Data Lake Storage) [Added]
- T4068: Limit network access with firewall settings (Azure Data Lake Storage) [Added]
- P2072: Insufficient network-level protection (Azure Data Lake Storage) [Added]
- T4069: Enable Microsoft Defender for storage accounts (Azure Data Lake Storage) [Added]
- P2073: Insufficient protection against exploits that target storage accounts (Azure Data Lake Storage) [Added]
- T4070: Enforce TLS for all connections (Azure Data Lake Storage) [Added]
- P2074: Lack of protection for data in transit (Azure Data Lake Storage) [Added]
- T4071: Conside using customer-managed encryption keys (CMKs) (Azure Data Lake Storage) [Added]
- P2075: Lack of control with service-managed encryption keys (Azure Data Lake Storage) [Added]
- T4072: Enable soft delete features (Azure Data Lake Storage) [Added]
- P2076: Insufficient protection against data deletion (Azure Data Lake Storage) [Added]
- T4073: Set retention policies on immutable data (Azure Data Lake Storage) [Added]
- P2077: Failing to prevent changes to data that must be retained in its original form (Azure Data Lake Storage) [Added]
- T4074: Enable logging for file storage activity (Azure Data Lake Storage) [Added]
- P2078: Failure to monitor file storage activity (Azure Data Lake Storage) [Added]
- T4075: Add a Resource Manager lock for every storage account (Azure Data Lake Storage) [Added]
- P2079: Storage account deletion (Azure Data Lake Storage) [Added]
- T4076: Do not allow shared key authentication (Azure Data Lake Storage) [Added]
- P2080: Account keys grant excessive permissions with no security controls (Azure Data Lake Storage) [Added]
- T4077: Limit network access with firewall settings (Azure Event Hubs) [Added]
- P2081: Insufficient network-level protection (Azure Event Hubs) [Added]
- T4078: Prefer Microsoft Entra to shared access policies for authentication (Azure Event Hubs) [Added]
- P2082: Insecure management of authentication credentials (Azure Event Hubs) [Added]
- T4079: Consider using customer-managed encryption keys (CMKs) (Azure Event Hubs) [Added]
- P2083: Lack of control with service-managed encryption keys (Azure Event Hubs) [Added]
- T4080: Enforce a minimum TLS version of 1.2 (Azure Event Hubs) [Added]
- P2084: Weak encryption for data in transit (Azure Event Hubs) [Added]
- T4081: Add only secure hardware to your system (Azure IoT Hub) [Added]
- P2085: Insecure devices (Azure IoT Hub) [Added]
- T4082: Enable Defender for IoT for agentless threat detection (Azure IoT Hub) [Added]
- P2086: Insufficient monitoring and failure to detect security events (Azure IoT Hub) [Added]
- T4083: Consider Device Update for IoT Hub (Azure IoT Hub) [Added]
- P2087: Devices with older software or firmware (Azure IoT Hub) [Added]
- T4084: Limit network access with firewall settings (Azure IoT Hub) [Added]
- P2088: Insufficient network-level protection (Azure IoT Hub) [Added]
- T4085: Prefer Microsoft Entra to shared access policies for authentication (Azure IoT Hub) [Added]
- P2089: Insecure management of authentication credentials (Azure IoT Hub) [Added]
- T4086: Give minimum privileges when granting access to IoT Hub (Azure IoT Hub) [Added]
- P2090: Excessive permissions for IoT users (Azure IoT Hub) [Added]
- T4087: Authenticate devices with X.509 Certificates (Azure IoT Hub) [Added]
- P2091: Poor credential management for IoT Hub devices (Azure IoT Hub) [Added]
- T4088: Consider enforcing a minimum TLS version of 1.2 (Azure IoT Hub) [Added]
- P2092: Weak encryption for data in transit (Azure IoT Hub) [Added]
- T4089: Apply for an exemption to abuse monitoring (Azure OpenAI) [Added]
- P2093: Abuse monitoring has access to highly sensitive information (Azure OpenAI) [Added]
- T4090: Consider using customer-managed encryption keys (CMKs) (Azure OpenAI) [Added]
- P2094: Lack of control with service-managed encryption keys (Azure OpenAI) [Added]
- T4091: Review the Responsible AI guidance and ensure your application is in compliance (Azure OpenAI) [Added]
- P2095: Failure to meet the Responsible AI requirements (Azure OpenAI) [Added]
- T4092: Follow best practices for service account identities [Added]
- P2096: Insecure service identities in Google Cloud Platform (GCP) [Added]
- T4093: Follow a least privilege approach when granting service permissions [Added]
- P2097: Overly broad permissions for a service in Google Cloud Platform (GCP) [Added]
- T4094: Disable public access and use private connect [Added]
- P2098: Publicly accessible services in Google Cloud Platform (GCP) [Added]
- T4095: Consider using customer-managed keys (CMEKs) [Added]
- P2099: Lack of control over encryption keys in Google Cloud Platform (GCP) [Added]
- T4096: Ensure logging features are enabled and configured appropriately [Added]
- P2100: Failure to monitor service activity in Google Cloud Platform (GCP) [Added]
- T4097: Follow best practices to harden GCP user accounts [Added]
- P2101: Insecure user account management practices in Google Cloud Platform (GCP) [Added]
- T4098: Restrict the use of highly privileged accounts [Added]
- P2102: Performing adminstrative tasks as a super administrator in Google Cloud Platform (GCP) [Added]
- T4099: Segregate GCP resources to limit risk [Added]
- P2103: Insufficient isolation in GCP environments in Google Cloud Platform (GCP) [Added]
- T4100: Limit user permissions that can allow privilege escalation [Added]
- P2104: Privilege-escalation attacks with service accounts in Google Cloud Platform (GCP) [Added]
- T4101: Use LDAPS or another encrypted protocol [Added]
- P2105: Unencrypted communication between clients and directory servers [Added]
- T4102: Identify threats with active monitoring and pen testing [Added]
- P2106: LDAP reconnaissance [Added]
- T4103: Implement secure password policies and MFA [Added]
- P2107: Weak password policies and authentication practices [Added]
- T4104: Follow a least privilege approach when granting permissions [Added]
- P2108: Excessive user privileges [Added]
- T4105: Sanitize input or use parameterized LDAP queries [Added]
- P2109: LDAP injection [Added]
- T4106: Use network and OS controls to isolate directory servers [Added]
- P2110: Insufficient isolation of directory servers [Added]
- T4107: Harden the backup process and limit human access [Added]
- P2111: Insecure replication or backup practices [Added]
- T4108: Keep directory servers up to date [Added]
- P2112: Out-of-date software on the directory server [Added]
- T4109: Use DNSSEC to sign DNS records [Added]
- P2113: DNS spoofing and cache poisoning [Added]
- T4110: Implement in-transit encryption with DoT or DoH [Added]
- P2114: Lack of in-transit encryption for DNS queries [Added]
- T4111: Implement DoS protections [Added]
- P2115: DNS denial of service attacks [Added]
- T4112: Restrict zone transfers to authorized DNS servers [Added]
- P2116: Information exposure due to unauthorized zone transfers [Added]
- T4113: Use strict access controls for administration in DNS servers [Added]
- P2117: Insecure management interfaces in DNS [Added]
- T4114: Monitor DNS server activity [Added]
- P2118: Failure to monitor DNS server activity [Added]
- T4115: Keep DNS servers up to date [Added]
- P2119: Out-of-date DNS server software [Added]
- T4116: Deploy firewalls at the network perimeter and between zones [Added]
- P2120: Improper firewall placement [Added]
- T4117: Follow best practices when writing and ordering firewall rules [Added]
- P2121: Disorganized firewall rules [Added]
- T4118: Implement a logging strategy that satisfies both security and performance requirements [Added]
- P2122: Excessive or inadequate logging in firewall [Added]
- T4119: Use strict access controls for administration in firewalls [Added]
- P2123: Insecure management interfaces in firewall [Added]
- T4120: Keep firewall software and firmware up to date [Added]
- P2124: Out-of-date firewall software or hardware [Added]
- T4121: Back up firewall configuration [Added]
- P2125: Failure to back up firewall configuration [Added]
- T4122: Configure firewall failover and redundancy [Added]
- P2126: Failure to design for high availability firewall [Added]
- T4123: Support the FTPS or SFTP protocol [Added]
- P2127: Unencrypted data in transit in FTP [Added]
- T4124: Isolate the FTP server in a DMZ [Added]
- P2128: Improper network placement of the FTP server [Added]
- T4125: Prefer client certificates and strong authentication practices [Added]
- P2129: Weak authentication practices for FTP clients [Added]
- T4126: Enforce user-specific FTP file storage [Added]
- P2130: Insufficient isolation of FTP file storage [Added]
- T4127: Filter uploads and ensure files are handled safely [Added]
- P2131: Malicious file uploads [Added]
- T4128: Use strict access controls for administration in FTP servers [Added]
- P2132: Insecure management interfaces in FTP server [Added]
- T4129: Monitor FTP server activity [Added]
- P2133: Failure to monitor FTP server activity [Added]
- T4130: Keep FTP servers up to date [Added]
- P2134: Out-of-date FTP server software [Added]
- T4131: Tune IDS/IPS rules to mitigate false positives [Added]
- P2135: Excessive IDS/IPS false positives [Added]
- T4132: Tune for efficiency based on risk analysis [Added]
- P2136: Poor IDS/IPS performance or high resource consumption [Added]
- T4133: Monitor alerts and take manual or automatic actions in response [Added]
- P2137: Failure to monitor security events [Added]
- T4134: Use strict access controls for administration in IDS/IPS systems [Added]
- P2138: Insecure management interfaces in IPS/IDS [Added]
- T4135: Keep IDS/IPS up to date [Added]
- P2139: Out-of-date detection rules or software [Added]
- T4136: Harden the session persistence cookie [Added]
- P2140: Attacks against the session persistence cookie [Added]
- T4137: Configure end-to-end TLS encryption [Added]
- P2141: Unencrypted data on internal networks [Added]
- T4138: Use a web application firewall or other network protections [Added]
- P2142: Denial of service attacks against load balancers [Added]
- T4139: Use strict access controls for administration in load balancers [Added]
- P2143: Inadequate security for management interfaces [Added]
- T4140: Keep load balancers up to date [Added]
- P2144: Out-of-date load balancer software or hardware [Added]
- T4141: Configure load balancer failover and redundancy [Added]
- P2145: Failure to design for high availability load balancer [Added]
- T4142: Protect message traffic with TLS and consider end-to-end message encryption [Added]
- P2146: Unencrypted message data [Added]
- T4143: Use message signing and integrity checks [Added]
- P2147: Message tampering in message broker [Added]
- T4144: Use data integrity and privacy controls [Added]
- P2148: Sensitive or malicious data in messages [Added]
- T4145: Require client authentication and implement least privilege permissions [Added]
- P2149: Weak authentication or excessive privileges for message clients [Added]
- T4146: Implement defenses against denial of service attacks [Added]
- P2150: Denial of service attacks against message brokers [Added]
- T4147: Use strict access controls for administration [Added]
- P2151: Insecure management interfaces in message broker [Added]
- T4148: Monitor message broker activity [Added]
- P2152: Failure to monitor message broker activity [Added]
- T4149: Back up message brokers [Added]
- P2153: Failure to back up message brokers [Added]
- T4150: Only connect to FTP servers using FTPS or SFTP [Added]
- P2154: Connecting over unencrypted FTP [Added]
- T4151: Choose secure FTP client software and install updates promptly [Added]
- P2155: Insecure FTP client software [Added]
- T4152: Secure the configuration of the client [Added]
- P2156: Insecure configuration of VPN client software or devices [Added]
- T4153: Use network segmentation to separate proxy servers from other resources [Added]
- P2157: Incorrect placement of a proxy server [Added]
- T4154: Use strict access controls for administration [Added]
- P2158: Insecure management interfaces in proxy server [Added]
- T4155: Use content filtering to block malicious sites [Added]
- P2159: Lack of content filtering [Added]
- T4156: Document any case of proxy server bypass [Added]
- P2160: Undocumented proxy server bypass rules [Added]
- T4157: Monitor proxy server traffic [Added]
- P2161: Failure to monitor proxy server activity [Added]
- T4158: Keep proxy servers up to date [Added]
- P2162: Out-of-date proxy server software [Added]
- T4159: Place routers in a secure location [Added]
- P2163: Routers in an insecure location device access [Added]
- T4160: Authenticate devices with 802.1X or another secure protocol [Added]
- P2164: Unauthorized device access [Added]
- T4161: Disable unnecessary services [Added]
- P2165: Unused router services [Added]
- T4162: Keep router firmware up to date [Added]
- P2166: Unpatched vulnerabilities in router hardware [Added]
- T4163: Collect and monitor router traffic logs [Added]
- P2167: Failure to monitor network traffic [Added]
- T4164: Configure port filtering [Added]
- P2168: Overly permissive port access [Added]
- T4165: Protect message traffic with TLS encryption [Added]
- P2169: Unencrypted message data in transit in Service Bus [Added]
- T4166: Use validation and integrity checks [Added]
- P2170: Message tampering in service bus [Added]
- T4167: Apply consistent security policy to all services in a service bus [Added]
- P2171: Inconsistent application of security measures across different services [Added]
- T4168: Require client authentication and implement least privilege permissions [Added]
- P2172: Weak authentication for message producers [Added]
- T4169: Implement defenses against denial of service attacks [Added]
- P2173: Vulnerability to denial of service attacks and failure [Added]
- T4170: Use strict access controls for administration [Added]
- P2174: Insecure management interfaces in service bus [Added]
- T4171: Monitor service bus activity [Added]
- P2175: Failure to monitor service bus activity [Added]
- T4172: Choose a secure VPN protocol [Added]
- P2176: Insecure or noncompliant VPN protocols [Added]
- T4173: Prefer client certificates and MFA for authentication [Added]
- P2177: Weak authentication for VPN clients [Added]
- T4174: Monitor VPN activity [Added]
- P2178: Failure to monitor VPN traffic and events [Added]
- T4175: Use strict access controls for administration [Added]
- P2179: Insecure management interfaces in VPN server [Added]
- T4176: Keep VPN servers up to date [Added]
- P2180: Out-of-date VPN server software [Added]
- T4177: Use end-to-end encryption in addition to 3G network encryption [Added]
- P2181: Insufficient encryption over a 3G network [Added]
- T4178: Consider using a private APN [Added]
- P2182: Insufficient segregation of cell network traffic in 3G network [Added]
- T4179: Restrict the use of legacy protocols and monitor device connections [Added]
- P2183: Fake base station attacks in 3G network [Added]
- T4180: Harden cell network hardware and monitor performance [Added]
- P2184: Denial of service attacks against a 3G network [Added]
- T4181: Restrict physical access to devices, and prefer eSIMs [Added]
- P2185: SIM cloning attacks in 3G network [Added]
- T4182: Use end-to-end encryption in addition to LTE network encryption [Added]
- P2186: Insufficient encryption over an LTE network [Added]
- T4183: Consider using a private APN [Added]
- P2187: Insufficient segregation of cell network traffic in LTE network [Added]
- T4184: Restrict the use of legacy protocols and monitor device connections [Added]
- P2188: Fake base station attacks in LTE network [Added]
- T4185: Harden cell network hardware and monitor performance [Added]
- P2189: Denial of service attacks against an LTE network [Added]
- T4186: Restrict physical access to devices, and prefer eSIMs [Added]
- P2190: SIM cloning attacks in LTE network [Added]
- T4187: Use end-to-end encryption in addition to 5G network encryption [Added]
- P2191: Insufficient encryption over a 5G network [Added]
- T4188: Consider using network slicing or a private APN [Added]
- P2192: Insufficient segregation of cell network traffic in 5G network [Added]
- T4189: Restrict the use of legacy protocols and monitor device connections [Added]
- P2193: Fake base station attacks in 5G network [Added]
- T4190: Harden cell network hardware and monitor performance [Added]
- P2194: Denial of service attacks against a 5G network [Added]
- T4191: Restrict physical access to devices, and prefer eSIMs [Added]
- P2195: SIM cloning attacks in 5G network [Added]
- T4192: Choose devices and infrastructure that supports LoRaWAN 1.1 [Added]
- P2196: Old or insecure LoRa versions [Added]
- T4193: Choose EDs with security features and restrict physical access [Added]
- P2197: Device tampering or key extraction [Added]
- T4194: Monitor traffic from ED devices [Added]
- P2198: Denial of service attacks using signal jamming [Added]
- T4195: Use encrypted communication between network servers and application servers [Added]
- P2199: Insecure data transmission to the application server [Added]
- T4196: Separate LoRa devices with network segmentation [Added]
- P2200: Insufficient network isolation of LoRa devices [Added]
- T4197: Use Modbus/TCP Security for TLS encryption [Added]
- P2201: Unencrypted data in transit in Modbus [Added]
- T4198: Separate ModBus devices with network segmentation [Added]
- P2202: Insufficient network isolation of Modbus devices [Added]
- T4199: Use Modbus/TCP Security and monitor with an IDS/IPS [Added]
- P2203: Modbus flooding and denial of service attacks [Added]
- T4200: Start a TLS security session before transmitting data over AMQP [Added]
- P2204: Unencrypted data in transit in AMQP [Added]
- T4201: Choose a suitable authentication method in SASL [Added]
- P2205: Anonymous access in AMQP [Added]
- T4202: Validate messages and install all message broker updates [Added]
- P2206: Deserialization of malicious objects in AMQP [Added]
- T4203: Distribute certificates to CDN servers and configure TLS [Added]
- P2207: Unencrypted data in transit in Content Delivery Network (CDN) [Added]
- T4204: Enforce access control for protected content [Added]
- P2208: Missing access control for protected content in Content Delivery Network (CDN) [Added]
- T4205: Generate consistent cache keys and sanitize all inputs [Added]
- P2209: CDN cache poisoning [Added]
T4206: Deploy a WAF at the CDN edge [Added]
- P2210: Denial of service and other common web attacks in Content Delivery Network (CDN) [Added]
Changes to Project Properties and Profiles
- Q207: Application Layer
- Q186: Application Layer Protocols Used
- A1573: File Transfer Protocol (FTP) [Added]
- A1583: Modbus [Added]
- A1584: Advanced Message Queuing Protocol (AMQP) [Added]
- Q186: Application Layer Protocols Used
- Q211: Development Tools
- Q235: Uses Static or Dynamic Security Code Analysis
- Q364: Version control platforms [Added]
- A1390: GitHub [Added]
- Q364: Version control platforms [Added]
- Q235: Uses Static or Dynamic Security Code Analysis
- Q243: Internal Hidden Properties
- Q189: Internal Properties (Use this, for all hidden answers)
- A1484: AWS Business Applications (hidden) [Added]
- A1485: AWS Cloud Financial Management (hidden) [Added]
- A1486: AWS Compute Services (hidden) [Added]
- A1487: AWS Containers (hidden) [Added]
- A1488: AWS Database (hidden) [Added]
- A1489: AWS Developer Tools (hidden) [Added]
- A1490: AWS End User Computing (hidden) [Added]
- A1491: AWS Front-end Web and Mobile Services (hidden) [Added]
- A1492: AWS Internet of Things (IoT) (hidden) [Added]
- A1493: AWS Management and Governance (hidden) [Added]
- A1494: AWS Media Services (hidden) [Added]
- A1495: AWS Migration and Transfer (hidden) [Added]
- A1496: AWS Machine Learning (ML) and Artificial Intelligence (AI) (hidden) [Added]
- A1497: AWS Networking and Content Delivery (hidden) [Added]
- A1498: AWS Security, Identity, and Compliance (hidden) [Added]
- A1499: AWS Storage (hidden) [Added]
- A1500: AWS Analytics (hidden) [Added]
- A1501: AWS Application Integration (hidden) [Added]
- A1502: AWS All Services (hidden) [Added]
- A1503: AWS Blockchain (hidden) [Added]
- A1515: Azure AI + Machine Learning (hidden) [Added]
- A1516: Azure Analytics (hidden) [Added]
- A1517: Azure Compute (hidden) [Added]
- A1518: Azure Containers (hidden) [Added]
- A1519: Azure Databases (hidden) [Added]
- A1520: Azure Developer tools (hidden) [Added]
- A1521: Azure DevOps (hidden) [Added]
- A1522: Azure Hybrid + multicloud (hidden) [Added]
- A1523: Azure Identity (hidden) [Added]
- A1524: Azure Integration (hidden) [Added]
- A1525: Azure Internet of Things (hidden) [Added]
- A1526: Azure Management and Governance (hidden) [Added]
- A1527: Azure Media (hidden) [Added]
- A1528: Azure Migration (hidden) [Added]
- A1529: Azure Mixed Reality (hidden) [Added]
- A1530: Azure Mobile (hidden) [Added]
- A1531: Azure Networking (hidden) [Added]
- A1532: Azure Security (hidden) [Added]
- A1533: Azure Storage (hidden) [Added]
- A1534: Azure Virtual Desktop Infrastructure (hidden) [Added]
- A1535: Azure Web (hidden) [Added]
- A1538: Azure All Services (hidden) [Added]
- A1539: ANSI/ISA 62443-4-1 [Added]
- A1540: Google Cloud AI and Machine Learning (hidden) [Added]
- A1541: Google Cloud AI Infrastructure (hidden) [Added]
- A1542: Google Cloud AI Solutions (hidden) [Added]
- A1543: Google Cloud Business Intelligence (hidden) [Added]
- A1544: Google Cloud Compute (hidden) [Added]
- A1545: Google Cloud Containers (hidden) [Added]
- A1546: Google Cloud Data Analytics (hidden) [Added]
- A1547: Google Cloud Databases (hidden) [Added]
- A1548: Google Cloud Developer Tools (hidden) [Added]
- A1549: Google Cloud Distributed Cloud (hidden) [Added]
- A1550: Google Cloud Hybrid and Multicloud (hidden) [Added]
- A1551: Google Cloud Industry Specific (hidden) [Added]
- A1552: Google Cloud Integration Services (hidden) [Added]
- A1553: Google Cloud Management Tools (hidden) [Added]
- A1554: Google Cloud Maps and Geospatial (hidden) [Added]
- A1555: Google Cloud Media Services (hidden) [Added]
- A1556: Google Cloud Migration (hidden) [Added]
- A1557: Google Cloud Mixed Reality (hidden) [Added]
- A1558: Google Cloud Networking (hidden) [Added]
- A1559: Google Cloud Operations (hidden) [Added]
- A1560: Google Cloud Productivity and Collaboration (hidden) [Added]
- A1561: Google Cloud Security and Identity (hidden) [Added]
- A1562: Google Cloud Serverless (hidden) [Added]
- A1563: Google Cloud Storage (hidden) [Added]
- A1564: Google Cloud Web3 (hidden) [Added]
- A1565: Google Cloud All Services (hidden) [Added]
- Q189: Internal Properties (Use this, for all hidden answers)
- Q249: Industrial Control Systems
- Q250: In-Scope for ANSI/ISA 62443 or CSA/SSA-311
- A1374: ANSI/ISA 62443-4-1 or SDLA 312 [Added]
- Q250: In-Scope for ANSI/ISA 62443 or CSA/SSA-311
- Q276: Network Layer
- Q371: Virtual Private Network (VPN) [Added]
- A1574: Virtual Private Network (VPN) [Added]
- Q349: Broadband cellular networks
- A1344: Long-Term Evolution (LTE) or Fifth-generation (5G) technologies [Removed]
- A1579: 3G [Added]
- A1580: 4G/LTE [Added]
- A1581: 5G [Added]
- Q339: Wireless Protocols Used
- A1582: LoRa [Added]
- Q371: Virtual Private Network (VPN) [Added]
- Q284: Context and Characteristics
- Q252: Application's Context and Characteristics
- Q368: Type of AI system [Added]
- A1506: High Risk [Added]
- A1507: Limited/ low risk [Added]
- A1508: General purpose AI models [Added]
- A1509: General Purpose AI Models with Systemic Risk [Added]
- Q357: Artificial Intelligence/Machine Learning
- A1504: LLM-based Code Generation [Added]
- A1505: EU AI Act [Added]
- Q368: Type of AI system [Added]
- Q252: Application's Context and Characteristics
- Q289: Cloud Computing
- Q290: Cloud Providers
- A1159: Amazon Web Services (AWS) Content (Not Story-driven) [Updated]
- INFO: Updated the children.
- A1190: Microsoft Azure [Updated]
- INFO: Updated the children.
- A1212: Google Cloud Content (Not Story-driven) [Updated]
- INFO: Updated the children.
- A1159: Amazon Web Services (AWS) Content (Not Story-driven) [Updated]
- Q290: Cloud Providers
- Q299: General
- Q296: Assurance Level
- A1161: Include more in-depth controls [Updated]
- INFO: Updated the description.
- A1161: Include more in-depth controls [Updated]
- Q296: Assurance Level
- Q304: Database Technologies
- Q305: Database Management System (DBMS)
- A1368: InfluxDB [Added]
- A1369: Neo4j [Added]
- A1370: MariaDB [Added]
- A1371: CockroachDB [Added]
- A1372: Apache Cassandra [Added]
- A1373: MarkLogic [Added]
- Q305: Database Management System (DBMS)
- Q361: Amazon Web Services (AWS) [Added]
- Q366: AWS Cloud Configuration [Added]
- A1392: AWS Cloud Configuration [Added]
- Q298: AWS Services [Updated]
- INFO: Updated the parent.
- A1165: RDS [Updated]
- INFO: Updated the description.
- A1166: EBS [Updated]
- INFO: Updated the description.
- A1167: AMI [Updated]
- INFO: Updated the description.
- A1168: ELB [Updated]
- INFO: Updated the description.
- A1170: IAM [Updated]
- INFO: Updated the description.
- A1171: EC2 [Updated]
- INFO: Updated the description.
- A1173: SNS [Updated]
- INFO: Updated the description.
- A1177: VPC [Updated]
- INFO: Updated the description.
- A1178: KMS [Updated]
- INFO: Updated the description.
- A1227: SQS [Updated]
- INFO: Updated the description.
- A1270: ECS [Updated]
- INFO: Updated the description.
- A1271: DynamoDB [Updated]
- INFO: Updated the description.
- A1331: EKS [Updated]
- INFO: Updated the description.
- A1347: Kinesis Data Streams [Updated]
- INFO: Updated the description.
- A1366: SageMaker [Updated]
- INFO: Updated the description.
- A1375: Certificate Manager [Added]
- A1376: CloudFormation [Added]
- A1377: ECR [Added]
- A1378: EFS [Added]
- A1379: ElastiCache [Added]
- A1380: MSK [Added]
- A1381: MQ [Added]
- A1382: OpenSearch [Added]
- A1383: RedShift [Added]
- A1384: Secrets Manager [Added]
- A1385: SES [Added]
- A1386: Step Functions [Added]
- A1387: Systems Manager [Added]
- A1388: Transfer Family [Added]
- A1510: AWS App Mesh [Added]
- A1511: AWS Bedrock [Added]
- A1512: AWS S3 Glacier [Added]
- A1513: AWS Glue [Added]
- A1514: AWS Lake Formation [Added]
- Q366: AWS Cloud Configuration [Added]
- Q362: Microsoft Azure [Added]
- Q365: Azure Cloud Configuration [Added]
- A1391: Azure Cloud Configuration [Added]
- Q306: Azure Services [Updated]
- INFO: Updated the parent.
- Q370: More Azure Services [Added]
- A1196: Multi-Factor Authentication [Updated]
- INFO: Updated the question.
- A1198: Virtual Machines [Updated]
- INFO: Updated the question.
- A1199: Security Center [Updated]
- INFO: Updated the question.
- A1200: Storage [Updated]
- INFO: Updated the question.
- A1201: SQL Database [Updated]
- INFO: Updated the question.
- A1202: Virtual Network [Updated]
- INFO: Updated the question.
- A1203: Monitor [Updated]
- INFO: Updated the question.
- A1204: Key Vault [Updated]
- INFO: Updated the question.
- A1205: Network Watcher [Updated]
- INFO: Updated the question.
- A1206: Resource Manager [Updated]
- INFO: Updated the question.
- A1396: Azure Machine Learning [Added]
- A1397: Azure OpenAI Service [Added]
- A1402: Azure Stream Analytics [Added]
- A1403: Azure Synapse Analytics [Added]
- A1406: Azure Linux Virtual Machines [Added]
- A1407: Azure Spring Apps [Added]
- A1408: Azure Virtual Desktop [Added]
- A1409: Azure Virtual Machine Scale Sets [Added]
- A1410: Azure VMware Solution [Added]
- A1411: Azure Windows Virtual Machines [Added]
- A1415: Azure Red Hat OpenShift [Added]
- A1421: Azure Managed Instance for Apache Cassandra [Added]
- A1422: Azure SQL [Added]
- A1426: Azure Stack Edge [Added]
- A1430: Azure Logic Apps [Added]
- A1431: Azure Service Bus [Added]
- A1432: Azure Web PubSub [Added]
- A1435: Azure Notification Hubs [Added]
- A1439: Azure Lighthouse [Added]
- A1440: Azure Managed Applications [Added]
- A1441: Azure Policy [Added]
- A1442: Azure Purview [Added]
- A1443: Azure Resource Manager templates [Added]
- A1444: Azure Resource Mover [Added]
- A1445: Azure Media Services [Added]
- A1447: Azure Migrate [Added]
- A1448: Azure Site Recovery [Added]
- A1450: Azure Remote Rendering [Added]
- A1451: Azure Spatial Anchors [Added]
- A1461: Azure Load Balancer [Added]
- A1462: Azure NAT Gateway [Added]
- A1463: Azure Network Watcher [Added]
- A1464: Azure Private Link [Added]
- A1465: Azure Traffic Manager [Added]
- A1466: Azure Virtual WAN [Added]
- A1467: Azure VPN Gateway [Added]
- A1468: Azure Web Application Firewall [Added]
- A1469: Azure PostgreSQL Database [Added]
- A1475: Azure Sentinel [Added]
- A1480: Azure Managed Lustre [Added]
- A1481: Azure NetApp Files [Added]
- A1483: Azure SignalR Service [Added]
- A1196: Multi-Factor Authentication [Updated]
- A1394: Azure AI Bot Service [Added]
- A1395: Azure Databricks [Added]
- A1398: Azure Analysis Services [Added]
- A1399: Azure Data Explorer [Added]
- A1400: Azure Data Lake Analytics [Added]
- A1401: Azure Event Hubs [Added]
- A1404: Azure App Service [Added]
- A1405: Azure Batch [Added]
- A1412: Azure Container Apps [Added]
- A1413: Azure Container Instances [Added]
- A1414: Azure Container Registry [Added]
- A1416: Azure Cache for Redis [Added]
- A1417: Azure Cosmos DB [Added]
- A1418: Azure Data Factory [Added]
- A1419: Azure Database for MariaDB [Added]
- A1420: Azure Database for MySQL [Added]
- A1423: Azure App Configuration [Added]
- A1424: Azure DevTest Labs [Added]
- A1425: Azure Arc [Added]
- A1427: Azure Active Directory External Identities [Added]
- A1428: Azure API Management [Added]
- A1429: Azure Event Grid [Added]
- A1433: Azure IoT Central [Added]
- A1434: Azure IoT Hub [Added]
- A1436: Azure Automation [Added]
- A1437: Azure Cloud Shell [Added]
- A1438: Azure Cost Management [Added]
- A1446: Azure Database Migration Service [Added]
- A1449: Azure Digital Twins [Added]
- A1452: Azure Application Gateway [Added]
- A1453: Azure Bastion [Added]
- A1454: Azure Communications Gateway [Added]
- A1455: Azure Content Delivery Network [Added]
- A1456: Azure DDoS Protection [Added]
- A1457: Azure DNS [Added]
- A1458: Azure Firewall [Added]
- A1459: Azure Firewall Manager [Added]
- A1460: Azure Front Door [Added]
- A1470: Azure Attestation [Added]
- A1471: Azure Dedicated HSM [Added]
- A1472: Azure Defender for Cloud [Added]
- A1473: Azure Information Protection [Added]
- A1474: Azure Key Vault Managed HSM [Added]
- A1476: Azure Backup [Added]
- A1477: Azure Data Box [Added]
- A1478: Azure Data Share [Added]
- A1479: Azure HPC Cache [Added]
- A1482: Azure Communication Services [Added]
- A1536: Azure Blob Storage [Added]
- A1537: Azure Data Lake Storage [Added]
- Q365: Azure Cloud Configuration [Added]
- Q363: Google Cloud Platform (GCP) [Added]
- Q367: GCP Cloud Configuration [Added]
- A1393: GCP Cloud Configuration [Added]
- Q309: Google Cloud Services [Updated]
- INFO: Updated the parent.
- Q367: GCP Cloud Configuration [Added]
- Q369: Network Technologies [Added]
- Q372: Network Components [Added]
- A1566: Directory Server [Added]
- A1567: DNS Server [Added]
- A1568: Firewall [Added]
- A1569: FTP Server [Added]
- A1570: IDS/IPS [Added]
- A1571: Load Balancer [Added]
- A1572: Message Broker [Added]
- A1575: Proxy Server [Added]
- A1576: Router [Added]
- A1577: Service Bus [Added]
- A1578: Virtual Private Network (VPN) Server [Added]
- A1585: Content Delivery Network (CDN) [Added]
- Q372: Network Components [Added]
- Q207: Application Layer
Added Components
- SC3: NoSQL Database
- SC5: MongoDB
- SC11: SQLite
- SC102: Azure PostgreSQL Database
- SC104: Apache Cassandra
- SC105: InfluxDB
- SC106: Neo4j
- SC107: MarkLogic
- SC109: CockroachDB
- SC110: MariaDB
- SC111: Cloud Environment
- SC112: AWS Environment
- SC113: Azure Environment
- SC114: GCP Environment
- SC115: AWS Athena
- SC116: AWS Clean Rooms
- SC117: AWS CloudSearch
- SC118: AWS Data Exchange
- SC119: AWS Data Pipeline
- SC120: AWS DataZone
- SC121: AWS EMR
- SC122: AWS Entity Resolution
- SC123: AWS FinSpace
- SC124: AWS Glue
- SC125: AWS Kinesis
- SC126: AWS Kinesis Video Streams
- SC127: AWS Lake Formation
- SC128: AWS Managed Service for Apache Flink
- SC129: AWS Managed Streaming for Apache Kafka (MSK)
- SC130: AWS OpenSearch Serverless
- SC131: AWS OpenSearch Service
- SC132: AWS QuickSight
- SC133: AWS Redshift
- SC134: AWS Redshift Serverless
- SC135: AWS AppFlow
- SC136: AWS B2B Data Interchange
- SC137: AWS EventBridge
- SC138: AWS Managed Workflows for Apache Airflow (MWAA)
- SC139: AWS MQ
- SC140: AWS Simple Workflow Service
- SC141: AWS Step Functions
- SC142: AWS Managed Blockchain
- SC143: AWS Alexa for Business
- SC144: AWS AppFabric
- SC145: AWS Chime
- SC146: AWS Chime SDK
- SC147: AWS Connect
- SC148: AWS Honeycode
- SC149: AWS Pinpoint
- SC150: AWS Simple Email Service (SES)
- SC151: AWS WorkDocs
- SC152: AWS WorkMail
- SC153: AWS Application Cost Profiler
- SC154: AWS Billing Conductor
- SC155: AWS Budgets
- SC156: AWS Cost and Usage Report
- SC157: AWS Cost Explorer
- SC158: AWS Reserved Instance (RI) reporting
- SC159: AWS Savings Plans
- SC160: AWS App Runner
- SC161: AWS Batch
- SC162: AWS Compare AWS compute services
- SC163: AWS EC2 Image Builder
- SC164: AWS Elastic Beanstalk
- SC165: AWS Fargate
- SC166: AWS Lightsail
- SC167: AWS Linux 2023
- SC168: AWS Outposts
- SC169: AWS Serverless Application Repository
- SC170: AWS VMware Cloud on AWS
- SC171: AWS Wavelength
- SC172: AWS App2Container
- SC173: AWS Elastic Container Registry
- SC174: AWS Red Hat OpenShift Service on AWS
- SC175: AWS Managed Services
- SC176: AWS rePost Private
- SC177: AWS DocumentDB (with MongoDB compatibility)
- SC178: AWS ElastiCache
- SC179: AWS Keyspaces (for Apache Cassandra)
- SC180: AWS Lightsail managed databases
- SC181: AWS MemoryDB for Redis
- SC182: AWS Neptune
- SC183: AWS Quantum Ledger Database (Amazon QLDB)
- SC184: AWS RDS for Db2
- SC185: AWS RDS on VMware
- SC186: AWS Timestream
- SC187: AWS Application Composer
- SC188: AWS Cloud9
- SC189: AWS CloudShell
- SC190: AWS CodeArtifact
- SC191: AWS CodeBuild
- SC192: AWS CodeCatalyst
- SC193: AWS CodeCommit
- SC194: AWS CodeDeploy
- SC195: AWS CodePipeline
- SC196: AWS CodeStar
- SC197: AWS Corretto
- SC198: AWS Fault Injection Service
- SC199: AWS X-Ray
- SC200: AWS AppStream 2.0
- SC201: AWS WorkSpaces
- SC202: AWS WorkSpaces Core
- SC203: AWS WorkSpaces Thin Client
- SC204: AWS Workspaces Web
- SC205: AWS Amplify
- SC206: AWS AppSync
- SC207: AWS Device Farm
- SC208: AWS Location Service
- SC209: AWS GameLift
- SC210: AWS FreeRTOS
- SC211: AWS IoT 1-Click
- SC212: AWS IoT Analytics
- SC213: AWS IoT Button
- SC214: AWS IoT Core
- SC215: AWS IoT Device Defender
- SC216: AWS IoT Device Management
- SC217: AWS IoT Events
- SC218: AWS IoT ExpressLink
- SC219: AWS IoT FleetWise
- SC220: AWS IoT Greengrass
- SC221: AWS IoT SiteWise
- SC222: AWS IoT TwinMaker
- SC223: AWS Partner Device Catalog
- SC224: AWS Augmented AI
- SC225: AWS Bedrock
- SC226: AWS CodeGuru
- SC227: AWS CodeWhisperer
- SC228: AWS Comprehend
- SC229: AWS Comprehend Medical
- SC230: AWS DeepComposer
- SC231: AWS DeepLens
- SC232: AWS DeepRacer
- SC233: AWS DevOps Guru
- SC234: AWS Forecast
- SC235: AWS Fraud Detector
- SC236: AWS HealthLake
- SC237: AWS HealthScribe
- SC238: AWS Kendra
- SC239: AWS Lex
- SC240: AWS Lookout for Equipment
- SC241: AWS Lookout for Metrics
- SC242: AWS Lookout for Vision
- SC243: AWS Monitron
- SC244: AWS Panorama
- SC245: AWS PartyRock
- SC246: AWS Personalize
- SC247: AWS Polly
- SC248: AWS Rekognition
- SC249: AWS Textract
- SC250: AWS Transcribe
- SC251: AWS Translate
- SC252: AWS Auto Scaling
- SC253: AWS Chatbot
- SC254: AWS CloudFormation
- SC255: AWS Compute Optimizer
- SC256: AWS Console Mobile Application
- SC257: AWS Control Tower
- SC258: AWS Health Dashboard
- SC259: AWS Launch Wizard
- SC260: AWS License Manager
- SC261: AWS Managed Grafana
- SC262: AWS Managed Service for Prometheus
- SC263: AWS OpsWorks
- SC264: AWS Organizations
- SC265: AWS Proton
- SC266: AWS Service Catalog
- SC267: AWS Systems Manager
- SC268: AWS Trusted Advisor
- SC269: AWS Well-Architected Tool
- SC270: AWS Elastic Transcoder
- SC271: AWS Elemental Appliances and Software
- SC272: AWS Elemental MediaConnect
- SC273: AWS Elemental MediaConvert
- SC274: AWS Elemental MediaLive
- SC275: AWS Elemental MediaPackage
- SC276: AWS Elemental MediaStore
- SC277: AWS Elemental MediaTailor
- SC278: AWS Interactive Video Service
- SC279: AWS Nimble Studio
- SC280: AWS Application Discovery Service
- SC281: AWS Application Migration Service
- SC282: AWS Database Migration Service
- SC283: AWS DataSync
- SC284: AWS Mainframe Modernization Service
- SC285: AWS Migration Hub
- SC286: AWS Snow Family
- SC287: AWS Transfer Family
- SC288: AWS App Mesh
- SC289: AWS Cloud Map
- SC290: AWS Direct Connect
- SC291: AWS Global Accelerator
- SC292: AWS Integrated Private Wireless on AWS
- SC293: AWS Private 5G
- SC294: AWS PrivateLink
- SC295: AWS Transit Gateway
- SC296: AWS Verified Access
- SC297: AWS VPC Lattice
- SC298: AWS VPN
- SC299: AWS Braket
- SC300: AWS RoboMaker
- SC301: AWS Ground Station
- SC302: AWS Artifact
- SC303: AWS Audit Manager
- SC304: AWS Certificate Manager
- SC305: AWS CloudHSM
- SC306: AWS Detective
- SC307: AWS Directory Service
- SC308: AWS Firewall Manager
- SC309: AWS GuardDuty
- SC310: AWS IAM Identity Center
- SC311: AWS Inspector
- SC312: AWS Macie
- SC313: AWS Network Firewall
- SC314: AWS Resource Access Manager
- SC315: AWS Secrets Manager
- SC316: AWS Security Hub
- SC317: AWS Security Lake
- SC318: AWS Shield
- SC319: AWS Verified Permissions
- SC320: AWS WAF Captcha
- SC321: AWS S3 Glacier
- SC322: AWS Backup
- SC323: AWS Elastic Disaster Recovery
- SC324: AWS Elastic File System
- SC325: AWS File Cache
- SC326: AWS FSx for Lustre
- SC327: AWS FSx for NetApp ONTAP
- SC328: AWS FSx for OpenZFS
- SC329: AWS FSx for Windows File Server
- SC330: AWS Storage GatewayAWS
- SC331: Azure AI Anomaly Detector
- SC332: Azure AI Bot Service
- SC333: Azure AI Content Safety
- SC334: Azure AI Custom Vision
- SC335: Azure AI Document Intelligence
- SC336: Azure AI Immersive Reader
- SC337: Azure AI Language
- SC338: Azure AI Metrics Advisor
- SC339: Azure AI Personalizer
- SC340: Azure AI Search
- SC341: Azure AI Services
- SC342: Azure AI Studio
- SC343: Azure AI Translator
- SC344: Azure AI Video Indexer
- SC345: Azure Data Science Virtual Machines
- SC346: Azure Databricks
- SC347: Azure Genomics
- SC348: Azure Health Bot
- SC349: Azure Language Understanding (LUIS)
- SC350: Azure Machine Learning
- SC351: Azure Open Datasets
- SC352: Azure OpenAI Service
- SC353: Azure Operator Call Protection
- SC354: Azure QnA Maker
- SC355: Azure Speaker recognition
- SC356: Azure Speech to text
- SC357: Azure Speech translation
- SC358: Azure Text to speech
- SC359: Azure Analysis Services
- SC360: Azure Chaos Studio
- SC361: Azure Data Catalog
- SC362: Azure Data Explorer
- SC363: Azure Data Lake Analytics
- SC364: Azure Event Hubs
- SC365: Azure Fabric
- SC366: Azure Graph Data Connect
- SC367: Azure HDInsight
- SC368: Azure HDInsight on Azure Kubernetes Service (AKS)
- SC369: Azure Operator Insights
- SC370: Azure Power BI Embedded
- SC371: Azure Stream Analytics
- SC372: Azure Synapse Analytics
- SC373: Azure Batch
- SC374: Azure Cloud Services
- SC375: Azure CycleCloud
- SC376: Azure Dedicated Host
- SC377: Azure Linux Virtual Machines
- SC378: Azure Quantum
- SC379: Azure Service Fabric
- SC380: Azure Spot Virtual Machines
- SC381: Azure Spring Apps
- SC382: Azure Virtual Desktop
- SC383: Azure Virtual Machine Scale Sets
- SC384: Azure VM Image Builder
- SC385: Azure VMware Solution
- SC386: Azure Windows Virtual Machines
- SC387: Azure Container Apps
- SC388: Azure Container Instances
- SC389: Azure Container Registry
- SC390: Azure Container Storage
- SC391: Azure Kubernetes Fleet Manager
- SC392: Azure Red Hat OpenShift
- SC393: Azure Web App for Containers
- SC394: Azure Cache for Redis
- SC395: Azure Cosmos DB
- SC396: Azure Data Factory
- SC397: Azure Database for MariaDB
- SC398: Azure Database for MySQL
- SC399: Azure Managed Instance for Apache Cassandra
- SC400: Azure SQL
- SC401: Azure SQL Edge
- SC402: Azure SQL Managed Instance
- SC403: Azure SQL Server on Azure Virtual Machines
- SC404: Azure Table Storage
- SC405: Azure App Configuration
- SC406: Azure Dev Box
- SC407: Azure DevOps
- SC408: Azure Managed Confidential Consortium Framework (CCF)
- SC409: Azure Playwright Testing
- SC410: Azure SDKs
- SC411: Azure Visual Studio
- SC412: Azure Visual Studio Code
- SC413: Azure Artifacts
- SC414: Azure Boards
- SC415: Azure Deployment Environments
- SC416: Azure DevOps tool integrations
- SC417: Azure DevTest Labs
- SC418: Azure GitHub Advanced Security for Azure DevOps
- SC419: Azure Load Testing
- SC420: Azure Managed Grafana
- SC421: Azure Pipelines
- SC422: Azure Repos
- SC423: Azure Test Plans
- SC424: Azure Arc
- SC425: Azure Kubernetes Service Edge Essentials
- SC426: Azure Modular Datacenter
- SC427: Azure Operator Nexus
- SC428: Azure Operator Service Manager
- SC429: Azure Stack
- SC430: Azure Stack Edge
- SC431: Azure Stack HCI
- SC432: Azure Stack Hub
- SC433: Azure Active Directory External Identities
- SC434: Azure API Management
- SC435: Azure Data Manager for Agriculture
- SC436: Azure Energy Data Services
- SC437: Azure Event Grid
- SC438: Azure Health Data Services
- SC439: Azure Logic Apps
- SC440: Azure Service Bus
- SC441: Azure Web PubSub
- SC442: Azure Defender for IoT
- SC443: Azure IoT Central
- SC444: Azure IoT Edge
- SC445: Azure IoT Hub
- SC446: Azure IoT Operations
- SC447: Azure Notification Hubs
- SC448: Azure RTOS
- SC449: Azure Sphere
- SC450: Azure Time Series Insights
- SC451: Azure Windows 10 IoT Core Services
- SC452: Azure Windows for IoT
- SC453: Azure Advisor
- SC454: Azure Automanage
- SC455: Azure Automation
- SC456: Azure Blueprints
- SC457: Azure Cloud Shell
- SC458: Azure Copilot for Azure
- SC459: Azure Cost Management
- SC460: Azure Lighthouse
- SC461: Azure Managed Applications
- SC462: Azure mobile app
- SC463: Azure Policy
- SC464: Azure portal
- SC465: Azure Purview
- SC466: Azure Resource Manager templates
- SC467: Azure Resource Mover
- SC468: Azure Service Health
- SC469: Azure Update management center
- SC470: Azure Content Protection
- SC471: Azure Encoding
- SC472: Azure Live and On-Demand Streaming
- SC473: Azure Media Player
- SC474: Azure Media Services
- SC475: Azure Database Migration Service
- SC476: Azure Migrate
- SC477: Azure Site Recovery
- SC478: Azure Digital Twins
- SC479: Azure Kinect DK
- SC480: Azure Object Anchors
- SC481: Azure Remote Rendering
- SC482: Azure Spatial Anchors
- SC483: Azure App Center
- SC484: Azure Application Gateway
- SC485: Azure Bastion
- SC486: Azure Communications Gateway
- SC487: Azure Content Delivery Network
- SC488: Azure DDoS Protection
- SC489: Azure DNS
- SC490: Azure ExpressRoute
- SC491: Azure Firewall
- SC492: Azure Firewall Manager
- SC493: Azure Front Door
- SC494: Azure Internet Analyzer
- SC495: Azure Load Balancer
- SC496: Azure NAT Gateway
- SC497: Azure Network Function Manager
- SC498: Azure Network Watcher
- SC499: Azure Operator 5G Core
- SC500: Azure Orbital Ground Station
- SC501: Azure Private 5G Core
- SC502: Azure Private Link
- SC503: Azure Programmable Connectivity
- SC504: Azure Route Server
- SC505: Azure Traffic Manager
- SC506: Azure Virtual Network Manager
- SC507: Azure Virtual WAN
- SC508: Azure VPN Gateway
- SC509: Azure Web Application Firewall
- SC510: Azure Attestation
- SC511: Azure Dedicated HSM
- SC512: Azure Defender External Attack Surface Management
- SC513: Azure Defender for Cloud
- SC514: Azure Entra Domain Services
- SC515: Azure Information Protection
- SC516: Azure Key Vault Managed HSM
- SC517: Azure Sentinel
- SC518: Azure Trusted Hardware Identity Management
- SC519: Azure Archive Storage
- SC520: Azure Avere vFXT for Azure
- SC521: Azure Backup
- SC522: Azure Blob Storage
- SC523: Azure confidential ledger
- SC524: Azure Data Box
- SC525: Azure Data Lake Storage
- SC526: Azure Data Lake Storage Gen1
- SC527: Azure Data Share
- SC528: Azure Disk Storage
- SC529: Azure Elastic SAN
- SC530: Azure Files
- SC531: Azure HPC Cache
- SC532: Azure Managed Lustre
- SC533: Azure NetApp Files
- SC534: Azure Queue Storage
- SC535: Azure Storage Accounts
- SC536: Azure Storage Actions
- SC537: Azure Storage Explorer
- SC538: Azure Lab Services
- SC539: Azure Communication Services
- SC540: Azure Fluid Relay
- SC541: Azure Maps
- SC542: Azure SignalR Service
- SC543: Azure Static Web AppsAzure
- SC544: GCP AutoML
- SC545: GCP Dialogflow
- SC546: GCP Generative AI on Vertex AI
- SC547: GCP Media Translation
- SC548: GCP Natural Language AI
- SC549: GCP Recommendations AI
- SC550: GCP Speech-to-Text
- SC551: GCP Text-to-Speech
- SC552: GCP Translation AI
- SC553: GCP Vertex AI Notebooks
- SC554: GCP Vertex AI Platform
- SC555: GCP Vertex AI Search and Conversation
- SC556: GCP Vertex Explainable AI
- SC557: GCP Video AI
- SC558: GCP Vision AI
- SC559: GCP Cloud GPUs
- SC560: GCP Cloud TPUs
- SC561: GCP Deep Learning Containers
- SC562: GCP Deep Learning VM Image
- SC563: GCP TensorFlow Enterprise
- SC564: GCP Contact Center AI
- SC565: GCP Document AI
- SC566: GCP Intelligent products (Preview)
- SC567: GCP Product Discovery
- SC568: GCP Looker Studio
- SC569: GCP App Engine
- SC570: GCP Bare Metal Solution
- SC571: GCP Batch
- SC572: GCP Recommender
- SC573: GCP Sole-tenant Nodes
- SC574: GCP Spot VMs
- SC575: GCP SQL Server on Google Cloud
- SC576: GCP Tau VM
- SC577: GCP VMware Engine
- SC578: GCP Cloud Run
- SC579: GCP Knative
- SC580: GCP Kubernetes applications on Google Cloud Marketplace
- SC581: GCP Analytics Hub
- SC582: GCP BigLake
- SC583: GCP Data Catalog
- SC584: GCP Dataflow
- SC585: GCP Dataform
- SC586: GCP Dataplex
- SC587: GCP Dataprep
- SC588: GCP Looker
- SC589: GCP Marketing Platform
- SC590: GCP AlloyDB for PostgreSQL
- SC591: GCP Cloud Bigtable
- SC592: GCP Cloud Spanner
- SC593: GCP Datastream
- SC594: GCP Firebase Realtime Database
- SC595: GCP Firestore
- SC596: GCP Memorystore
- SC597: GCP Artifact Registry
- SC598: GCP Assured Open Source Software
- SC599: GCP Cloud Build
- SC600: GCP Cloud Code
- SC601: GCP Cloud Deploy
- SC602: GCP Cloud Deployment Manager
- SC603: GCP Cloud Functions for Firebase
- SC604: GCP Cloud SDK
- SC605: GCP Cloud Source Repositories
- SC606: GCP Cloud Tasks
- SC607: GCP Cloud Workstations
- SC608: GCP Duet AI in Google Cloud (Preview)
- SC609: GCP Firebase Authentication
- SC610: GCP Firebase Crashlytics
- SC611: GCP Firebase Test Lab
- SC612: GCP Gradle App Engine Plugin
- SC613: GCP Infrastructure Manager
- SC614: GCP Maven App Engine Plugin
- SC615: GCP Skaffold
- SC616: GCP Tekton
- SC617: GCP Tools for Eclipse
- SC618: GCP Tools for PowerShell
- SC619: GCP Distributed Cloud Edge
- SC620: GCP Distributed Cloud Hosted
- SC621: GCP Anthos
- SC622: GCP Distributed Cloud Service
- SC623: GCP Anti Money Laundering AI
- SC624: GCP Cloud Healthcare API
- SC625: GCP Device Connect for Fitbit
- SC626: GCP Payment Gateway
- SC627: GCP Spectrum Access System (SAS)
- SC628: GCP Telecom Data Fabric
- SC629: GCP Telecom Network Automation
- SC630: GCP Telecom Subscriber Insights
- SC631: GCP Apigee API Management
- SC632: GCP Application Integration
- SC633: GCP Cloud Composer
- SC634: GCP Cloud Data Fusion
- SC635: GCP Cloud Scheduler
- SC636: GCP Dataproc
- SC637: GCP Eventarc
- SC638: GCP Pub/Sub
- SC639: GCP Workflows
- SC640: GCP Active Assist
- SC641: GCP Carbon Footprint
- SC642: GCP Cloud APIs
- SC643: GCP Cloud Console
- SC644: GCP Cloud Endpoints
- SC645: GCP Cloud Mobile App
- SC646: GCP Cloud Shell
- SC647: GCP Config Connector
- SC648: GCP Config Management
- SC649: GCP Cost Management
- SC650: GCP Deployment Manager
- SC651: GCP Identity and Access Management (IAM)
- SC652: GCP Managed Service for Prometheus
- SC653: GCP Personalized Service Health
- SC654: GCP Service Catalog
- SC655: GCP Service Mesh
- SC656: GCP Terraform on Google Cloud
- SC657: GCP Earth Engine
- SC658: GCP Maps Platform
- SC659: GCP Live Stream API
- SC660: GCP OpenCue
- SC661: GCP Transcoder API
- SC662: GCP Video Stitcher API
- SC663: GCP Application migration
- SC664: GCP BigQuery Data Transfer Service
- SC665: GCP Cloud Foundation Toolkit
- SC666: GCP Database Migration Service
- SC667: GCP Migrate to Containers
- SC668: GCP Migrate to Virtual Machines
- SC669: GCP Migration Center
- SC670: GCP Rapid Assessment & Migration Program (RAMP)
- SC671: GCP Storage Transfer Service
- SC672: GCP Transfer Appliance
- SC673: GCP Immersive Stream for XR
- SC674: GCP Cloud Armor
- SC675: GCP Cloud CDN
- SC676: GCP Cloud Connectivity
- SC677: GCP Cloud Domains
- SC678: GCP Cloud Firewall
- SC679: GCP Cloud IDS
- SC680: GCP Cloud Load Balancing
- SC681: GCP Cloud NAT
- SC682: GCP Network Connectivity Center
- SC683: GCP Network Intelligence Center
- SC684: GCP Network Service Tiers
- SC685: GCP Private Service Connect
- SC686: GCP Service Directory
- SC687: GCP VPC Service Controls
- SC688: GCP Cloud Debugger
- SC689: GCP Cloud Monitoring
- SC690: GCP Cloud Profiler
- SC691: GCP Cloud Trace
- SC692: GCP Error Reporting
- SC693: GCP AppSheet
- SC694: GCP AppSheet Automation
- SC695: GCP Chrome Enterprise
- SC696: GCP Duet AI for Google Workspace
- SC697: GCP Workspace
- SC698: GCP Workspace Essentials
- SC699: GCP Access Transparency
- SC700: GCP Assured Workloads
- SC701: GCP BeyondCorp Enterprise
- SC702: GCP Certificate Authority Service
- SC703: GCP Chronicle SIEM
- SC704: GCP Chronicle SOAR
- SC705: GCP Cloud Asset Inventory
- SC706: GCP Cloud Identity
- SC707: GCP Confidential Computing
- SC708: GCP Identity Platform
- SC709: GCP Identity-Aware Proxy
- SC710: GCP Managed Service for Microsoft Active Directory
- SC711: GCP Mandiant Academy
- SC712: GCP Mandiant Attack Surface Management
- SC713: GCP Mandiant Consulting Services
- SC714: GCP Mandiant Digital Threat Monitoring
- SC715: GCP Mandiant Incident Response Services
- SC716: GCP Mandiant Managed Detection and Response
- SC717: GCP Mandiant Security Validation
- SC718: GCP Mandiant Threat Intelligence
- SC719: GCP Policy Intelligence
- SC720: GCP reCAPTCHA Enterprise
- SC721: GCP Secret Manager
- SC722: GCP Security Command Center
- SC723: GCP Sensitive Data Protection
- SC724: GCP Shielded VMs
- SC725: GCP Software Delivery Shield
- SC726: GCP Titan Security Key
- SC727: GCP Virus Total
- SC728: GCP Web Risk
- SC729: GCP API Gateway
- SC730: GCP Cloud Functions
- SC731: GCP Block storage
- SC732: GCP Cloud Backup and DR
- SC733: GCP Cloud Storage for Firebase
- SC734: GCP Filestore
- SC735: GCP Local SSD
- SC736: GCP NetApp Volumes
- SC737: GCP Parallelstore
- SC738: GCP Persistent Disk
- SC739: GCP Blockchain Node Engine
- SC740: GitHub
- SC741: Azure Service
- SC742: Google Cloud Platform
- SC743: Content Delivery Network
- SC744: Directory Server
- SC745: DNS Server
- SC746: Firewall
- SC747: FTP Server
- SC748: IDS/IPS
- SC749: Load Balancer
- SC750: Message Broker
- SC751: Proxy Server
- SC752: Router
- SC753: Service Bus
- SC754: VPN Server
Updated Components
- SC13: PostgreSQL
- INFO: Updated the title and implied attributes.
- SC76: Azure App Service
- INFO: Updated the answer mapping and implied attributes.
- SC13: PostgreSQL
2024.1
April 13, 2024
New features and enhancements
Library Profile Page
- Added the following Library Profile Page UI enhancements:
- Ability to view built-in Profiles
- Ability to deactivate custom profiles
- Ability to select a profile as a default for the project survey
- Ability to save copy a profile
- Added the API capability to GET/POST/PATCH and Delete for profiles
- Added the following Library Profile Page UI enhancements:
Advanced Reports
- Users can now choose Library Countermeasure Tags or App Space Project Tag name as dimension or filters in Library based context.
Content improvements summary
OWASP API Top 10 2023
- Added a new compliance regulations for OWASP API Top 10 2023
- Added new Additional Requirements for OWASP API Top 10 2023
- Added text improvements for OWASP API Top 10 2023
SageMaker content
- Added 11 Countermeasures and their corresponding test tasks
- Added 9 new Weaknesses
Machine learning security content
- Added 7 Countermeasures and their corresponding test tasks
- Added 4 new Weaknesses
- Added 3 new Threats
SDE update based on Defending Database course
- Added 9 Countermeasures and their corresponding test tasks
- Added 8 new Weaknesses
SDE update based on Node.js course
- Added 4 new Additional Requirements
- Added 3 new How-to's
Content additions and updates (as of March 26, 2024):
Compliance Regulations and Mappings
- Added OWASP API Top 10
- Added ENISA - Securing Machine Learning Algorithms
Content Packs
- Added Machine Learning
- Added Enisa Securing Machine Learning Algorithms
T21: Ensure all data in transit is encrypted using a secure TLS channel
- I1888: Use TLS in Node.js [Added]
- T22: Set secure flags on session cookies
- I1889: Node.js [Added]
- T36: Escape untrusted data in HTML, HTML attributes, CSS, and JavaScript
- I1890: Node.js: Escape and sanitize [Added]
- T50: Use indirect object reference maps if accessing files [Updated]
- INFO: Updated the text.
- T159: Follow best practices for secure error and exception handling
- TA6548: Prevent information exposure using error messages in Web APIs [Added]
- T285: Restrict use of access tokens (API tokens)
- TA6546: Use API Keys Safely in Your Web APIs [Added]
- T330: Monitor and manage Node.js workload
- TA6553: Prevent Denial of Service attacks [Added]
- T331: Enforce policies through content security policy (CSP) or XSS protection headers
- TA6552: Protection directives for Node.js [Added]
- T335: Sanitize user input before passing to NoSQL operators
- P747: Improper Neutralization of Special Elements used in a NoSQL Command (NoSQL Injection) [Updated]
- INFO: Updated the text.
- P747: Improper Neutralization of Special Elements used in a NoSQL Command (NoSQL Injection) [Updated]
- T378: Authorize every request for data objects [Updated]
- INFO: Updated the text.
- T1362: Perform message throttling in Web APIs [Updated]
- INFO: Updated the text.
- TA6543: Secure API Resource Consumption Guidelines [Added]
- T1365: Mitigate Server Side Request Forgery [Updated]
- INFO: Updated the text.
- T1368: Perform security testing using SAST tools
- TA6550: Use ESLint to identify problematic patterns [Added]
- T1383: Separate development, test, and operational environments
- TA6549: Implement a formal version management strategy for web APIs [Added]
- T1919: Use JSON Web Token (JWT) securely
- TA6547: Use Token-Based Authentication (With JWTs) Safely in Your Web APIs [Added]
- T2139: Prevent information exposure through APIs [Updated]
- INFO: Updated the text.
- T2211: Include a firmware update mechanism/feature (Hardware/Firmware)
- TA3497: Patch and upgrade software and firmware regularly (Bluetooth) [Updated]
- INFO: Updated the match conditions.
- TA3497: Patch and upgrade software and firmware regularly (Bluetooth) [Updated]
- T2348: Perform code reviews
- TA6551: Ensure using promises for code clarity [Added]
- T2498: Provide clear definitions for each component
- TA6544: Secure API Documentation Guidelines [Added]
- T2560: Launch notebook instances in custom VPC and disable internet access (SageMaker) [Added]
- P898: Using the default VPC (AWS) [Updated]
- INFO: Updated the match conditions.
- P898: Using the default VPC (AWS) [Updated]
- T2561: Protect ML model against input manipulation attacks [Added]
- P1749: Lack of data integrity and robustness against poisoning in ML data [Added]
- T2562: Test ML model protection against input manipulation attacks [Added]
- P1749: Lack of data integrity and robustness against poisoning in ML data [Added]
- T2563: Protect ML model against data poisoning and skewing attacks [Added]
- P1749: Lack of data integrity and robustness against poisoning in ML data [Added]
- T2564: Test ML model protection against data poisoning and skewing attacks [Added]
- P1749: Lack of data integrity and robustness against poisoning in ML data [Added]
- T2565: Protect ML model against inversion attacks [Added]
- P1750: Lack of model confidentiality and privacy protection in ML [Added]
- T2566: Verify notebook instances are launched in custom VPC and internet access is disabled (SageMaker) [Added]
- P898: Using the default VPC (AWS) [Updated]
- INFO: Updated the match conditions.
- P898: Using the default VPC (AWS) [Updated]
- T2567: Test ML model protection against inversion attacks [Added]
- P1750: Lack of model confidentiality and privacy protection in ML [Added]
- T2568: Disable user root access to notebook instances (SageMaker) [Added]
- P1748: Enabled user root access (SageMaker) [Added]
- T2569: Verify user root access to notebook instances is disabled (SageMaker) [Added]
- P1748: Enabled user root access (SageMaker) [Added]
- T2570: Isolate resources using domains (SageMaker) [Added]
- P1751: Lack of proper isolation of resources (SageMaker) [Added]
- T2571: Verify that resources are associated with domains (SageMaker) [Added]
- P1751: Lack of proper isolation of resources (SageMaker) [Added]
- T2572: Avoid confidential or sensitive information in tags or free-form text fields (SageMaker) [Added]
- P1754: Confidential or sensitive information in visible fields (SageMaker) [Added]
- T2573: Verify no confidential or sensitive information in tags or free-form text fields (SageMaker) [Added]
- P1754: Confidential or sensitive information in visible fields (SageMaker) [Added]
- T2574: Ensure identity-based policy best practices are followed (SageMaker) [Added]
- P1755: Implementation of poor access control policies (SageMaker) [Added]
- T2575: Verify that identity-based policy best practices are followed (SageMaker) [Added]
- P1755: Implementation of poor access control policies (SageMaker) [Added]
- T2576: Prevent Cross-service Confused Deputy (SageMaker) [Added]
- P1756: Cross-service Confused Deputy Vulnerability (SageMaker) [Added]
- T2577: Verify that Cross-service Confused Deputy is prevented (SageMaker) [Added]
- P1756: Cross-service Confused Deputy Vulnerability (SageMaker) [Added]
- T2578: Protect communications between compute instances in distributed training jobs (SageMaker) [Added]
- P1757: Lack of encrypted communication between training nodes (SageMaker) [Added]
- T2579: Verify that communications between compute instances in distributed training jobs are encrypted (SageMaker) [Added]
- P1757: Lack of encrypted communication between training nodes (SageMaker) [Added]
- T2580: Run training and inference containers in internet-free mode (SageMaker) [Added]
- P1758: Lack of Proper Internet Isolation in Training and Inference Containers (SageMaker) [Added]
- T2581: Verify that training and inference containers run in internet-free mode (SageMaker) [Added]
- P1758: Lack of Proper Internet Isolation in Training and Inference Containers (SageMaker) [Added]
- T2582: Implement security best practices for data protection (SageMaker) [Added]
- P1759: Lack of Security Best Practice Implementation (SageMaker) [Added]
- T2583: Verify that data protection security best practices are implemented (SageMaker) [Added]
- P1759: Lack of Security Best Practice Implementation (SageMaker) [Added]
- T2584: Ensure legal and regulatory compliance (SageMaker) [Added]
- P1770: Lack of compliance with applicable regulation [Added]
- T2585: Verify adherence to legal and regulatory compliance (SageMaker) [Added]
- P1770: Lack of compliance with applicable regulation [Added]
- T2586: Use shadow testing for model updates (SageMaker) [Added]
- P1760: Lack of Shadow Testing (SageMaker) [Added]
- T2587: Verify that shadow testing is set up for model updates (SageMaker) [Added]
- P1760: Lack of Shadow Testing (SageMaker) [Added]
- T2588: Prevent sensitive data exposure in ML models [Added]
- P1750: Lack of model confidentiality and privacy protection in ML [Added]
- T2589: Test ML model prevention of sensitive data exposure [Added]
- P1750: Lack of model confidentiality and privacy protection in ML [Added]
- T2590: Protect ML model against theft [Added]
- P1752: Lack of access control and model theft protection in ML [Added]
- T2591: Test ML model protection against theft [Added]
- P1752: Lack of access control and model theft protection in ML [Added]
- T2592: Protect ML model against supply chain attacks [Added]
- P1752: Lack of access control and model theft protection in ML [Added]
- T2593: Test ML model protection against supply chain attacks [Added]
- P1752: Lack of access control and model theft protection in ML [Added]
- T2594: Protect ML model against poisoning attacks [Added]
- P1753: Lack of model behavior integrity and manipulation protection in ML [Added]
- T2595: Test ML model protection against poisoning attacks [Added]
- P1753: Lack of model behavior integrity and manipulation protection in ML [Added]
- T2596: Prevent HTTP Request Smuggling [Added]
- P1747: HTTP Request Smuggling [Added]
- T2597: Implement RBAC instead of individual accounts [Added]
- P1761: Lack of Role Based access control [Added]
- T2598: Implement query-level access control [Added]
- P1762: Lack of granularity of Database access permissions [Added]
- T2599: Protect against connection string parameter pollution [Added]
- P1763: Accessible database connection strings [Added]
- T2600: Control the result set size returned by a query [Added]
- P1764: Lack of control over the size of result sets returned by queries [Added]
- T2601: Use Transparent Data Encryption with Enterprise Databases [Added]
- P1765: Lack of Transparent Data Encryption in Databases [Added]
- T2602: Log typical database and server activities and related metadata [Added]
- P1766: Lack of logging typical database and server activities [Added]
- T2603: Protect backup archive bits [Added]
- P1767: Lack of protection for backup archive bits [Added]
- T2604: Follow best practices for data restoring operations [Added]
- P1768: Lack of proper data restoring operations [Added]
- T2605: Validate database traffic [Added]
- P1769: Lack of database traffic validation [Added]
- T2606: Verify RBAC implemented instead of individual accounts [Added]
- P1761: Lack of Role Based access control [Added]
- T2607: Verify query-level access control is implemented [Added]
- P1762: Lack of granularity of Database access permissions [Added]
- T2608: Verify that the connection string is protected against connection string parameter pollution [Added]
- P1763: Accessible database connection strings [Added]
- T2609: Verify that the result set size returned by queries are controlled [Added]
- P1764: Lack of control over the size of result sets returned by queries [Added]
- T2610: Verify that Transparent Data Encryption is utilized with Enterprise Databases. [Added]
- P1765: Lack of Transparent Data Encryption in Databases [Added]
- T2611: Verify that typical database and server activities, along with related metadata, are logged [Added]
- P1766: Lack of logging typical database and server activities [Added]
- T2612: Verify backup archive bits are protected [Added]
- P1767: Lack of protection for backup archive bits [Added]
- T2613: Verify best practices for data-restoring operations are followed [Added]
- P1768: Lack of proper data restoring operations [Added]
T2614: Verify database traffic is validated [Added]
- P1769: Lack of database traffic validation [Added]
P938: Non-preemptive Goroutines [Deactivated]
Components
- Amazon AMI [Added]
- Amazon API Gateway [Added]
- Amazon Aurora [Updated]
- Amazon CloudFront [Added]
- Amazon CloudWatch [Added]
- Amazon Cognito [Added]
- Amazon DynamoDB [Updated]
- Amazon EC2 [Added]
- Amazon ECS [Added]
- Amazon EKS [Added]
- AWS IAM [Updated]
- Amazon Kinesis Data Firehose [Added]
- Amazon Kinesis Data Streams [Added]
- AWS Lambda [Updated]
- Amazon RDS [Added]
- Amazon Route53 [Updated]
- Amazon S3 [Updated]
- Amazon SageMaker [Added]
- Amazon SNS [Added]
- Amazon SQS [Added]
- Amazon VPC [Added]
- Android App [Updated]
- Apache [Updated]
- Apache Tomcat [Updated]
- ASG [Added]
- Automotive Application [Added]
- AWS CloudTrail [Added]
- AWS Config [Added]
- AWS KMS [Added]
- AWS Service [Added]
- AWS WAF [Added]
- Azure Active Directory (Entra ID) [Updated]
- Azure App Service [Added]
- Azure Functions [Updated]
- Azure Key Vault [Added]
- Azure Kubernetes Service [Added]
- Azure Monitor [Added]
- Azure PostgreSQL Database [Added]
- Azure Resource Manager [Added]
- Azure Security Center [Added]
- Azure SQL Database [Updated]
- Azure Storage [Added]
- Azure Virtual Machines [Added]
- Azure Virtual Network [Added]
- Containerization Platform [Added]
- Docker [Added]
- EBS [Added]
- ELB [Added]
- Firmware [Added]
- Generic Component [Added]
- Database Server [Updated]
- Google BigQuery [Added]
- Google Cloud DNS [Updated]
- Google Cloud IAM [Updated]
- Google Cloud Key Management [Added]
- Google Cloud Logging [Added]
- Google Cloud SQL [Added]
- Google Cloud Storage [Updated]
- Google Compute Engine [Added]
- Google Kubernetes Engine [Added]
- Google Virtual Private Cloud [Added]
- Hardware [Added]
- Ansible [Added]
- Terraform [Added]
- WebSphere [Updated]
- In-house Application [Added]
- iOS App [Updated]
- LDAP [Disabled]
- Mainframe Application [Added]
- Managed Kubernetes [Added]
- Microsoft Active Directory [Disabled]
- Microsoft IIS [Updated]
- Microsoft SQL Server [Updated]
- Mobile App [Updated]
- MongoDB database [Disabled]
- MySQL Database [Updated]
- NGINX [Updated]
- NoSQL database [Disabled]
- On-premise [Added]
- Openshift [Added]
- Oracle Database [Updated]
- WebLogic [Updated]
- PayPal [Disabled]
- PostgreSQL [Disabled]
- SMTP server [Disabled]
- Software [Added]
- SQL Database [Updated]
- SQLite database [Disabled]
- SSO Provider [Disabled]
- System Level Security Requirements [Added]
- Unmanaged Kubernetes [Added]
- User [Disabled]
- Web Application - Backend [Updated]
- Web Application - Frontend [Added]
- Web Server [Added]
- Windows Application [Added]
Changes to Project Properties and Profiles
- Q262: External Dependencies
- Q263: Software Updates [Updated]
- INFO: Updated the description.
- A1104: Has software/firmware update functionality [Updated]
- INFO: Updated the description.
- Q288: Service Chaining
- A1141: Receives user requests through remote services [Updated]
- INFO: Updated the description.
- A1141: Receives user requests through remote services [Updated]
- Q263: Software Updates [Updated]
- Q284: Context and Characteristics
- Q252: Application's Context and Characteristics
- Q357: Artificial Intelligence/Machine Learning
- A1367: Builds and deploys machine learning (ML) models [Added]
- Q357: Artificial Intelligence/Machine Learning
- Q252: Application's Context and Characteristics
- Q289: Cloud Computing
- Q290: Cloud Providers
- Q298: AWS Services
- A1366: SageMaker [Added]
- Q298: AWS Services
- Q290: Cloud Providers
- Q262: External Dependencies
2023.4
January 6, 2024
New features and enhancements
Diagrammatic Threat Modeling
- Threat Model Diagrams can now generate Threats, Weaknesses, and Countermeasures. This is a beta for the 2023.4 release and must be enabled via API or through your Customer Success Manager.
- Imported diagrams are only accepted in draw.io/diagrams.net, TM7 (Microsoft Threat Modeling Tool), JSON, and XML format.
Trend Reports
- Added an advanced reporting feature called "Trend Reports" that captures changes across the application, Countermeasures, and project objects. This feature is enabled by default with its corresponding feature flag.
- Users can represent changes in compliance counts and mean times to compliance, among many other metrics.
- Changes are captured nightly and data can be realized as far back from July 8th, 2023.
- Added the ability to include Trend Reports in Dashboards.
- Added granular permissions for users interacting with Trend Reports.
- Added the ability to export the data in CSV or JSON format.
- Added an advanced reporting feature called "Trend Reports" that captures changes across the application, Countermeasures, and project objects. This feature is enabled by default with its corresponding feature flag.
Verification Tools Update
- Added the ability for integrations to customize the project connection names for verification tools. Any existing and future project connections for verification tools can add or edit a connection name.
Checkmarx Integration
- Added CheckmarxOne into the Integration Ecosystems. Users can connect their CheckmarxOne instance in SD Elements and map SAST scan results to project Countermeasures.
- Requires Tenant ID and API Key for server connection.
- Requires a project_id for project connection.
- Added CheckmarxOne into the Integration Ecosystems. Users can connect their CheckmarxOne instance in SD Elements and map SAST scan results to project Countermeasures.
Other Product Improvements
- Added pre-aggregations to Library and Application contexts for Advanced Reports.
- Fixed a bug where importing how-to files in JSON or YAML format would not work.
Content improvements summary
CWE
- Updated to version 4.13
2023 CWE Top 25 Most Dangerous Software Weaknesses
- Added a new regulation
Compliance Regulations and Mappings
- ANSI/ISA 62443-4-2 & ISASecure CSA 311
- Updated the ISASecure CSA 311 regulation to combine the requirements of ANSI/ISA 62443-4-2 and ISASecure CSA/SSA and deactivated the ANSI/ISA 62443-4-2 regulation.
- ANSI/ISA 62443-3-3 & ISASecure SSA 311
- Updated the ISASecure SSA 311 regulation to combine the requirements of ANSI/ISA 62443-3-3 and ISASecure CSA/SSA and deactivated the ANSI/ISA 62443-3-3 regulation
- ANSI/ISA 62443-4-2 & ISASecure CSA 311
Updated the following code scanner mappings
- Fortify
- Qualys
- SonarQube
- WebInspect
Content additions and updates (as of December 5, 2023):
Compliance Regulations and Mappings
- Added 2023 CWE Top 25 Most Dangerous Software Weaknesses
- Removed ANSI/ISA 62443-3-3
- Removed ANSI/ISA 62443-4-2
- Updated ANSI/ISA 62443-4-2 (ISASecure CSA 311) [INFO: Updated the description].
- Updated ANSI/ISA 62443-3-3 (ISASecure SSA 311) [INFO: Updated the description].
- Updated CIS Azure Kubernetes Service (AKS) 1.2.0 [INFO: Updated the description].
- Updated ISO/SAE 21434 [INFO: Updated the description].
- Updated ISO 27001 [INFO: Updated the description].
T1: Use multi-factor authentication for remote access to high risk systems or administrative access to services
- TA5412: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5414: ISASecure SSA 311 requirements: Levels (4) [Updated]
- INFO: Updated the text.
- TA5412: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- T5: Use minimum standards for passwords
- TA5432: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5434: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5436: ISASecure SSA 311 requirements: Levels (4) [Updated]
- INFO: Updated the text.
- TA5432: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T8: Use Consistent Error Handling for All Authentication Failures
- TA5440: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5440: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T21: Ensure all data in transit is encrypted using a secure TLS channel
- TA5495: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5497: ISASecure SSA 311 requirements: Levels (4) [Updated]
- INFO: Updated the text.
- TA5495: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- T60: Use correct and approved cryptographic algorithms, parameters, and key lengths
- TA5501: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5501: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T61: Disable default accounts or change all default passwords
- TA5422: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5422: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T70: Implement account lockout or authentication throttling for system accounts
- TA5442: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5442: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T77: Test for single-factor authentication
- TA5411: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5413: ISASecure SSA 311 requirements: Levels (4) [Updated]
- INFO: Updated the text.
- TA5411: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- T80: Test password requirements
- TA5431: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5433: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5435: ISASecure SSA 311 requirements: Levels (4) [Updated]
- INFO: Updated the text.
- TA5431: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T82: Test authentication error consistency
- TA5439: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5439: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T87: Verify that all data in transit is encrypted using a secure TLS channel
- TA5494: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5496: ISASecure SSA 311 requirements: Levels (4) [Updated]
- INFO: Updated the text.
- TA5494: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- T107: Test that application forbids uploading or transferring malware [Updated]
- INFO: Updated the text.
- T114: Test system-to-system authentication lockout or throttling
- TA5441: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5441: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T156: Validate certificate and its chain of trust properly
- TA5438: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5438: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- T175: Test that the client validates digital certificates
- TA5437: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5437: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- T244: Securely delete any unprotected sensitive data before a resource is released or shared
- TA5539: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5541: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5539: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- T245: Verify that sensitive unprotected data is securely deleted
- TA5538: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5540: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5538: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- T248: Protect secret keys and passwords in the application
- TA5424: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5426: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5428: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5424: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T249: Verify that keys and passwords are protected in the application
- TA5423: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5425: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5427: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5423: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T295: Avoid storing unencrypted confidential data without access control mechanisms
- TA5537: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5537: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T296: Test that unencrypted confidential data is not stored without access control mechanisms
- TA5536: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5536: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T323: Test that default accounts are disabled or default passwords are changed
- TA5421: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5421: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T337: Include a 'break glass' feature that enables emergency functions
- TA5452: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5452: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- T338: Control access to resources through user authentication and authorization
- TA5406: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5408: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5410: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5406: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T340: Use an account and identity management system
- TA5416: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5418: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5420: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5416: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T342: Inform and warn users about using critical system services
- TA5444: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5444: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T343: Test that proper system use notification is displayed or sent for critical features
- TA5443: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5443: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T344: Enforce different rules for access to the system based on the origin, type, and medium of request
- TA5446: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5448: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5450: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5446: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T381: Test break-glass procedures
- TA5451: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5451: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- T445: Verify that only approved cryptographic algorithms and key lengths are used
- TA5500: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5500: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T567: Enable network access control for local area network communications
- TA5455: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5455: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T591: Verify that network access control is enabled for local area network communications
- TA5454: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5456: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5454: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T682: Make S3 bucket CloudTrail logs publicly inaccessible (AWS) [Updated]
- INFO: Updated the text.
- T1380: Enforce secure user registration and access control
- TA5453: ISASecure SSA 311 requirements: Levels (4) [Updated]
- INFO: Updated the text.
- TA5453: ISASecure SSA 311 requirements: Levels (4) [Updated]
- T2254: Use the most robust Security Operation Mode (WiFi)
- TA5430: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5430: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T2275: Test to confirm that the most robust Security Operation Mode is applied (WiFi)
- TA5429: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5429: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T2276: Test to confirm that authorization and authentication controls are in place for access to resources
- TA5405: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5407: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5409: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5405: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T2277: Test to confirm the use of an account and identity management system
- TA5415: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5417: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5419: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5415: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T2278: Test to confirm that different rules for access to the system are enforced based on the origin, type, and medium of the request
- TA5445: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5447: ISASecure SSA 311 requirements: Levels (2, 3, 4) [Updated]
- INFO: Updated the text.
- TA5449: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5445: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- T2359: Configure a secure user authentication (Cloud) (2/2) [Updated]
- INFO: Updated the priority from 7 to 10.
- T2360: Configure a secure user authorization (Cloud) (2/2) [Updated]
- INFO: Updated the priority from 5 to 10.
- T2361: Design a secure application architecture for the cloud environment (Cloud) (2/2) [Updated]
- INFO: Updated the priority from 9 to 10.
- T2368: Enable logging and protect log files in your cloud environment (Cloud) (2/4) [Updated]
- INFO: Updated the priority from 7 to 9.
- T2369: Enable logging and protect log files in your cloud environment (Cloud) (3/4) [Updated]
- INFO: Updated the priority from 7 to 9.
- T2370: Enable logging and protect log files in your cloud environment (Cloud) (4/4) [Updated]
- INFO: Updated the priority from 7 to 9.
- T2371: Enable logs and configuration monitoring in your cloud environment (Cloud) (2/4) [Updated]
- INFO: Updated the priority from 7 to 8.
- T2372: Enable logs and configuration monitoring in your cloud environment (Cloud) (3/4) [Updated]
- INFO: Updated the priority from 7 to 8.
- T2373: Enable logs and configuration monitoring in your cloud environment (Cloud) (4/4) [Updated]
- INFO: Updated the priority from 7 to 8.
- T2374: Verify that logging is enabled and log files are protected (Cloud) (2/2) [Updated]
- INFO: Updated the priority from 7 to 9.
- T2375: Verify that log monitoring and configuration monitoring are enabled (Cloud) (2/3) [Updated]
- INFO: Updated the priority from 7 to 8.
T2376: Verify that log monitoring and configuration monitoring are enabled (Cloud) (3/3) [Updated]
- INFO: Updated the priority from 7 to 8.
Changes to Project Properties and Profiles
- Q193: Components
- Q101: Components In Development
- A1077: Firmware, embedded, or hardware solution [Updated]
- INFO: Updated the children.
- A1077: Firmware, embedded, or hardware solution [Updated]
- Q101: Components In Development
- Q199: Authentication
- Q120: Authentication Features
- Q121: Authentication Method
- A19: Uses passwords [Updated]
- INFO: Updated the children.
- A19: Uses passwords [Updated]
- Q121: Authentication Method
- Q120: Authentication Features
- Q243: Internal Hidden Properties
- Q189: Internal Properties (Use this, for all hidden answers)
- A768: This is a software project [Updated]
- INFO: Updated the children.
- A768: This is a software project [Updated]
- Q189: Internal Properties (Use this, for all hidden answers)
- Q193: Components
New Just-in-Time Training
- Defending Web APIs (18)
2023.3
For the latest SD Elements Release Notes, see our User Guide: https://docs.sdelements.com/release/latest/guide/docs/releasenotes.html
New features and enhancements
New content updates functionality
- Any Countermeasures removed or added to a project through the content update button will appear in global, project, and Countermeasure activity logs along with the user who took the action, and the date and time it was taken.
Import / Export Enhancements
- With feature flag: Import/Export Enhanced Capability turned on (off by default):
- Added the ability to have deactivated content to be present in the export job.
- Added the ability to mark specific content as active or deactivated via import job
- Added the ability to set custom content as delete to remove the content completely via import job
- Enabling Import/Export of Regulations and Enabling Async API (Beta) have been migrated to feature flags so users can now toggle features on and off via the UI.
- With feature flag: Import/Export Enhanced Capability turned on (off by default):
Automation Event/Action
- With Feature Flag: User Login Activity (on by default)
- Added the ability to track user login events
- Added a new action to deactivate users that have not logged in after a predefined number of days
Reactivation Function (only for SSO Users)
- With Feature Flag: Auto-Reactivate Users via SSO (off by default)
- Added the ability to auto-reactivate users using single sign-on.
Survey UX
- Added a feature flag to make survey change reviews optional before publishing. The flag is disabled by default. When enabled, users answering the survey will have a choice to publish directly or review and then publish.
Content improvements summary
AI Security
- Added new Weaknesses, Countermeasures, and Additional Requirements based on NIST AI Risk Management Framework (RMF) and OWASP Top 10 for Large Language Model Applications.
Consumer IoT: ETSI EN 303 645
- Added new Regulation and Additional Requirements based on the EN 303 645 Standard.
ISO 27001 (2022)
- Added a new Regulation.
Rust
- Added new Howtos for the Rust programming language.
Updated the following code scanner mappings:
- Appscan, Fortify, Qualys, SonarQube, WebInspect, and Nessus.
Content additions and updates (as of September 26, 2023):
Compliance Regulations and Mappings
- Added NIST AI RMF v1.0
- Added EN 303 645
- Added OWASP Top 10 for Large Language Model Applications v1.0.0
- Added ISO 27001
Content Packs
- Added NIST AI RMF
- Added AI Security
- Added EN 303 645
- Added OWASP LLM Top 10
- Added ISO 27001 (2022)
- Added Rust
T2: Secure the password reset mechanism
- TA6527: EN 303 645 requirements [Added]
- T60: Use correct and approved cryptographic algorithms, parameters, and key lengths
- TA6535: EN 303 645 requirements [Added]
- T72: Use safe arithmetic to avoid integer overflow
- I1880: Rust: Check calculations for integer overflows [Added]
- T151: Use cryptographically secure random numbers [Updated]
- INFO: Updated the text.
- T153: Scrub buffers holding sensitive information when releasing/deleting
- I1878: Rust: Clear sensitive memory after use [Added]
- T159: Follow best practices for secure error and exception handling
- I1881: Rust: Return errors using the Result type and don’t panic [Added]
- T176: Apply principles of privacy when handling personal information
- TA6539: EN 303 645 requirements [Added]
- T189: Minimize the use of unmanaged (native) code
- I1883: Rust: Follow best practices when calling external C/C++ functions [Added]
- P730: Direct Use of Unsafe Unmanaged Code [Updated]
- INFO: Updated the match conditions.
- T196: Avoid unsafe functions
- I1882: Rust: Avoid unsafe code [Added]
- T197: Validate the signature of all remote code/updates to verify their origin and integrity (client side)
- TA6532: EN 303 645 requirements [Added]
- T248: Protect secret keys and passwords in the application
- TA6534: EN 303 645 requirements [Added]
- T301: Verify that buffers holding sensitive information are scrubbed
- I1884: Rust: Clear sensitive memory after use. [Added]
- T338: Control access to resources through user authentication and authorization
- TA6536: EN 303 645 requirements [Added]
- T370: Follow best practices for using third-party software libraries/modules and open source/COTS components
- I1879: Use secure libraries and open source components in Rust [Added]
- T375: Release resources when no longer needed
- I1877: Rust: Avoid memory leaks [Added]
- P293: Uncontrolled Resource Consumption (Resource Exhaustion) [Updated]
- INFO: Updated the match conditions.
- T403: Verify that errors and exceptions are securely handled
- I1886: Rust: Securely handle errors and exception. [Added]
- T433: Design a fallback mechanism or a degraded mode for the system
- TA6540: EN 303 645 requirements [Added]
- T456: Change default security settings to the most stringent ones and disable unnecessary services and modules
- TA6537: EN 303 645 requirements [Added]
- T584: Implement update capabilities for your application
- TA6530: EN 303 645 requirements [Added]
- T586: Implement Secure Boot if possible
- TA6538: EN 303 645 requirements [Added]
- T897: Test if the unmanaged code is used securely
- I1887: Rust: Securely use external functions in Rust. [Added]
- P730: Direct Use of Unsafe Unmanaged Code [Updated]
- INFO: Updated the match conditions.
- T991: Configure connectionTimeout (Apache Tomcat) [Updated]
- INFO: Updated the text.
- I834: Apache Tomcat: Configuring connectionTimeout [Updated]
- INFO: Updated the text.
- T1061: Enable SQL auditing (Microsoft Azure)
- P1024: No SQL auditing (Microsoft Azure) [Updated]
- INFO: Updated the text.
- P1024: No SQL auditing (Microsoft Azure) [Updated]
- T1234: Only allow trusted users to control the Docker daemon (Docker) [Updated]
- INFO: Updated the text.
- T1250: Configure admission control policy securely (Kubernetes) [Updated]
- INFO: Updated the text.
- T1278: Ensure that the --protect-kernel-defaults argument is set to true (Kubernetes) [Updated]
- INFO: Updated the text.
- T1352: Restrict remote access (Google Cloud) [Updated]
- INFO: Updated the text.
- T1376: Provide and maintain guidance on secure installation, maintenance, and configuration of all software components
- TA6542: EN 303 645 requirements [Added]
- T1380: Enforce secure user registration and access control [Updated]
- INFO: Updated the match conditions.
- T1385: Institute secure logging and event monitoring
- TA6541: EN 303 645 requirements [Added]
- T1388: Triage and fix vulnerabilities discovered during automated and manual security tests
- TA6528: EN 303 645 requirements [Added]
- T1403: Disable CLR (Microsoft SQL Server)
- P1195: Enabled CLR (Microsoft SQL Server) [Updated]
- INFO: Updated the text.
- P1195: Enabled CLR (Microsoft SQL Server) [Updated]
- T1461: Leave 'SQL Server Browser' service disabled if it is not required (Microsoft SQL Server) [Updated]
- INFO: Updated the text.
- T1915: Perform network vulnerability assessment
- P1438: Lack of network vulnerability assessment [Updated]
- INFO: Updated the match conditions.
- P1438: Lack of network vulnerability assessment [Updated]
- T1920: Conduct security architecture and design reviews before starting code development
- I1874: Evaluate if Rust is suitable for your requirements [Added]
- T1921: Track and manage usage of third-party and commercial off the shelf (COTS) hardware or software
- TA6529: EN 303 645 requirements [Added]
- T1961: Ensure that the admission control plugin NodeRestriction is enabled (OpenShift) [Updated]
- INFO: Updated the text.
- T2115: Enable image vulnerability scanning (Docker) [Updated]
- INFO: Updated the text.
- T2186: Enforce valid Finite State Machines (FSMs) in hardware logic (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2211: Include a firmware update mechanism/feature (Hardware/Firmware)
- TA6531: EN 303 645 requirements [Added]
- T2296: Securely install and configure all software components
- P1669: Lack of a process for securely installing and configuring all software components [Updated]
- INFO: Updated the match conditions.
- P1669: Lack of a process for securely installing and configuring all software components [Updated]
- T2344: Implement and augment supporting toolchains by automating SDLC security activities [Updated]
- INFO: Updated the content pack and match conditions.
- P1681: Lack of automation and implementation of supporting toolchains [Updated]
- INFO: Updated the content pack.
- T2347: Configure the Integrated Development Environment, Compilation, Interpreter, and Build Processes
- I1875: Prepare a secure Rust development environment [Added]
- T2348: Perform code reviews
- P1685: Lack of proper code reviews [Updated]
- INFO: Updated the match conditions.
- P1685: Lack of proper code reviews [Updated]
- T2349: Configure software to have secure settings by default
- P1686: Lack of secure default settings [Updated]
- INFO: Updated the match conditions.
- P1686: Lack of secure default settings [Updated]
- T2350: Create a Product Security Incident Response Team (PSIRT) [Updated]
- INFO: Updated the match conditions.
- T2352: Verify that supporting toolchains are properly implemented [Updated]
- INFO: Updated the content pack and match conditions.
- P1681: Lack of automation and implementation of supporting toolchains [Updated]
- INFO: Updated the content pack.
- T2354: Verify that an organization-wide software and code repository is established and used [Updated]
- INFO: Updated the content pack and match conditions.
- T2355: Verify that the IDE, compiler, interpreter, and build processes are configured securely [Updated]
- INFO: Updated the content pack and match conditions.
- I1876: Verify a secure Rust development environment [Added]
- T2358: Verify that the organization has a Product Security Incident Response Team (PSIRT) [Updated]
- INFO: Updated the match conditions.
- T2388: Enforce the principle of separation of duties [Updated]
- INFO: Updated the text.
- T2473: Verify the presence of security constraints in all user stories and features [Updated]
- INFO: Updated the match conditions.
- T2474: Include security constraints in all user stories and features [Updated]
- INFO: Updated the match conditions.
- T2481: Define and apply configuration standards for Network Security Controls [Updated]
- INFO: Updated the match conditions.
- T2482: Verify implementing configuration standards [Updated]
- INFO: Updated the match conditions.
- T2483: Follow a control change management process [Updated]
- INFO: Updated the text.
- T2498: Provide clear definitions for each component [Updated]
- INFO: Updated the match conditions.
- T2499: Verify that clear definitions for each component exist [Updated]
- INFO: Updated the match conditions.
- T2510: Define cybersecurity goals and requirements for a component [Updated]
- INFO: Updated the match conditions.
- T2511: Define procedures for decommissioning and terminating cybersecurity support
- TA6533: EN 303 645 requirements [Added]
- T2513: Verify whether cybersecurity goals and requirements are clearly defined for a component [Updated]
- INFO: Updated the match conditions.
- T2514: Establish coding and testing guidelines [Updated]
- INFO: Updated the match conditions.
- T2515: Verify coding and testing guidelines [Updated]
- INFO: Updated the match conditions.
- T2517: Define cybersecurity specifications and post-development procedures [Updated]
- INFO: Updated the match conditions.
- T2518: Verify cybersecurity specifications and post-development procedures [Updated]
- INFO: Updated the match conditions.
- T2519: Prevent prompt injection in Large Language Models [Added]
- P1733: Lack of protection against prompt injection in Large Language Models [Added]
- T2520: Test the prevention of prompt injection in Large Language Models [Added]
- P1733: Lack of protection against prompt injection in Large Language Models [Added]
- T2521: Handle insecure output in Large Language Models [Added]
- P1733: Lack of protection against prompt injection in Large Language Models [Added]
- T2522: Test insecure output handling in Large Language Models [Added]
- P1733: Lack of protection against prompt injection in Large Language Models [Added]
- T2523: Prevent training data poisoning in Large Language Models [Added]
- P1735: Lack of protection against training data poisoning in Large Language Models [Added]
- T2524: Test the prevention of training data poisoning in Large Language Models [Added]
- P1735: Lack of protection against training data poisoning in Large Language Models [Added]
- T2525: Prevent Large Language Model Denial of Service [Added]
- P1736: Lack of protection against Large Language Model denial of service [Added]
- T2526: Test the prevention Large Language Model Denial of Service [Added]
- P1736: Lack of protection against Large Language Model denial of service [Added]
- T2527: Protect Large Language Models against supply chain vulnerabilities [Added]
- P1737: Presence of supply chain vulnerabilities in Large Language Models [Added]
- T2528: Test the protection of Large Language Models against supply chain vulnerabilities [Added]
- P1737: Presence of supply chain vulnerabilities in Large Language Models [Added]
- T2529: Prevent sensitive information disclosure in Large Language Models [Added]
- P1738: Sensitive information disclosure in Large Language Models [Added]
- T2530: Test the prevention of sensitive information disclosure in Large Language Models [Added]
- P1738: Sensitive information disclosure in Large Language Models [Added]
- T2531: Design secure plugins for Large Language Models [Added]
- P1739: Insecure plugin design in Large Language Models [Added]
- T2532: Test plugin design security for Large Language Models [Added]
- P1739: Insecure plugin design in Large Language Models [Added]
- T2533: Mitigate excessive agency in Large Language Models [Added]
- P1740: Excessive agency in Large Language Models [Added]
- T2534: Test excessive agency mitigation in Large Language Models [Added]
- P1740: Excessive agency in Large Language Models [Added]
- T2535: Mitigate overreliance in Large Language Models [Added]
- P1741: Overreliance on Large Language Models [Added]
- T2536: Test overreliance in Large Language Models [Added]
- P1741: Overreliance on Large Language Models [Added]
- T2537: Prevent model theft in Large Language Models [Added]
- P1742: Model theft in Large Language Models [Added]
- T2538: Test model theft prevention in Large Language Models [Added]
- P1742: Model theft in Large Language Models [Added]
- T2539: Provide organizational policies, processes, and procedures to ensure trustworthy and risk-aware AI integration [Added]
- P1743: Lack of organizational policies and procedures for internal and third-party entities [Added]
- TA6455: NIST AI RMF - Govern 1.1: Legal and regulatory requirements [Added]
- TA6456: NIST AI RMF - Govern 1.2: Organizational AI risk management policies [Added]
- TA6457: NIST AI RMF - Govern 1.3: Policies for AI impact measurement and risk assessment [Added]
- TA6458: NIST AI RMF - Govern 1.4: Documentation and policy standardization for AI systems [Added]
- TA6459: NIST AI RMF - Govern 1.7: Decommissioning AI systems policies [Added]
- T2540: Plan mechanisms for monitoring, reviewing, and inventorying AI systems [Added]
- P1743: Lack of organizational policies and procedures for internal and third-party entities [Added]
- TA6460: NIST AI RMF - Govern 1.5: AI systems monitoring and incident response [Added]
- TA6461: NIST AI RMF - Govern 1.6: Inventory AI systems [Added]
- T2541: Establish clear roles, responsibilities, accountability, and training for AI risk management [Added]
- P1743: Lack of organizational policies and procedures for internal and third-party entities [Added]
- TA6462: NIST AI RMF - Govern 2.1: AI risk roles and responsibilities [Added]
- TA6463: NIST AI RMF - Govern 2.2: Training on AI risk management [Added]
- TA6464: NIST AI RMF - Govern 2.3: Management roles and responsibilities [Added]
- T2542: Address necessary human-AI configurations and oversight of AI systems [Added]
- P1743: Lack of organizational policies and procedures for internal and third-party entities [Added]
- TA6465: NIST AI RMF - Govern 3.1: Forming a diverse team [Added]
- TA6466: NIST AI RMF - Govern 3.2: Human-AI policies [Added]
- T2543: Encourage critical thinking and a safety-first mindset in the lifecycle of AI systems [Added]
- P1743: Lack of organizational policies and procedures for internal and third-party entities [Added]
- TA6467: NIST AI RMF - Govern 4.1: Risk culture [Added]
- TA6468: NIST AI RMF - Govern 4.2: Impact assessments [Added]
- TA6469: NIST AI RMF - Govern 4.3: Information sharing about impacts or incidents [Added]
- T2544: Collect and integrate feedback from external AI system developers [Added]
- P1743: Lack of organizational policies and procedures for internal and third-party entities [Added]
- TA6470: NIST AI RMF - Govern 5.1: Manage external stakeholder feedback [Added]
- TA6471: NIST AI RMF - Govern 5.2: Integrate feedback into system design and implementation [Added]
- T2545: Address AI risks associated with third-party entities [Added]
- P1743: Lack of organizational policies and procedures for internal and third-party entities [Added]
- TA6472: NIST AI RMF - Govern 6.1: Address AI risks arising from third-party entities [Added]
- TA6473: NIST AI RMF - Govern 6.2: Handle failures or incidents in third-party data [Added]
- T2546: Identify business value and business use context of AI systems [Added]
- P1744: Lack of recognizing context and failure to identify context-related risks for AI systems [Added]
- TA6474: NIST AI RMF - Map 1.1: Identify AI system's intended and potential beneficial applications [Added]
- TA6475: NIST AI RMF - Map 1.2: AI actor participation in establishing AI system context [Added]
- TA6476: NIST AI RMF - Map 1.3: Organization's mission and relevant goals for AI technology [Added]
- TA6477: NIST AI RMF - Map 1.4: Identify AI system's business value [Added]
- TA6478: NIST AI RMF - Map 1.5: Organizational risk tolerances [Added]
- TA6479: NIST AI RMF - Map 1.6: Socio-technical implications incorporation into design decisions [Added]
- T2547: Define AI system tasks and knowledge limits, and TEVV considerations [Added]
- P1744: Lack of recognizing context and failure to identify context-related risks for AI systems [Added]
- TA6480: NIST AI RMF - Map 2.1: AI system's support [Added]
- TA6481: NIST AI RMF - Map 2.2: Identify AI system's knowledge limits [Added]
- TA6482: NIST AI RMF - Map 2.3: Identify TEVV considerations [Added]
- T2548: Examine potential benefits, costs, and necessary human oversight of using AI systems [Added]
- P1744: Lack of recognizing context and failure to identify context-related risks for AI systems [Added]
- TA6483: NIST AI RMF - Map 3.1: Identify benefits of the intended AI system [Added]
- TA6484: NIST AI RMF - Map 3.2: Identify AI system's potential costs [Added]
- TA6485: NIST AI RMF - Map 3.3: Identify AI system's application scope [Added]
- TA6486: NIST AI RMF - Map 3.4: Define operator and practitioner proficiency [Added]
- TA6487: NIST AI RMF - Map 3.5: Human oversight on AI system [Added]
- T2549: Establish approaches for mapping AI technology and controlling risks [Added]
- P1744: Lack of recognizing context and failure to identify context-related risks for AI systems [Added]
- TA6488: NIST AI RMF - Map 4.1: Identify legal risks associated with AI technology components [Added]
- TA6489: NIST AI RMF - Map 4.2: Identify and control internal risk of AI system's components [Added]
- T2550: Assess the likelihood of each beneficial and harmful identified impact [Added]
- P1744: Lack of recognizing context and failure to identify context-related risks for AI systems [Added]
- TA6490: NIST AI RMF - Map 5.1: Calculate likelihood of AI system's identified impact [Added]
- TA6491: NIST AI RMF - Map 5.2: Collect and integrate AI actor feedback [Added]
- T2551: Create trustworthy AI systems [Added]
- P1745: Lack of proper framework for measuring trustworthiness of AI systems [Added]
- TA6492: NIST AI RMF - Measure 1.1: Metrics framework [Added]
- TA6493: NIST AI RMF - Measure 1.2: Metrics assessment and utilization [Added]
- TA6494: NIST AI RMF - Measure 1.3: TEVV and stakeholder feedback processes [Added]
- T2552: Document and monitor trustworthiness of AI systems [Added]
- P1745: Lack of proper framework for measuring trustworthiness of AI systems [Added]
- TA6495: NIST AI RMF - Measure 2.1: Documentation [Added]
- TA6496: NIST AI RMF - Measure 2.2: Dataset privacy [Added]
- TA6497: NIST AI RMF - Measure 2.3: Population Context [Added]
- TA6498: NIST AI RMF - Measure 2.4: Regular monitoring [Added]
- TA6499: NIST AI RMF - Measure 2.5: Accuracy and Reliability [Added]
- TA6500: NIST AI RMF - Measure 2.6: Measuring safety [Added]
- T2553: Consider resiliency, transparency, and privacy in designing AI systems [Added]
- P1745: Lack of proper framework for measuring trustworthiness of AI systems [Added]
- TA6501: NIST AI RMF - Measure 2.7: Resilience [Added]
- TA6502: NIST AI RMF - Measure 2.8: Transparency [Added]
- TA6503: NIST AI RMF - Measure 2.9: Transparency, explainability, and interpretability [Added]
- TA6504: NIST AI RMF - Measure 2.10: Privacy [Added]
- TA6505: NIST AI RMF - Measure 2.11: Mitigate bias [Added]
- TA6506: NIST AI RMF - Measure 2.12: Environmental Impacts [Added]
- TA6507: NIST AI RMF - Measure 2.13: Metrics improvements [Added]
- T2554: Establish effective monitoring and risk management processes for AI systems [Added]
- P1745: Lack of proper framework for measuring trustworthiness of AI systems [Added]
- TA6508: NIST AI RMF - Measure 3.1: System monitoring [Added]
- TA6509: NIST AI RMF - Measure 3.2: Risk tracking [Added]
- TA6510: NIST AI RMF - Measure 3.3: Impact assessment [Added]
- T2555: Enhance the trustworthiness of AI systems [Added]
- P1745: Lack of proper framework for measuring trustworthiness of AI systems [Added]
- TA6511: NIST AI RMF - Measure 4.1: Engagement Processes [Added]
- TA6512: NIST AI RMF - Measure 4.2: Analyze feedback [Added]
- TA6513: NIST AI RMF - Measure 4.3: TEVV-Based Decisions [Added]
- T2556: Perform risk assessment and management for AI Systems [Added]
- P1746: Lack of proper risk management for AI systems [Added]
- TA6514: NIST AI RMF - Manage 1.1: Suitability analysis [Added]
- TA6515: NIST AI RMF - Manage 1.2: Risk tolerance analysis [Added]
- TA6516: NIST AI RMF - Manage 1.3: Risk response plans [Added]
- TA6517: NIST AI RMF - Manage 1.4: Monitor and manage residual risks for AI systems [Added]
- T2557: Analyze, monitor, and manage risks associated with AI systems [Added]
- P1746: Lack of proper risk management for AI systems [Added]
- TA6518: NIST AI RMF - Manage 2.1: Risk management and planning [Added]
- TA6519: NIST AI RMF - Manage 2.2: Establish risk control [Added]
- TA6520: NIST AI RMF - Manage 2.3: Treatment procedures [Added]
- TA6521: NIST AI RMF - Manage 2.4: Procedures for AI system bypass and reactivation [Added]
- T2558: Manage risks associated with external dependencies and third-party resources in AI system [Added]
- P1746: Lack of proper risk management for AI systems [Added]
- TA6522: NIST AI RMF - Manage 3.1: Third-Party AI Systems [Added]
- TA6523: NIST AI RMF - Manage 3.2: Pre-trained AI Models and Components [Added]
T2559: Regularly monitor and document AI system performance and processes [Added]
- P1746: Lack of proper risk management for AI systems [Added]
- TA6524: NIST AI RMF - Manage 4.1: Performance and trustworthiness [Added]
- TA6525: NIST AI RMF - Manage 4.2: Incorporate feedback [Added]
- TA6526: NIST AI RMF - Manage 4.3: Traceability and transparency [Added]
Changes to Project Properties and Profiles
- Q195: Language and Framework
- Q109: Programming Language
- A1365: Rust [Added]
- Q109: Programming Language
- Q237: Compliance Scope: Other
- Q360: In scope for EN 303 645 [Added]
- A1364: Yes [Added]
- Q325: In-Scope for ISO 27001 Compliance
- A1267: Yes [Updated]
- INFO: Updated the description.
- A1267: Yes [Updated]
- Q360: In scope for EN 303 645 [Added]
- Q284: Context and Characteristics
- Q252: Application's Context and Characteristics
- Q357: Artificial Intelligence/Machine Learning [Added]
- A1362: Uses Large Language Models (LLMs) [Added]
- A1363: AI governance tasks are in scope (based on NIST AI RMF) [Added]
- Q357: Artificial Intelligence/Machine Learning [Added]
- Q252: Application's Context and Characteristics
- Q195: Language and Framework
New Just-in-Time Training
- Defending Databases (22)
- Defending Java (26)
2023.2
July 8, 2023
For the latest SD Elements Release Notes, see our User Guide: https://docs.sdelements.com/release/latest/guide/docs/releasenotes.html
New features and enhancements
Authentication
- Added SAML Group and Role Mapping via the SD Elements UI
- Introduced validation on certificate and key uploading
Reporting
- Dashboards
- Links found in a widget on a dashboard now function as expected
- Dashboards
Survey UX
- Added a ‘last draft’/’published’ label with a timestamp on the project Survey page
- Updated the buttons on the project Survey page
- Added an option for users to see the Survey history within the project Survey page
- All Survey answer changes are now highlighted within the Survey (until they are published)
- Users will now see a new confirmation page when they try to publish the Survey
Content improvements summary
ISO/SAE 21434
- Added new Weaknesses, Countermeasures, Additional Requirements, and a Regulation based on the standard.
OWASP IoT Top 10
- Updated the existing compliance report to the latest (2018) version of the OWASP IoT Top 10 list.
OWASP Top 10 Privacy Risks v2.0
- Updated, mapped, and added Countermeasures to reflect the OWASP Top 10 Privacy Risks v2.0 list.
General Content improvement
- Added new Countermeasures and one Amendment to enrich hardware/firmware content.
- Enhanced the language and actionability of some high-priority Countermeasures.
- Fixed and validated the match conditions of some Weaknesses and Countermeasures.
Content additions and updates (as of June 20, 2023):
Compliance Regulations and Mappings
- Added OWASP IoT Top 10 (2018)
- Added OWASP Top 10 Privacy Risks v2.0
- Added ISO/SAE 21434
- Removed OWASP IoT Top 10 (2014)
- Updated DIACAP [Archived, Use 800-53 report] [INFO: Updated the description].
- Updated OWASP IoT Attack Surface Areas [Retired] [INFO: Updated the description].
Content Packs
- Added OWASP Privacy Top 10
T25: Enforce absolute session timeouts [Updated]
- INFO: Updated the text.
- T26: Expire sessions on logout [Updated]
- INFO: Updated the text.
- T74: Avoid HTTP parameter pollution
- P689: HTTP Parameter Pollution [Updated]
- INFO: Updated the match conditions.
- P689: HTTP Parameter Pollution [Updated]
- T86: Test session ID uniqueness and rotation after authentication [Updated]
- INFO: Updated the priority.
- T118: Test for default accounts and credentials [Deactivated]
- T157: Temporary files must be cleaned up after the resource is used
- P348: Incomplete Cleanup [Updated]
- INFO: Updated the text and match conditions.
- P348: Incomplete Cleanup [Updated]
- T163: Handle health data securely [Updated]
- INFO: Updated the priority.
- T176: Apply principles of privacy when handling personal information [Updated]
- INFO: Updated the text.
- T178: Obtain consent from users prior to collecting personal information [Updated]
- INFO: Updated the text and priority.
- T186: Use recommended settings and the latest patches for third party libraries and software
- P728: Insufficient patching or use of insecure third party software/libraries [Updated]
- INFO: Updated the match conditions.
- P728: Insufficient patching or use of insecure third party software/libraries [Updated]
- T193: Review non-categorized/miscellaneous findings from automated analysis
- P733: Potential security defects reported by automated scanners are missed or overlooked [Updated]
- INFO: Updated the match conditions.
- P733: Potential security defects reported by automated scanners are missed or overlooked [Updated]
- T235: Verify that application does not store protected health information insecurely [Updated]
- INFO: Updated the priority.
- T236: Test that the application encrypts protected health information on the Internet [Updated]
- INFO: Updated the priority.
- T238: Test that users can review and update their personal information [Updated]
- INFO: Updated the inclusion weakness.
- T239: Test that users provide consent prior to the collection of personal information [Updated]
- INFO: Updated the priority.
- T247: Verify logical access to encrypted volumes are managed independently of native operating system [Updated]
- INFO: Updated the inclusion weakness.
- T275: Avoid sending sensitive data using implicit Intents or Broadcasts
- P738: Insufficient Restriction of Intent Receivers in Android [Updated]
- INFO: Updated the match conditions.
- P738: Insufficient Restriction of Intent Receivers in Android [Updated]
- T370: Follow best practices for using third-party software libraries/modules and open source/COTS components
- TA6437: Perform a reuse analysis and asses out-of-context components (ISO 21434) [Added]
- T371: Provide unified and manageable interfaces for security settings and configuration parameters [Updated]
- INFO: Updated the text.
- T545: Verify that personal information is anonymized before being reused for secondary purposes [Updated]
- INFO: Updated the priority.
- T574: Prevent information exposure in HyperCat
- P96: Information Exposure [Updated]
- INFO: Updated the match conditions.
- P96: Information Exposure [Updated]
- T586: Implement Secure Boot if possible [Updated]
- INFO: Updated the text.
- T605: Verify if consent is obtained prior to personal information collection (where applicable) [Updated]
- INFO: Updated the priority.
- T666: Rotate access keys every 90 days or less (AWS)
- P161: Password Aging with Long Expiration [Updated]
- INFO: Updated the match conditions.
- P161: Password Aging with Long Expiration [Updated]
- T739: Verify if transferring personal information is legitimate and in compliance with applicable privacy regulations [Updated]
- INFO: Updated the priority.
- T743: Verify accuracy of personal information [Updated]
- INFO: Updated the priority.
- T745: Verify if pseudonymized personal information is protected [Updated]
- INFO: Updated the priority.
- T750: Limit personal information collection and processing to the specified purpose [Updated]
- INFO: Updated the text.
- T753: Verify whether personal information is collected only for specified purposes [Updated]
- INFO: Updated the priority.
- T756: Verify if personal data processing activities are recorded and maintained [Updated]
- INFO: Updated the priority.
- T757: Verify if personal information processing stops when user objects to it [Updated]
- INFO: Updated the priority.
- T838: Test if your application adheres to HTTP DNT header [Updated]
- INFO: Updated the priority.
- T1202: Set container CPU priority appropriately (Docker)
- P1090: Container CPU priority is not set appropriately (Docker) [Updated]
- INFO: Updated the text.
- P1090: Container CPU priority is not set appropriately (Docker) [Updated]
- T1364: Verify that third party software libraries/modules and open source/COTS components are used securely
- TA6450: Verify the reuse analysis and the analysis of out-of-context and off-the-shelf components (ISO 21434) [Added]
- T1366: Identify applicable compliance regulations
- P1171: Lack of a process for identifying applicable compliance regulation [Updated]
- INFO: Updated the match conditions.
- P1171: Lack of a process for identifying applicable compliance regulation [Updated]
- T1367: Identify and classify critical assets
- P1172: Lack of a process for identifying critical assets [Updated]
- INFO: Updated the match conditions.
- P1172: Lack of a process for identifying critical assets [Updated]
- T1368: Perform security testing using SAST tools [Updated]
- INFO: Updated the text.
- P1186: Lack of a process for static application security testing (SAST) [Updated]
- INFO: Updated the match conditions.
- T1369: Perform security testing using DAST tools [Updated]
- INFO: Updated the text.
- P1173: Lack of a process for dynamic application testing [Updated]
- INFO: Updated the match conditions.
- T1370: Identify and track common software weaknesses and threats
- TA6433: Define continual cybersecurity activities (ISO 21434) [Added]
- P1187: Lack of a process for identifying and assessing threats [Updated]
- INFO: Updated the title and match conditions.
- T1371: Use a software security management solution to select and track security controls
- P1188: Lack of software security management solution to track security controls [Updated]
- INFO: Updated the match conditions.
- P1188: Lack of software security management solution to track security controls [Updated]
- T1372: Follow software change management process
- P1174: Lack of software change management process [Updated]
- INFO: Updated the match conditions.
- P1174: Lack of software change management process [Updated]
- T1373: Maintain the integrity of all software code [Updated]
- INFO: Updated the priority.
- P1175: Insufficient software code control [Updated]
- INFO: Updated the match conditions.
- T1374: Ensure the integrity of software release and update delivery
- P1178: Lack of a process for ensuring the integrity of software release and update [Updated]
- INFO: Updated the match conditions.
- P1178: Lack of a process for ensuring the integrity of software release and update [Updated]
- T1376: Provide and maintain guidance on secure installation, maintenance, and configuration of all software components
- P1181: Lack of guidance on secure installation, maintenance and configuration of all software components [Updated]
- INFO: Updated the match conditions.
- P1181: Lack of guidance on secure installation, maintenance and configuration of all software components [Updated]
- T1377: Establish and maintain a bi-directional communication channel for receiving security reports and sending security notifications [Updated]
- INFO: Updated the priority.
- P1182: Lack of a communication channel for reporting security issues [Updated]
- INFO: Updated the match conditions.
- T1378: Release a change summary for each software update
- P1177: Lack of a process for creating summary of changes upon each software update [Updated]
- INFO: Updated the match conditions.
- P1177: Lack of a process for creating summary of changes upon each software update [Updated]
- T1380: Enforce secure user registration and access control
- P1185: Lack of process for user registration and enforcement of access control [Updated]
- INFO: Updated the match conditions.
- P1185: Lack of process for user registration and enforcement of access control [Updated]
- T1381: Establish secure processes for key management
- P1434: Lack of secure key management process [Updated]
- INFO: Updated the match conditions.
- P1434: Lack of secure key management process [Updated]
- T1382: Manage performance and capacity
- P1190: Lack of process for performance and capacity management [Updated]
- INFO: Updated the match conditions.
- P1190: Lack of process for performance and capacity management [Updated]
- T1383: Separate development, test, and operational environments
- TA6440: Create a production control plan (ISO 21434) [Added]
- P1191: Deploying software in production on the same environment as development and testing [Updated]
- INFO: Updated the match conditions.
- T1384: Back up and restore securely [Updated]
- INFO: Updated the priority.
- P1179: A secure backup and restore processes are missing or lacking [Updated]
- INFO: Updated the match conditions.
- T1385: Institute secure logging and event monitoring
- P1183: No secure processes for logging and monitoring events [Updated]
- INFO: Updated the match conditions.
- P1183: No secure processes for logging and monitoring events [Updated]
- T1386: Regulate the use of electronic messaging [Updated]
- INFO: Updated the priority.
- T1387: Ensure the security of products acquired through the supply chain and contractors
- P1170: Lack of a secure process for outsourcing [Updated]
- INFO: Updated the match conditions.
- P1170: Lack of a secure process for outsourcing [Updated]
- T1388: Triage and fix vulnerabilities discovered during automated and manual security tests
- P1225: Unmanaged test result findings [Updated]
- INFO: Updated the match conditions.
- P1225: Unmanaged test result findings [Updated]
- T1389: Perform penetration testing [Updated]
- INFO: Updated the priority.
- P1184: Lack of a secure process for penetration testing [Updated]
- INFO: Updated the match conditions.
- T1892: Perform a Threat and Risk Assessment (TRA)
- TA6434: Perform risk analysis and treatments for a component (ISO 21434) [Added]
- TA6446: Identify assets and their damage scenarios (ISO 21434) [Added]
- TA6451: Identify threat scenarios and attack paths for assets (ISO 21434) [Added]
- TA6453: Determine an attack feasibility rating and risk value for each attack scenario (ISO 21434) [Added]
- P1187: Lack of a process for identifying and assessing threats [Updated]
- INFO: Updated the title and match conditions.
- T1893: Perform a cloud solution security posture assessment
- P1436: Lack of cloud solution security posture assessment [Updated]
- INFO: Updated the match conditions.
- P1436: Lack of cloud solution security posture assessment [Updated]
- T1894: Perform a vendor security assessment
- TA6435: Ensure the proper distribution of cybersecurity activities with other organizations (ISO 21434) [Added]
- P1437: Lack of vendor security assessment [Updated]
- INFO: Updated the match conditions.
- T1895: Protect applications with Intrusion Detection / Protection System (IDS/IPS) [Updated]
- INFO: Updated the priority.
- P1429: Applications not protected with Intrusion Detection / Protection System (IDS/IPS) [Updated]
- INFO: Updated the match conditions.
- T1915: Perform network vulnerability assessment [Updated]
- INFO: Updated the priority.
- P1438: Lack of network vulnerability assessment [Updated]
- INFO: Updated the match conditions.
- T1917: Perform container security assessment [Updated]
- INFO: Updated the priority.
- T1920: Conduct security architecture and design reviews before starting code development [Updated]
- INFO: Updated the priority.
- P1432: Lack of security architecture and design activities [Updated]
- INFO: Updated the match conditions.
- T1921: Track and manage usage of third-party and commercial off the shelf (COTS) hardware or software [Updated]
- INFO: Updated the priority.
- P1433: Lack of third-party software code or dependencies management [Updated]
- INFO: Updated the match conditions.
- T1925: Maintain the default behavior for anonymous access (OpenShift) [Updated]
- INFO: Updated the priority.
- T1926: Verify that the default behavior for anonymous access is maintained (OpenShift) [Updated]
- INFO: Updated the priority.
- T1927: Disable basic-auth-file method (OpenShift) [Updated]
- INFO: Updated the priority.
- T1928: Verify that the basic-auth-file option has not been configured (OpenShift) [Updated]
- INFO: Updated the priority.
- T1929: Secure communication between API server and master nodes (OpenShift) [Updated]
- INFO: Updated the priority.
- T1930: Verify that the connection between API server and master node is secure (OpenShift) [Updated]
- INFO: Updated the priority.
- T1931: Prevent insecure bindings and insecure port access (OpenShift) [Updated]
- INFO: Updated the priority.
- T1932: Verify that insecure-bind-address and insecure-port are disabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T1933: Do not disable secure-port for API server traffic (OpenShift) [Updated]
- INFO: Updated the priority.
- T1934: Verify that 'secure-port' is not disabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T1943: Use Security Context Constraints instead of SecurityContextDeny admission controllers (OpenShift) [Updated]
- INFO: Updated the priority.
- T1944: Verify that the list of admission controllers does not include SecurityContextDeny (OpenShift) [Updated]
- INFO: Updated the priority.
- T1945: Do not disable NamespaceLifecycle admission controller (OpenShift) [Updated]
- INFO: Updated the priority.
- T1946: Verify that the NamespaceLifecycle plugin is not disabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T1947: Configure auditing properly on the API server (OpenShift) [Updated]
- INFO: Updated the priority.
- T1948: Verify that API server auditing is configured properly (OpenShift) [Updated]
- INFO: Updated the priority.
- T1949: Do not set authorization-mode flag (OpenShift) [Updated]
- INFO: Updated the priority.
- T1950: Verify that the authorization-mode argument is not set to AlwaysAllow and Node authorizer is enabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T1951: Do not use static token files for authentication (OpenShift) [Updated]
- INFO: Updated the priority.
- T1952: Verify that static token files are not used (OpenShift) [Updated]
- INFO: Updated the priority.
- T1953: Ensure that the service-account-lookup and service-account-key-file arguments are properly set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1954: Verify that the service-account-lookup and service-account-key-file arguments are properly set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1955: Do not enable PodSecurityPolicy admission control plugin (OpenShift) [Updated]
- INFO: Updated the priority.
- T1956: Verify that the admission control plugin SecurityContextConstraint is set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1957: Ensure that etcd arguments are properly set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1958: Verify that etcd arguments are properly set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1959: Do not disable ServiceAccount admission controller (OpenShift) [Updated]
- INFO: Updated the priority.
- T1960: Verify that the admission control plugin ServiceAccount is set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1961: Ensure that the admission control plugin NodeRestriction is enabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T1962: Verify that the admission control plugin NodeRestriction is set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1963: Encrypt data at rest in etcd datastore with aescbc encryption (OpenShift) [Updated]
- INFO: Updated the priority.
- T1964: Verify data at rest on etcd datastore is encrypted with aescbc encryption provider (OpenShift) [Updated]
- INFO: Updated the priority.
- T1965: Enable the APIPriorityAndFairness feature gate (OpenShift) [Updated]
- INFO: Updated the priority.
- T1966: Verify that the APIPriorityAndFairness feature gate is enabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T1967: Adjust the request timeout value (OpenShift) [Updated]
- INFO: Updated the priority.
- T1968: Verify that request timeout is set to an appropriate value (OpenShift) [Updated]
- INFO: Updated the priority.
- T1969: Do not expose profiling to the web (OpenShift) [Updated]
- INFO: Updated the priority.
- T1970: Verify that profiling is not exposed to the web (OpenShift) [Updated]
- INFO: Updated the priority.
- T1973: Do not disable use-service-account-credentials argument (OpenShift) [Updated]
- INFO: Updated the priority.
- T1974: Verify that use-service-account-credentials is not disabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T1975: Do not change the default setting for service-account-private-key-file (OpenShift) [Updated]
- INFO: Updated the priority.
- T1976: Verify that the service-account-private-key-file argument is properly set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1977: Ensure that root-ca-file is properly set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1978: Verify that the root-ca-file argument is not set (OpenShift) [Updated]
- INFO: Updated the priority.
- T1979: Never give pods more privileges than required (OpenShift) [Updated]
- INFO: Updated the priority.
- T1980: Verify that Security Context Constraints get applied (OpenShift) [Updated]
- INFO: Updated the priority.
- T1983: Set permissions for sensitive files properly (OpenShift) [Updated]
- INFO: Updated the priority.
- T1984: Verify the permissions for the configuration files (OpenShift) [Updated]
- INFO: Updated the priority.
- T1985: Secure etcd communication (OpenShift) [Updated]
- INFO: Updated the priority.
- T1986: Verify that etcd communication is secure (OpenShift) [Updated]
- INFO: Updated the priority.
- T1989: Run pods with the most restrictive Security Context Constraints possible (OpenShift) [Updated]
- INFO: Updated the priority.
- T1990: Verify Security Context Constraints as in use (OpenShift) [Updated]
- INFO: Updated the priority.
- T1999: Implement strong network policies (OpenShift) [Updated]
- INFO: Updated the priority.
- T2000: Verify network policies (OpenShift) [Updated]
- INFO: Updated the priority.
- T2001: Limit the use of privileged containers (OpenShift) [Updated]
- INFO: Updated the priority.
- T2002: Verify the usage of privileged containers (OpenShift) [Updated]
- INFO: Updated the priority.
- T2003: Do not disable the 'allow-privileged' flag (OpenShift) [Updated]
- INFO: Updated the priority.
- T2004: Verify that the 'allow-privileged' flag is not disabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T2005: Disable anonymous requests (OpenShift) [Updated]
- INFO: Updated the title and text.
- T2007: Keep the default value for the authorization mode argument (OpenShift) [Updated]
- INFO: Updated the title, text, and priority.
- T2008: Verify that the authorization-mode argument is not set (OpenShift) [Updated]
- INFO: Updated the priority.
- T2011: Do not set the read-only-port argument (OpenShift) [Updated]
- INFO: Updated the priority.
- T2012: Verify that the read-only port is not enabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T2013: Adjust the value of streaming-connection-idle-timeout argument (OpenShift) [Updated]
- INFO: Updated the priority.
- T2014: Verify the value of streaming-connection-idle-timeout argument (OpenShift) [Updated]
- INFO: Updated the priority.
- T2017: Ensure that the make-iptables-util-chains is set to true (OpenShift) [Updated]
- INFO: Updated the priority.
- T2018: Verify that make-iptables-util-chains is set to true for each machinepool (OpenShift) [Updated]
- INFO: Updated the priority.
- T2019: Do not enable the 'keep-terminated-pod-volumes' flag (OpenShift) [Updated]
- INFO: Updated the priority.
- T2020: Verify that the 'keep-terminated-pod-volumes' is not enabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T2021: Ensure that the hostname-override is not set (OpenShift) [Updated]
- INFO: Updated the priority.
- T2022: Verify that hostname-override does not exist (OpenShift) [Updated]
- INFO: Updated the priority.
- T2023: Set the kubeAPIQPS event-qps argument to 0 (OpenShift) [Updated]
- INFO: Updated the priority.
- T2024: Verify that the value of event-qps is set to 0 (OpenShift) [Updated]
- INFO: Updated the priority.
- T2027: Do not enable cAdvisor endpoint (OpenShift) [Updated]
- INFO: Updated the priority.
- P1491: Enabling cAdvisor endpoint (OpenShift) [Updated]
- INFO: Updated the text.
- T2028: Verify that cAdvisor endpoint is not enabled (OpenShift) [Updated]
- INFO: Updated the priority.
- P1491: Enabling cAdvisor endpoint (OpenShift) [Updated]
- INFO: Updated the text.
- T2029: Do not disable rotate-certificates (OpenShift) [Updated]
- INFO: Updated the priority.
- T2030: Verify that rotate-certificates settings are not disabled (OpenShift) [Updated]
- INFO: Updated the priority.
- T2128: Notify users and regulators of breaches of personal information [Updated]
- INFO: Updated the title and text.
- T2137: Ensure that sensitive data is not recorded (iOS)
- P1545: Information Disclosure in iOS via ReplayKit Framework [Updated]
- INFO: Updated the match conditions.
- P1545: Information Disclosure in iOS via ReplayKit Framework [Updated]
- T2144: Implement CAN bus protocol properly (Connected Cars)
- P1548: Poor implementation of CAN bus protocol (Connected Cars) [Updated]
- INFO: Updated the match conditions.
- P1548: Poor implementation of CAN bus protocol (Connected Cars) [Updated]
- T2145: Enable gRPC Server-Client Certificate Authentication (.NET Core 3)
- P1549: Unauthenticated gRPC client-server communication [Updated]
- INFO: Updated the match conditions.
- P1549: Unauthenticated gRPC client-server communication [Updated]
- T2164: N/A - Not Applicable [Updated]
- INFO: Updated the inclusion weakness.
- T2170: Ensure that personal information processed by the application meets data localization requirements [Updated]
- INFO: Updated the priority.
- T2172: Enforce the principle of least privilege (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2174: Avoid unintended proxy or intermediary (Confused Deputy) (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2176: Avoid mixing agents of varying trust levels (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2177: Generate unique and immutable identifiers in SoC (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2178: Ensure fabric access controls enablement before 3rd party hardware IPs (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2179: Block write operations to reserve bits (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2180: Review Access Control Policy (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2181: Evaluate write-once registers for proper configuration (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2182: Check lock bit protections for design consistency (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2183: Avoid using chicken bits (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2184: Disable access to security-sensitive information stored in fuses (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2186: Enforce valid Finite State Machines (FSMs) in hardware logic (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2187: Enforce proper implementation of wear leveling operations (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2188: Enforce proper protection against voltage and clock glitches (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2189: Prevent Semiconductor Defects in Hardware Logic with Security-Sensitive Implications (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2190: Prevent mirroring regions with different values (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2191: Ensure using configured CPU hardware to support exclusivity of write and execute operations (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2192: Prevent incorrect selection of fuse values (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2193: Prevent incorrect comparison logic granularity (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2195: Ensure access control applied properly to Mirrored or Aliased Memory Regions (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2196: Prevent exposure of sensitive system information due to uncleared debug information (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2197: Prevent Improper Restriction of Security Token Assignment (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2198: Prevent improper handling of overlap between protected memory ranges (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2199: Prevent improper handling of single-event upsets (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2200: Ensure register interface does not allow software access to sensitive data (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2201: Enforce physical access control (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2239: Tag traces to indicate owner and debugging privilege level (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2240: Designate an immutable Root of Trust for storage (Hardware/Firmware)
- TA6432: Validate device firmware/software at the time of manufacturing (Hardware/Firmware) [Added]
- T2241: Ensure security version data is protected from tampering (Hardware/Firmware) [Updated]
- INFO: Updated the text and priority.
- T2242: Implement priority-based arbitration inside the Network on Chips (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2243: Protect against fault injection attacks (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2244: Protect against error injection errors in redundant blocks (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2245: Protect against abnormal thermal range (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2256: Authenticate and log all access to registries containing sensitive or proprietary images
- P1650: Insufficient authentication for container registries [Updated]
- INFO: Updated the match conditions.
- P1650: Insufficient authentication for container registries [Updated]
- T2257: Keep host OS components up-to-date
- P1651: Insufficient updates of host OS components [Updated]
- INFO: Updated the match conditions.
- P1651: Insufficient updates of host OS components [Updated]
- T2258: Minimize host OS attack surface
- P1652: Large host OS attack surface [Updated]
- INFO: Updated the match conditions.
- P1652: Large host OS attack surface [Updated]
- T2262: Verify client certificate authentication is not used for users (Kubernetes) [Updated]
- INFO: Updated the priority.
- T2264: Verify network policies and CNI selection are appropriate (Kubernetes) [Updated]
- INFO: Updated the priority.
- T2271: Test to confirm that unauthorized access to sensitive data through debug or test interfaces is properly restricted (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2272: Test immutability of Root of Trust for storage (Hardware/Firmware) [Updated]
- INFO: Updated the priority.
- T2296: Securely install and configure all software components [Updated]
- INFO: Updated the priority.
- T2324: Verify whether privacy principles are applied for handling personal data [Updated]
- INFO: Updated the priority.
- T2327: Verify if a Privacy Impact Assessment is performed [Updated]
- INFO: Updated the priority.
- P1435: Lack of Privacy Impact Assessment (PIA) [Updated]
- INFO: Updated the match conditions.
- T2328: Verify if proper policies exist for processing sensitive personal data [Updated]
- INFO: Updated the priority.
- P1180: Lack of process for collecting and protecting sensitive data [Updated]
- INFO: Updated the match conditions.
- T2329: Verify if health data is handled securely [Updated]
- INFO: Updated the priority.
- T2330: Verify if children's personal information is handled securely [Updated]
- INFO: Updated the priority.
- T2331: Verify whether any plan exists for data privacy incident response [Updated]
- INFO: Updated the priority.
- T2337: Keep your infrastructure state secure (Terraform) [Updated]
- INFO: Updated the text.
- T2343: Define security-related roles and provide role-base training [Updated]
- INFO: Updated the match conditions.
- P1680: Lack of defining proper security roles and responsibilities [Updated]
- INFO: Updated the match conditions.
- T2344: Implement and augment supporting toolchains by automating SDLC security activities [Updated]
- INFO: Updated the match conditions.
- P1681: Lack of automation and implementation of supporting toolchains [Updated]
- INFO: Updated the match conditions.
- T2345: Define and implement criteria for software security checks [Updated]
- INFO: Updated the match conditions.
- TA6438: Enforce product cybersecurity validation (ISO 21434) [Added]
- P1682: Lack of proper criteria for software security checks [Updated]
- INFO: Updated the match conditions.
- T2346: Establish an organization-wide software and code repository
- P1683: Lack of organization-wide software and code repository [Updated]
- INFO: Updated the match conditions.
- P1683: Lack of organization-wide software and code repository [Updated]
- T2347: Configure the Integrated Development Environment, Compilation, Interpreter, and Build Processes
- P1684: Lack of proper integration of the development environment and tools [Updated]
- INFO: Updated the cwe set and match conditions.
- P1684: Lack of proper integration of the development environment and tools [Updated]
- T2348: Perform code reviews
- P1685: Lack of proper code reviews [Updated]
- INFO: Updated the match conditions.
- P1685: Lack of proper code reviews [Updated]
- T2349: Configure software to have secure settings by default
- P1686: Lack of secure default settings [Updated]
- INFO: Updated the cwe set and match conditions.
- P1686: Lack of secure default settings [Updated]
- T2350: Create a Product Security Incident Response Team (PSIRT) [Updated]
- INFO: Updated the priority and match conditions.
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the match conditions.
- T2351: Verify that security-related roles and responsibilities are properly defined and assigned [Updated]
- INFO: Updated the match conditions.
- P1680: Lack of defining proper security roles and responsibilities [Updated]
- INFO: Updated the match conditions.
- T2352: Verify that supporting toolchains are properly implemented [Updated]
- INFO: Updated the match conditions.
- P1681: Lack of automation and implementation of supporting toolchains [Updated]
- INFO: Updated the match conditions.
- T2353: Verify that proper criteria for software security checks are defined and implemented [Updated]
- INFO: Updated the match conditions.
- TA6439: Verify product cybersecuriy validation (ISO 21434) [Added]
- P1682: Lack of proper criteria for software security checks [Updated]
- INFO: Updated the match conditions.
- T2358: Verify that the organization has a Product Security Incident Response Team (PSIRT) [Updated]
- INFO: Updated the priority and match conditions.
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the match conditions.
- T2359: Configure a secure user authentication (Cloud) (2/2) [Updated]
- INFO: Updated the priority.
- T2360: Configure a secure user authorization (Cloud) (2/2) [Updated]
- INFO: Updated the priority.
- T2361: Design a secure application architecture for the cloud environment (Cloud) (2/2) [Updated]
- INFO: Updated the priority.
- T2368: Enable logging and protect log files in your cloud environment (Cloud) (2/4) [Updated]
- INFO: Updated the priority.
- T2369: Enable logging and protect log files in your cloud environment (Cloud) (3/4) [Updated]
- INFO: Updated the priority.
- T2370: Enable logging and protect log files in your cloud environment (Cloud) (4/4) [Updated]
- INFO: Updated the priority.
- T2371: Enable logs and configuration monitoring in your cloud environment (Cloud) (2/4) [Updated]
- INFO: Updated the priority.
- T2372: Enable logs and configuration monitoring in your cloud environment (Cloud) (3/4) [Updated]
- INFO: Updated the priority.
- T2373: Enable logs and configuration monitoring in your cloud environment (Cloud) (4/4) [Updated]
- INFO: Updated the priority.
- T2374: Verify that logging is enabled and log files are protected (Cloud) (2/2) [Updated]
- INFO: Updated the priority.
- T2375: Verify that log monitoring and configuration monitoring are enabled (Cloud) (2/3) [Updated]
- INFO: Updated the priority.
- T2376: Verify that log monitoring and configuration monitoring are enabled (Cloud) (3/3) [Updated]
- INFO: Updated the priority.
- T2379: Ensure compliance with ISO/SAE 21434 [Updated]
- INFO: Updated the match conditions.
- P1688: Lack of processes for the approval of vehicles with regards to cyber security and cyber security management system [Updated]
- INFO: Updated the match conditions.
- T2389: Prevent co-channel and adjacent channel interference
- P1693: Poor WiFi Settings Configuration [Updated]
- INFO: Updated the text and match conditions.
- P1693: Poor WiFi Settings Configuration [Updated]
- T2392: Create an Incident Response Plan [Updated]
- INFO: Updated the text.
- TA6444: Create incident response plans (ISO 21434) [Added]
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the match conditions.
- T2396: Verify that the organization has a Product Security Incident Plan
- TA6445: Verify incident response plans (ISO 21434) [Added]
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the match conditions.
- T2419: Verify Cognito uses strong authentication requirements (Amazon Cognito) [Updated]
- INFO: Updated the match conditions.
- T2423: Verify the S3 backup for Kinesis Firehose delivery failures are checked regularly (Amazon Kinesis Data Firehose) [Updated]
- INFO: Updated the match conditions.
- T2428: Implement least privilege access to Kinesis streams (Amazon Kinesis Data Streams) [Updated]
- INFO: Updated the match conditions.
- T2429: Verify least privilege access to Kinesis streams is implemented (Amazon Kinesis Data Streams) [Updated]
- INFO: Updated the match conditions.
- T2433: Verify Kinesis events are logged (Amazon Kinesis Data Streams) [Updated]
- INFO: Updated the priority.
- T2443: Verify proper permissions for files on worker nodes (Containerization) [Updated]
- INFO: Updated the priority.
- T2445: Verify secure authentication to and from worker nodes (Containerization) [Updated]
- INFO: Updated the priority.
- T2447: Verify the collection and protection of sensitive information on worker nodes (Containerization) [Updated]
- INFO: Updated the priority.
- T2449: Verify the availability of worker nodes (Containerization) [Updated]
- INFO: Updated the priority.
- T2451: Verify that worker nodes are protected with proper flags and arguments (Containerization) [Updated]
- INFO: Updated the priority.
- T2456: Assign roles properly (Containerization) [Updated]
- INFO: Updated the text.
- T2470: Verify CloudWatch is used to monitor Kinesis Firehose decryption failures (Amazon Kinesis Data Firehose) [Updated]
- INFO: Updated the match conditions.
- T2480: Include Content-Disposition headers in API responses [Updated]
- INFO: Updated the text.
- T2490: Provision device with private/public key pair securely (Hardware/Firmware) [Added]
- P1721: Insecure storage of credentials (Hardware/Firmware) [Added]
- T2491: Verify that the device is securely provisioned with a private/public key pair (Hardware/Firmware) [Added]
- P1721: Insecure storage of credentials (Hardware/Firmware) [Added]
- T2492: Use device-generated opaque keys to encrypt OS files and data on the device (Hardware/Firmware) [Added]
- P1722: Unsecure key generation (Hardware/Firmware) [Added]
- T2493: Verify that the device can generate opaque keys to encrypt OS files and data on the device (Hardware/Firmware) [Added]
- P1722: Unsecure key generation (Hardware/Firmware) [Added]
- T2494: Encrypt the bootloader (Hardware/Firmware) [Added]
- P1723: Unencrypted bootloader (Hardware/Firmware) [Added]
- T2495: Verify that the bootloader is encrypted (Hardware/Firmware) [Added]
- P1723: Unencrypted bootloader (Hardware/Firmware) [Added]
- T2496: Generate and forward audit logs (Hardware/Firmware) [Added]
- P1724: Lack of device-generated audit logs (Hardware/Firmware) [Added]
- T2497: Verify that the device generates and forwards audit logs (Hardware/Firmware) [Added]
- P1724: Lack of device-generated audit logs (Hardware/Firmware) [Added]
- T2498: Provide clear definitions for each component [Added]
- P1716: Lack of Technical Documentation [Updated]
- INFO: Updated the text.
- P1716: Lack of Technical Documentation [Updated]
- T2499: Verify that clear definitions for each component exist [Added]
- P1716: Lack of Technical Documentation [Updated]
- INFO: Updated the text.
- P1716: Lack of Technical Documentation [Updated]
- T2500: Verify that a Threat and Risk Assessment (TRA) is performed [Added]
- TA6447: Verify a proper risk analysis and treatments are performed (ISO 21434) [Added]
- TA6448: Verify the procedures for identifying assets and their damage scenarios (ISO 21434) [Added]
- TA6452: Verify that threat scenarios and attack paths are identified for each valuable asset (ISO 21434) [Added]
- TA6454: Verify the procedures for evaluating attack feasibility and risk rating (ISO 21434) [Added]
- P1187: Lack of a process for identifying and assessing threats [Updated]
- INFO: Updated the title and match conditions.
- T2501: Perform cybersecurity planning [Added]
- P1727: Lack of cybersecurity planning [Added]
- T2502: Define a cybersecurity policy for your organization [Added]
- P1726: Lack of an organizational cybersecurity policy [Added]
- T2503: Verify the cybersecurity policy of your organization [Added]
- P1726: Lack of an organizational cybersecurity policy [Added]
- T2504: Verify the cybersecurity plan [Added]
- P1727: Lack of cybersecurity planning [Added]
- T2505: Conduct cybersecurity assessments for components [Added]
- P1729: Lack of a cybersecurity assessment [Added]
- T2506: Verify the cybersecurity assessment report [Added]
- P1729: Lack of a cybersecurity assessment [Added]
- T2507: Verify vendor security assessment [Added]
- TA6436: Verify the proper distribution of cybersecurity activities with other organizations (ISO 21434) [Added]
- P1437: Lack of vendor security assessment [Updated]
- INFO: Updated the match conditions.
- T2509: Verify the separation of development, test, and operational environments [Added]
- TA6441: Verify your production control plan (ISO 21434) [Added]
- P1191: Deploying software in production on the same environment as development and testing [Updated]
- INFO: Updated the match conditions.
- T2510: Define cybersecurity goals and requirements for a component [Added]
- P1716: Lack of Technical Documentation [Updated]
- INFO: Updated the text.
- P1716: Lack of Technical Documentation [Updated]
- T2511: Define procedures for decommissioning and terminating cybersecurity support [Added]
- P1730: Lack of procedures for decommissioning and terminating cybersecurity support [Added]
- T2512: Verify implemented procedures for decommissioning and terminating cybersecurity support [Added]
- P1730: Lack of procedures for decommissioning and terminating cybersecurity support [Added]
- T2513: Verify whether cybersecurity goals and requirements are clearly defined for a component [Added]
- P1716: Lack of Technical Documentation [Updated]
- INFO: Updated the text.
- P1716: Lack of Technical Documentation [Updated]
- T2514: Establish coding and testing guidelines [Added]
- P1731: Lack of coding and testing guidelines [Added]
- T2515: Verify coding and testing guidelines [Added]
- P1731: Lack of coding and testing guidelines [Added]
- T2516: Verify that common software weaknesses and threats are identified and tracked. [Added]
- TA6449: Verify the continuous monitoring, evaluation and management of security vulnerabilities (ISO 21434) [Added]
- P1187: Lack of a process for identifying and assessing threats [Updated]
- INFO: Updated the title and match conditions.
- T2517: Define cybersecurity specifications and post-development procedures [Added]
- P1732: Lack of cybersecurity specifications and post-development procedures [Added]
- T2518: Verify cybersecurity specifications and post-development procedures [Added]
- P1732: Lack of cybersecurity specifications and post-development procedures [Added]
P1564: N/A - Not Applicable [Deactivated]
Changes to Project Properties and Profiles
- Q284: Context and Characteristics
- Q252: Application's Context and Characteristics
- A1350: Include general countermeasures in the Activity phase (process engineering tasks) in this project [Updated]
- INFO: Updated the text and description.
- A1350: Include general countermeasures in the Activity phase (process engineering tasks) in this project [Updated]
- Q252: Application's Context and Characteristics
- Q352: Automotive [Added]
- Q353: In-scope for Automotive Cybersecurity Regulations [Added]
- A1358: ISO/SAE 21434 [Added]
- A1359: WP.29 R155 [Added]
- Q353: In-scope for Automotive Cybersecurity Regulations [Added]
- Q284: Context and Characteristics
New Just-in-Time Training
- PCI DSS (16)
- Defending Node (17)
2023.1
April 15, 2023
New features and enhancements
Advanced Reports
- Granular Permissions
- Added the ability to control and restrict user access to specific data sets or features within a reporting tool. This level of control allows administrators to tailor the user experience, ensuring that each user has access only to the data that is relevant to their role and responsibilities.
- Granular Permissions
Authentication
- SAML V2 UI & Groups & Roles Assertions via API
- Upgraded the SAML user interface. This feature is currently disabled by default.
- Added new API endpoints under SAML V2 that support the ability to extend SAML authentication with Group & Role assertions from an Identity Provider.
- SAML V2 UI & Groups & Roles Assertions via API
Threat Model Diagrams
- Added the ability to import diagrams (in the UI only), specifically when the Diagrams feature flag is turned on. Imported diagrams do not have an impact on Threats, Weaknesses, or Countermeasures, but they do allow SD Elements to be the centralized repository where all threat modeling documentation is stored.
Components
- Built-in components
- Added the ability for users with customize_content permissions to edit built-in components in the SD Elements library. They can change the name, answer mapping and the Countermeasures list.
- Built-in components
Other product improvements
Integrations
- Extended the content under Jira Integration to inform how Jira Comment Sync connects and how it is expected to work when enabled.
- Created a new table under LDAP documentation explaining expected behavior when managing the deactivation configurations under the LDAP Synchronization feature.
- Extended the content under Jira Integration to inform how Jira Comment Sync connects and how it is expected to work when enabled.
Survey
- Added a banner to the project survey page showing a survey status of either published (green banner) or draft (yellow banner).
Threat Model Diagrams
- Added a Threats feature flag to hide Threats from the UI.
Library
- Addressed a bug related to new library content not inheriting the parent content pack's active status.
- Updated the Import/Export tool to use Countermeasure instead of Task and Weakness instead of Problem in the files.
Content improvements summary
PCI DSS 4.0
- Added new Countermeasures, Additional Requirements, and a Regulation based on updated standards.
ASVS 4.0
- Added new Countermeasures and Additional Requirements to cover all ASVS v4.0 controls.
CMMC 2.0
- Mapped Countermeasures to CMMC v2, added new reports for Levels 1 and 2 CMMC v2 maturity, and created survey answers for CMMC v2.
CWE 4.10
- Updated SD Elements to account for deprecated Weakness listings and mapped SD Elements Weaknesses to CWE-1395.
TypeScript
- Added new How-to's for TypeScript.
Content additions and updates (as of March 28, 2023):
Compliance Regulations and Mappings
- Added CMMC V2 (Level 1)
- Added CMMC V2 (Level 2)
- Updated PCI-DSS-v4.0 [INFO: Updated the regulation sections].
T1: Use multi-factor authentication for remote access to high risk systems or administrative access to services
- TA6415: MFA requirements (PCI-DSS 4.0) [Added]
- TA6416: Implement a strong MFA system (PCI-DSS 4.0) [Added]
- T5: Use minimum standards for passwords
- TA6414: Password requirements (PCI-DSS 4.0) [Added]
- T6: Implement account lockout or authentication throttling
- TA6413: Account lockout or authentication throttling requirements (PCI-DSS 4.0) [Added]
- T9: Implement authorization and screening for highly sensitive transactions
- TA6403: Restrict user access to query repositories storing CHD (PCI-DSS 4.0) [Added]
- T14: Enforce the principle of least privilege [Updated]
- INFO: Updated the text.
- TA6401: Review user accounts and related access privileges periodically (PCI-DSS 4.0) [Added]
- TA6402: Review application and system and related access privileges periodically (PCI-DSS 4.0) [Added]
- T21: Ensure all data in transit is encrypted using a secure TLS channel
- TA6375: Safeguard PAN with strong cryptography during transmission (PCI-DSS 4.0) [Added]
- T24: Enforce idle session timeout
- TA6412: Timeout requirement (PCI-DSS 4.0) [Added]
- T31: Validate all forms of input
- I1867: Validate user input in TypeScript [Added]
- T45: Log potential critical security events
- TA6408: Identify and address failures in critical security control systems promptly (PCI-DSS 4.0) [Added]
- T53: Prevent the upload of malicious files and implement anti-malware solutions [Updated]
- INFO: Updated the title and text.
- TA6426: Evaluate system components not at risk from malware periodically (PCI-DSS 4.0) [Added]
- TA6427: Implement anti-malware solutions (PCI-DSS 4.0) [Added]
- P325: Unrestricted Upload of Unsafe File Types [Updated]
- INFO: Updated the text.
- T59: Use standard libraries for cryptography
- I1873: Encrypt sensitive data in TypeScript [Added]
- T60: Use correct and approved cryptographic algorithms, parameters, and key lengths
- TA6430: Securely store and manage cryptographic keys to encrypt account data (PCI-DSS 4.0) [Added]
- T66: Prevent web pages from being loaded inside iFrame
- I1869: Prevent clickjacking in TypeScript [Added]
- T68: Encrypt Primary Account Number (PAN) in storage [Updated]
- INFO: Updated the title and text.
- TA6429: Manage the use of disk-level PAN encryption (PCI-DSS 4.0) [Added]
- P686: Plaintext Primary Account Number (PAN) [Updated]
- INFO: Updated the title.
- T74: Avoid HTTP parameter pollution
- I1872: Prevent HTTP parameter pollution in TypeScript [Added]
- T133: Mask Primary Account Number (PAN) when displayed [Updated]
- INFO: Updated the title and text.
- P686: Plaintext Primary Account Number (PAN) [Updated]
- INFO: Updated the title.
- T151: Use cryptographically secure random numbers [Updated]
- INFO: Updated the text.
- TA6393: ASVS Requirements - GUID v4 algorithm [Added]
- T186: Use recommended settings and the latest patches for third party libraries and software
- I1862: Perform Software Composition Analysis in TypeScript [Added]
- P728: Insufficient patching or use of insecure third party software/libraries [Updated]
- INFO: Updated the cwe set.
- T191: Follow best practices when handling primitive data types
- I1863: Use correct data types in TypeScript [Added]
- I1865: Use primitive types in TypeScript [Added]
- T197: Validate the signature of all remote code/updates to verify their origin and integrity (client side) [Updated]
- INFO: Updated the title, text, priority, and cwe set.
- TA5247: ISASecure CSA 311 requirements: Levels (1, 2, 3, 4), Components (Software Application) [Updated]
- INFO: Updated the text.
- TA5249: ISASecure CSA 311 requirements: Levels (2, 3, 4), Components (Software Application) [Updated]
- INFO: Updated the text.
- TA5251: ISASecure CSA 311 requirements: Levels (1, 2, 3, 4), Components (Embedded Device) [Updated]
- INFO: Updated the text.
- TA5253: ISASecure CSA 311 requirements: Levels (2, 3, 4), Components (Embedded Device) [Updated]
- INFO: Updated the text.
- TA5255: ISASecure CSA 311 requirements: Levels (1, 2, 3, 4), Components (Host Device) [Updated]
- INFO: Updated the text.
- TA5257: ISASecure CSA 311 requirements: Levels (2, 3, 4), Components (Host Device) [Updated]
- INFO: Updated the text.
- TA5259: ISASecure CSA 311 requirements: Levels (1, 2, 3, 4), Components (Network Device) [Updated]
- INFO: Updated the text.
- TA5261: ISASecure CSA 311 requirements: Levels (2, 3, 4), Components (Network Device) [Updated]
- INFO: Updated the text.
- TA5463: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- I546: Signing data and verifying digital signatures [Updated]
- INFO: Updated the text.
- T244: Securely delete any unprotected sensitive data before a resource is released or shared
- TA6391: Securely delete any resource containing cardholder data (PCI-DSS 4.0) [Added]
- T322: Include HTTP Strict-Transport-Security headers in HTTPS responses
- I1871: Set HTTP Strict Transport Security (HSTS) in TypeScript [Added]
- T325: Use JavaScript Strict Mode
- I1864: Use strict mode in TypeScript [Added]
- T331: Enforce policies through content security policy (CSP) or XSS protection headers
- I1868: Set Content Security Policy in TypeScript [Added]
- T340: Use an account and identity management system [Updated]
- INFO: Updated the text.
- TA6410: Authorize each Lifecycle event for user IDs and authentication factors (PCI-DSS 4.0) [Added]
- TA6411: Disable inactive credentials (PCI-DSS 4.0) [Added]
- TA6417: Requirements for system or application accounts that can be used for interactive login (PCI-DSS 4.0) [Added]
- T344: Enforce different rules for access to the system based on the origin, type, and medium of request [Updated]
- INFO: Updated the title and text.
- T345: Check the integrity of critical configuration and data files
- TA6423: File integrity monitoring requirement (PCI-DSS 4.0) [Added]
- T349: Protect audit information and logs against unauthorized access
- TA6404: Keep and protect the integrity of audit logs (PCI-DSS 4.0) [Added]
- T353: Control the inbound and outbound data flow across the boundaries of zones [Updated]
- INFO: Updated the text.
- TA6369: Install NSCs between all wireless networks and the CDE (PCI-DSS 4.0) [Added]
- TA6370: Prevent direct access to cardholder data (PCI-DSS 4.0) [Added]
- T370: Follow best practices for using third-party software libraries/modules and open source/COTS components
- P755: Lack of control over third-party hardware or software components [Updated]
- INFO: Updated the cwe set.
- P755: Lack of control over third-party hardware or software components [Updated]
- T379: Provide sufficient documentation for security-related features [Updated]
- INFO: Updated the text.
- TA6373: Provide business justification for unsecured services (PCI-DSS 4.0) [Added]
- TA6379: Manage Cryptographic Cipher Suite (PCI-DSS 4.0) [Added]
- T435: Prevent web browsers from MIME sniffing
- I1870: Prevent MIME type sniffing in TypeScript [Added]
- T439: Verify that the origin and integrity of remote code and updates are checked (client side) [Updated]
- INFO: Updated the title, priority, and cwe set.
- T456: Change default security settings to the most stringent ones and disable unnecessary services and modules
- TA6372: Manage primary functions requiring different security levels (PCI-DSS 4.0) [Added]
- TA6374: Reduce the risk of using unsecured services (PCI-DSS 4.0) [Added]
- T542: Protect hardware modules against tampering and probing
- TA6390: Protect media with cardholder data (PCI-DSS 4.0) [Added]
- TA6392: Protect POI devices from tampering and unauthorized substitution (PCI-DSS 4.0) [Added]
- T849: Yield more often inside all goroutines [Deactivated]
- P938: Non-preemptive Goroutines [Deactivated]
- T850: Verify that all goroutines yield execution [Deactivated]
- P938: Non-preemptive Goroutines [Deactivated]
- T896: Design a secure architecture for AWS deployment (AWS)
- P942: Lack of Security Architecture [Updated]
- INFO: Updated the match conditions.
- P942: Lack of Security Architecture [Updated]
- T1067: Regenerate storage account access keys periodically (Microsoft Azure) [Updated]
- INFO: Updated the text.
- T1164: Secure swarm mode (Docker) [Updated]
- INFO: Updated the text.
- T1334: Ensure legacy authorization is set to disabled on Kubernetes Engine Clusters (Google Cloud) [Updated]
- INFO: Updated the text.
- T1378: Release a change summary for each software update
- TA6400: Securely manage changes to software (PCI-DSS 4.0) [Added]
- T1380: Enforce secure user registration and access control
- TA6409: Give each user a unique account (PCI-DSS 4.0) [Added]
- T1381: Establish secure processes for key management [Updated]
- INFO: Updated the text.
- TA6431: Define and implement key management processes (PCI-DSS 4.0) [Added]
- T1384: Back up and restore securely
- TA6397: Get approval for media with cardholder data leaving the facility (PCI-DSS 4.0) [Added]
- T1385: Institute secure logging and event monitoring
- TA6405: Review audit logs on a daily basis (PCI-DSS 4.0) [Added]
- TA6406: Retention policy of audit log history (PCI-DSS 4.0) [Added]
- TA6407: Configure systems to the correct and consistent time (PCI-DSS 4.0) [Added]
- T1386: Regulate the use of electronic messaging [Updated]
- INFO: Updated the phase.
- T1387: Ensure the security of products acquired through the supply chain and contractors
- P1170: Lack of a secure process for outsourcing [Updated]
- INFO: Updated the cwe set.
- P1170: Lack of a secure process for outsourcing [Updated]
- T1388: Triage and fix vulnerabilities discovered during automated and manual security tests
- TA6418: Internal vulnerability scans (PCI-DSS 4.0) [Added]
- T1389: Perform penetration testing
- TA6419: Formal penetration testing methodology requirements (PCI-DSS 4.0) [Added]
- TA6420: Penetration testing requirements (PCI-DSS 4.0) [Added]
- TA6421: Repeat Penetration testing when required (PCI-DSS 4.0) [Added]
- TA6422: Penetration testing on CDE segmentation controls (PCI-DSS 4.0) [Added]
- T1669: Revoke powerful roles where they are not likely needed (Oracle Database) [Updated]
- INFO: Updated the text.
- T1890: Implement OAuth 2.0 securely on the resource server [Updated]
- INFO: Updated the text.
- T1892: Perform a Threat and Risk Assessment (TRA)
- TA6377: Provide and maintain up-to-date knowledge and assessment of risks to the CDE (PCI-DSS 4.0) [Added]
- TA6378: Perform risk analysis for PCI DSS requirements satisfied with a custom approach (PCI-DSS 4.0) [Added]
- T1895: Protect applications with Intrusion Detection / Protection System (IDS/IPS)
- TA6399: Protect all public payment pages (PCI-DSS 4.0) [Added]
- TA6424: Prevent intrusions into the CDE network (PCI-DSS 4.0) [Added]
- T1917: Perform container security assessment [Updated]
- INFO: Updated the phase.
- T1918: Integrate with SSO [Updated]
- INFO: Updated the phase.
- T1921: Track and manage usage of third-party and commercial off the shelf (COTS) hardware or software
- P1433: Lack of third-party software code or dependencies management [Updated]
- INFO: Updated the cwe set.
- P1433: Lack of third-party software code or dependencies management [Updated]
- T1971: Adjust the terminated-pod-gc-threshold argument as needed (OpenShift) [Updated]
- INFO: Updated the text.
- T2065: Configure TLS for secure connections to App Service (Microsoft Azure) [Updated]
- INFO: Updated the text.
- T2128: Develop a process to notify users and regulators of breaches of personal information [Updated]
- INFO: Updated the phase.
- T2170: Ensure that personal information processed by the application meets data localization requirements [Updated]
- INFO: Updated the phase.
- T2281: Secure access control (GraphQL) [Updated]
- INFO: Updated the text.
- T2284: Prevent DoS attacks (GraphQL) [Updated]
- INFO: Updated the text.
- T2343: Define security-related roles and provide role-base training
- TA6383: Conduct a formal security awareness program (PCI-DSS 4.0) [Added]
- TA6398: Provide security training for all personas involved in software development (PCI-DSS 4.0) [Added]
- T2348: Perform code reviews [Updated]
- INFO: Updated the text.
- I1866: Perform code reviews in TypeScript [Added]
- T2350: Create a Product Security Incident Response Team (PSIRT) [Updated]
- INFO: Updated the match conditions.
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the match conditions.
- T2358: Verify that the organization has a Product Security Incident Response Team (PSIRT) [Updated]
- INFO: Updated the match conditions.
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the match conditions.
- T2391: Change the default value of the SSID and other wireless defaults [Updated]
- INFO: Updated the title and text.
- T2392: Create an Incident Response Plan [Updated]
- INFO: Updated the text.
- TA6388: Review and test Incident Response Plans (PCI-DSS 4.0) [Added]
- TA6389: Quickly respond to cleartext PAN detection events (PCI-DSS 4.0) [Added]
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the match conditions.
- T2397: Detect rogue stations in a wireless network
- TA6425: Identify and address unauthorized wireless access (WiFi) points (PCI-DSS 4.0) [Added]
- T2404: Enforce a minimum TLS version for API connections (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2405: Verify a minimum TLS version for API connections is used (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2406: Encrypt the API cache (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2407: Verify the API cache is encrypted (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2408: Ensure API Gateway actions are logged (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2409: Verify API Gateway actions are logged (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2410: Restrict outside access to internal APIs (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2411: Verify outside access to internal APIs is restricted (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2412: Protect APIs with a Web Application Firewall (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2413: Verify APIs are protected with a Web Application Firewall (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2414: Don't use API keys for authentication and authorization (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2415: Verify API keys are not the only mechanism for authentication and authorization (Amazon API Gateway) [Updated]
- INFO: Updated the match conditions.
- T2416: Encrypt Kinesis Firehose delivery streams (Amazon Kinesis Data Firehose) [Updated]
- INFO: Updated the match conditions.
- T2417: Verify Kinesis Firehose delivery streams are encrypted (Amazon Kinesis Data Firehose) [Updated]
- INFO: Updated the match conditions.
- T2422: Check the S3 backup for Kinesis Firehose delivery failures (Amazon Kinesis Data Firehose) [Updated]
- INFO: Updated the match conditions.
- T2423: Verify the S3 backup for Kinesis Firehose delivery failures are checked regularly (Amazon Kinesis Data Firehose) [Updated]
- INFO: Updated the match conditions.
- T2425: Encrypt Kinesis streams on the server (Amazon Kinesis Data Streams) [Updated]
- INFO: Updated the match conditions.
- T2427: Verify Kinesis streams are encrypted on the server (Amazon Kinesis Data Streams) [Updated]
- INFO: Updated the match conditions.
- T2428: Implement least privilege access to Kinesis streams (Amazon Kinesis Data Streams) [Updated]
- INFO: Updated the match conditions.
- T2432: Ensure Kinesis events are logged (Amazon Kinesis Data Streams) [Updated]
- INFO: Updated the match conditions.
- T2433: Verify Kinesis events are logged (Amazon Kinesis Data Streams) [Updated]
- INFO: Updated the match conditions.
- T2434: Enable Web Application Firewall (AWS Web Application Firewall) [Updated]
- INFO: Updated the match conditions.
- T2435: Verify the Web Application Firewall is enabled (AWS Web Application Firewall) [Updated]
- INFO: Updated the match conditions.
- T2438: Ensure Web Application Firewall ACLs are logged (AWS Web Application Firewall) [Updated]
- INFO: Updated the match conditions.
- T2440: Verify Web Application Firewall ACLs are logged (AWS Web Application Firewall) [Updated]
- INFO: Updated the match conditions.
- T2468: Manage PCI-DSS compliance
- TA6371: Ensure devices that connect to untrusted environments cannot introduce threats to the CDE (PCI-DSS 4.0) [Added]
- TA6376: Establish PCI DSS required policies (PCI-DSS 4.0) [Added]
- TA6380: Review hardware and software technologies in use (PCI-DSS 4.0) [Added]
- TA6381: Formal responsibility for the security of cardholder data (PCI-DSS 4.0) [Added]
- TA6382: Review operational effectiveness of critical PCI DSS controls (PCI-DSS 4.0) [Added]
- TA6384: Reduce risks from insider threats by screening personnel (PCI-DSS 4.0) [Added]
- TA6385: Record third-party service providers (PCI-DSS 4.0) [Added]
- TA6386: Manage Third-Party Service Providers (PCI-DSS 4.0) [Added]
- TA6387: Ensure TPSPs support the PCI DSS compliance of their customers (PCI-DSS 4.0) [Added]
- TA6394: Implement physical access controls (PCI-DSS 4.0) [Added]
- TA6395: Manage physical access for personnel (PCI-DSS 4.0) [Added]
- TA6396: Manage physical access for visitors (PCI-DSS 4.0) [Added]
- TA6428: Limit and control account data storage (PCI-DSS 4.0) [Added]
- TA6366: Identify and confirm the scope of the PCI DSS [Updated]
- INFO: Updated the text.
- P1713: Lack of processes for the approval of compliance with PCI-DSS [Updated]
- INFO: Updated the match conditions.
- T2469: Use CloudWatch to monitor Kinesis Firehose decryption failures (Amazon Kinesis Data Firehose) [Added]
- P1714: Decryption failure [Added]
- T2470: Verify CloudWatch is used to monitor Kinesis Firehose decryption failures (Amazon Kinesis Data Firehose) [Added]
- P1714: Decryption failure [Added]
- T2473: Verify the presence of security constraints in all user stories and features [Added]
- P1716: Lack of Technical Documentation [Added]
- T2474: Include security constraints in all user stories and features [Added]
- P1716: Lack of Technical Documentation [Added]
- T2477: Test the re-deployment routines [Added]
- P1719: Lack of automated re-deployment plan [Added]
- T2478: Manage re-deployment routines [Added]
- P1719: Lack of automated re-deployment plan [Added]
- T2479: Test the Content-Disposition header in API responses [Added]
- T2480: Include Content-Disposition headers in API responses [Added]
- T2481: Define and apply configuration standards for Network Security Controls [Added]
- P1717: Lack of configuration standards for Network Security Controls [Added]
- T2482: Verify implementing configuration standards [Added]
- P1717: Lack of configuration standards for Network Security Controls [Added]
- T2483: Follow a control change management process [Added]
- P1718: Lack of change management for network connections and configurations [Added]
- T2484: Verify a change management procedure is in place [Added]
- P1718: Lack of change management for network connections and configurations [Added]
- T2485: Verify that remote code and updates are correctly encrypted and signed (server side) [Added]
- TA938: Test that SRI is used [Updated]
- INFO: Updated the inclusion standard.
- TA938: Test that SRI is used [Updated]
- T2486: Encrypt and sign all remote code/updates (server side) [Added]
- TA179: DIACAP Notes [Updated]
- INFO: Updated the inclusion standard.
- TA251: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the inclusion standard.
- TA795: Ruby on Rails: Preventing unwanted Remote Code Execution by using long key [Updated]
- INFO: Updated the inclusion standard.
- TA882: ASD-STIG requirements [Updated]
- INFO: Updated the text and inclusion standard.
- TA5461: ISASecure SSA 311 requirements: Levels (1, 2, 3, 4) [Updated]
- INFO: Updated the text and inclusion standard.
- TA5587: PCI-SSF (S3) / Signing all terminal software files [Updated]
- INFO: Updated the inclusion standard.
- I914: Signing JAR files in Java [Updated]
- INFO: Updated the inclusion standard.
- TA179: DIACAP Notes [Updated]
- T2488: Detect and respond to unauthorized changes on payment pages (PCI-DSS 4.0) [Added]
- P1720: Insufficient control and response to unauthorized changes on payment pages [Added]
T2489: Test that change-detection and tamper-detection mechanisms are implemented for payment pages (PCI-DSS 4.0) [Added]
- P1720: Insufficient control and response to unauthorized changes on payment pages [Added]
Changes to Project Properties and Profiles
- Q195: Language and Framework
- Q109: Programming Language
- Q110: Technology/Framework
- A1281: Flutter [Updated]
- INFO: Updated the question.
- A1281: Flutter [Updated]
- Q110: Technology/Framework
- Q109: Programming Language
- Q201: Authorization
- Q117: Allows User Controlled Page Selection [Removed]
- Q202: More Features
- Q214: Miscellaneous
- A33: Uses multi-threaded programming [Updated]
- INFO: Updated the text and question.
- A90: Performs diagnostic/debug logging [Updated]
- INFO: Updated the text, description, and question.
- A33: Uses multi-threaded programming [Updated]
- Q214: Miscellaneous
- Q204: Financial Systems
- Q161: Payment Components
- A132: In-scope for PCI-DSS 3.2 [Updated]
- INFO: Updated the text and description.
- A1327: In-scope for PCI-SSS [Updated]
- INFO: Updated the children.
- A1357: In-scope for PCI-DSS 4.0 [Added]
- A132: In-scope for PCI-DSS 3.2 [Updated]
- Q161: Payment Components
- Q243: Internal Hidden Properties
- Q113: Version of Servlet Spec Supported [Removed]
- Q116: Uses Multi-Threaded Programming [Removed]
- Q143: Performs Diagnostic/Debug Logging [Removed]
- Q171: Uses Microsoft Enterprise Libraries [Removed]
- Q331: US Federal and NIST
- Q328: In-Scope for CMMC
- Q351: CMMC V2 Maturity Level [Added]
- A1354: Level 1 [Added]
- A1355: Level 2 [Added]
- Q329: CMMC V1 Maturity Level [Updated]
- INFO: Updated the text.
- A1275: CMMC V1 [Updated]
- INFO: Updated the text.
- A1356: CMMC V2 [Added]
- Q351: CMMC V2 Maturity Level [Added]
- Q328: In-Scope for CMMC
- Q195: Language and Framework
2022.4
January 7, 2023
New features and enhancements
Integrations
- Added Snyk Open Source (SCA) as a supported Verification Tool.
- Introduced an ability to upload and overwrite default Countermeasure mapping files under all Verification Tools.
- Currently, you cannot upload a file with special characters. See the User Guide for instructions on what is supported until a fix is released.
Advanced Reports
- Reporting Contexts
- Users can choose the context that forms the basis of their report request to create more robust advanced reports.
- Join paths from Countermeasures to threats and Countermeasures to components have been added in the Countermeasure context. Users can now reliably report on the Countermeasures required to mitigate a threat.
- You will receive the error "Invalid Token" while executing an advanced report if it takes longer than 60 seconds to execute. Add additional filters to the report to reduce the number of returned results.
- Reporting Contexts
Components
- Connected Components
- Enables SD Elements project users to create a component from a project or release.
- Information from the project is preloaded in the component creation dialog.
- Components created from projects still need to be enabled by a content admin (approval workflow).
- Connected Components
Threat Model diagrams
- Added the ability to add notes to the diagram.
- Added the ability to nest zones.
- Added the ability to apply Risk Policies to filter Countermeasures on the Threats List page.
Other product improvements
Comment syncing via SD Elements to Jira was expanded to support all authoritative sources.
- This feature was originally only available to users using SD Elements as an authoritative source.
Added support for network isolation security features in containerized setups of SD Elements.
- This feature enables SD Elements administrators to filter out unauthorized network traffic between Kubernetes pods.
Content improvements summary
PCI DSS
- Added new Countermeasures and a Regulation based on PCI DSS v4.0.
Azure AKS
- Added new Countermeasures, Amendments, and How-tos based on CIS Azure Kubernetes Service (AKS) Benchmark version 1.2.0.
Android
- Added and/or updated Countermeasures, Weaknesses, and How-tos, and Amendments based on Android versions 11, 12 and 13.
TypeScript
- Added new How-tos for TypeScript.
AWS Services
- Added content for AWS API Gateway, AWS Cognito, AWS Kinesis Data Firehose, Amazon Kinesis Data Streams, and AWS WAF.
.Net 6 Update
- Added new How-tos for .Net 6.
Golang
- Added new How-tos for Golang.
CWE Top 25
- Added the latest CWE Top 25 (2022) mapping to SD Elements content.
Content additions and updates (as of December 6, 2022):
Compliance Regulations and Mappings
- Added 2022 CWE Top 25 Most Dangerous Software Weaknesses
- Added CIS Azure Kubernetes Service (AKS) 1.2.0
- Added PCI-DSS-v4.0
Content Packs
- Added TypeScript
- Added AKS
Updated the following code scanner mappings
- Fortify
New Just-in-Time Training
- Secure Software Requirements (18)
- Defending Django (23)
- CCPA for Developers (5)
- Defending Ansible (20)
- Defending .NET6 (15)
- PCI SSLC (10)
T1: Use multi-factor authentication for remote access to high risk systems or administrative access to services
- I1858: Configure 2FA in ASP.NET [Added]
- T5: Use minimum standards for passwords [Updated]
- INFO: Updated the text.
- TA6364: Prevent the use of pwned passwords [Added]
- T21: Ensure all data in transit is encrypted using a secure TLS channel
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- INFO: Updated the match conditions.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T36: Escape untrusted data in HTML, HTML attributes, CSS, and JavaScript
- I1852: Avoid XSS in TypeScript [Added]
- T43: Avoid unsafe operating system interaction
- I1853: Avoid Command Injection in TypeScript [Added]
- T59: Use standard libraries for cryptography
- I1860: Go: Triple DES Encryption [Added]
- T62: Protect passwords in property and configuration files
- TA6368: Protecting secrets in Test/Development environments. [Added]
- I771: ASP.NET Core / C#: Secret Manager for Development Environments [Updated]
- INFO: Updated the text and match conditions.
- P158: Password in configuration files [Updated]
- INFO: Updated the title.
- T73: Use random delays in authentication failures
- I1856: Protect against timing attacks in TypeScript [Added]
- T76: Do not hardcode passwords [Updated]
- INFO: Updated the title.
- T161: Treat unique device IDs as personal information [Updated]
- INFO: Updated the text.
- TA280: Unique device IDs in Android [Updated]
- INFO: Updated the text.
- P257: Privacy Violation [Updated]
- INFO: Updated the text.
- T162: Validate pathname before retrieving local resources
- I1855: Protect against path traversal in TypeScript [Added]
- T194: Obtain user consent for tracking cookies
- P732: Insufficient consent for user tracking [Updated]
- INFO: Updated the match conditions.
- P732: Insufficient consent for user tracking [Updated]
- T204: Follow security best practices when dealing with pointers
- TA6367: Avoid granting direct access to the memory [Added]
- T261: Manage iOS Pasteboards that are used with sensitive data
- P213: Plaintext Storage in Memory [Updated]
- INFO: Updated the match conditions.
- P213: Plaintext Storage in Memory [Updated]
- T270: Follow best practices for storing application data on Android devices [Updated]
- INFO: Updated the text.
- I1805: EncryptedSharedPreferences [Added]
- I402: Android storage options and considerations [Updated]
- INFO: Updated the text.
- T272: Restrict access to the application's exported components (Android) [Updated]
- INFO: Updated the text.
- T331: Enforce policies through content security policy (CSP) or XSS protection headers [Updated]
- INFO: Updated the text.
- TA6365: X-XSS-Protection for old browser versions [Added]
- T340: Use an account and identity management system
- I1857: Use extensibility points in the ASP.NET identity system [Added]
- T423: Disable copying on Android text fields with sensitive data [Updated]
- INFO: Updated the text.
- I1806: Mask sensitive information in the Android clipboard [Added]
- T440: Follow best practices when managing Android permissions
- I1807: Granular data access permissions [Added]
- TA6256: Location permissions [Added]
- T442: Test that Android permissions are properly managed
- TA6257: Test location permissions [Added]
- T528: Enable MAC layer security mechanisms supported in the IEEE 802.15.4 when supported by the vendor
- P799: No MAC layer security in shared networks [Updated]
- INFO: Updated the match conditions.
- P799: No MAC layer security in shared networks [Updated]
- T564: Follow best practices for sharing data between Android applications [Updated]
- INFO: Updated the text.
- T615: Check your mobile application's integrity and installation source [Updated]
- INFO: Updated the text.
- I568: Android: Integrity and installation source [Updated]
- INFO: Updated the text.
- T643: Implement certificate pinning in a hostile environment
- I1861: GoLang: Certificate pinning [Added]
- T975: Use a sandboxing alternative to Security Manager (Apache Tomcat) [Updated]
- INFO: Updated the text.
- I819: Apache Tomcat: Starting Tomcat with Security Manager [Updated]
- INFO: Updated the text.
- P983: Lack of a sandboxing mechanism or relying on the deprecated Security Manager (Apache Tomcat) [Updated]
- INFO: Updated the text.
- T1004: Verify that a sandboxing alternative to Security Manager is used (Apache Tomcat) [Updated]
- INFO: Updated the text.
- P983: Lack of a sandboxing mechanism or relying on the deprecated Security Manager (Apache Tomcat) [Updated]
- INFO: Updated the text.
- T1300: Enable multi-factor authentication for all non-service accounts (Google Cloud)
- P1139: Weak Authentication [Updated]
- INFO: Updated the title, text, and match conditions.
- P1139: Weak Authentication [Updated]
- T1366: Identify applicable compliance regulations
- P1171: Lack of a process for identifying applicable compliance regulation [Updated]
- INFO: Updated the match conditions.
- P1171: Lack of a process for identifying applicable compliance regulation [Updated]
- T1367: Identify and classify critical assets
- P1172: Lack of a process for identifying critical assets [Updated]
- INFO: Updated the match conditions.
- P1172: Lack of a process for identifying critical assets [Updated]
- T1368: Perform security testing using SAST tools
- I1851: Analyze TypeScript code using a SAST tool [Added]
- P1186: Lack of a process for static application security testing (SAST) [Updated]
- INFO: Updated the match conditions.
- T1369: Perform security testing using DAST tools
- P1173: Lack of a process for dynamic application testing [Updated]
- INFO: Updated the match conditions.
- P1173: Lack of a process for dynamic application testing [Updated]
- T1370: Identify and track common software weaknesses and threats
- P1187: Lack of a process for identifying and assessing software threats [Updated]
- INFO: Updated the match conditions.
- P1187: Lack of a process for identifying and assessing software threats [Updated]
- T1371: Use a software security management solution to select and track security controls
- P1188: Lack of software security management solution to track security controls [Updated]
- INFO: Updated the match conditions.
- P1188: Lack of software security management solution to track security controls [Updated]
- T1372: Follow software change management process
- P1174: Lack of software change management process [Updated]
- INFO: Updated the match conditions.
- P1174: Lack of software change management process [Updated]
- T1373: Maintain the integrity of all software code
- P1175: Insufficient software code control [Updated]
- INFO: Updated the match conditions.
- P1175: Insufficient software code control [Updated]
- T1374: Ensure the integrity of software release and update delivery
- P1178: Lack of a process for ensuring the integrity of software release and update [Updated]
- INFO: Updated the match conditions.
- P1178: Lack of a process for ensuring the integrity of software release and update [Updated]
- T1375: Properly collect and protect sensitive data
- P1180: Lack of process for collecting and protecting sensitive data [Updated]
- INFO: Updated the match conditions.
- P1180: Lack of process for collecting and protecting sensitive data [Updated]
- T1376: Provide and maintain guidance on secure installation, maintenance, and configuration of all software components
- P1181: Lack of guidance on secure installation, maintenance and configuration of all software components [Updated]
- INFO: Updated the match conditions.
- P1181: Lack of guidance on secure installation, maintenance and configuration of all software components [Updated]
- T1377: Establish and maintain a bi-directional communication channel for receiving security reports and sending security notifications
- P1182: Lack of a communication channel for reporting security issues [Updated]
- INFO: Updated the match conditions.
- P1182: Lack of a communication channel for reporting security issues [Updated]
- T1378: Release a change summary for each software update
- P1177: Lack of a process for creating summary of changes upon each software update [Updated]
- INFO: Updated the match conditions.
- P1177: Lack of a process for creating summary of changes upon each software update [Updated]
- T1380: Enforce secure user registration and access control
- P1185: Lack of process for user registration and enforcement of access control [Updated]
- INFO: Updated the match conditions.
- P1185: Lack of process for user registration and enforcement of access control [Updated]
- T1381: Establish secure processes for key management
- P1434: Lack of secure key management process [Updated]
- INFO: Updated the match conditions.
- P1434: Lack of secure key management process [Updated]
- T1382: Manage performance and capacity
- P1190: Lack of process for performance and capacity management [Updated]
- INFO: Updated the match conditions.
- P1190: Lack of process for performance and capacity management [Updated]
- T1383: Separate development, test, and operational environments
- P1191: Deploying software in production on the same environment as development and testing [Updated]
- INFO: Updated the match conditions.
- P1191: Deploying software in production on the same environment as development and testing [Updated]
- T1384: Back up and restore securely
- P1179: A secure backup and restore processes are missing or lacking [Updated]
- INFO: Updated the match conditions.
- P1179: A secure backup and restore processes are missing or lacking [Updated]
- T1385: Institute secure logging and event monitoring
- P1183: No secure processes for logging and monitoring events [Updated]
- INFO: Updated the match conditions.
- P1183: No secure processes for logging and monitoring events [Updated]
- T1387: Ensure the security of products acquired through the supply chain and contractors
- P1170: Lack of a secure process for outsourcing [Updated]
- INFO: Updated the match conditions.
- P1170: Lack of a secure process for outsourcing [Updated]
- T1388: Triage and fix vulnerabilities discovered during automated and manual security tests
- P1225: Unmanaged test result findings [Updated]
- INFO: Updated the match conditions.
- P1225: Unmanaged test result findings [Updated]
- T1389: Perform penetration testing
- P1184: Lack of a secure process for penetration testing [Updated]
- INFO: Updated the match conditions.
- P1184: Lack of a secure process for penetration testing [Updated]
- T1541: Decide on the best CSRF defense for your application
- I1854: Protect against CSRF in TypeScript [Added]
- T1891: Perform Privacy Impact Assessment (PIA)
- P1435: Lack of Privacy Impact Assessment (PIA) [Updated]
- INFO: Updated the match conditions.
- P1435: Lack of Privacy Impact Assessment (PIA) [Updated]
- T1893: Perform a cloud solution security posture assessment
- P1436: Lack of cloud solution security posture assessment [Updated]
- INFO: Updated the match conditions.
- P1436: Lack of cloud solution security posture assessment [Updated]
- T1894: Perform a vendor security assessment
- P1437: Lack of vendor security assessment [Updated]
- INFO: Updated the match conditions.
- P1437: Lack of vendor security assessment [Updated]
- T1895: Protect applications with Intrusion Detection / Protection System (IDS/IPS)
- P1429: Applications not protected with Intrusion Detection / Protection System (IDS/IPS) [Updated]
- INFO: Updated the match conditions.
- P1429: Applications not protected with Intrusion Detection / Protection System (IDS/IPS) [Updated]
- T1915: Perform network vulnerability assessment
- P1438: Lack of network vulnerability assessment [Updated]
- INFO: Updated the match conditions.
- P1438: Lack of network vulnerability assessment [Updated]
- T1920: Conduct security architecture and design reviews before starting code development
- P1432: Lack of security architecture and design activities [Updated]
- INFO: Updated the match conditions.
- P1432: Lack of security architecture and design activities [Updated]
- T1921: Track and manage usage of third-party and commercial off the shelf (COTS) hardware or software
- P1433: Lack of third-party software code or dependencies management [Updated]
- INFO: Updated the match conditions.
- P1433: Lack of third-party software code or dependencies management [Updated]
- T2052: Verify that network access rules are configured properly for storage accounts (Microsoft Azure) [Updated]
- INFO: Updated the text.
- T2118: Exercise security monitoring best practices in Microservices environments [Updated]
- INFO: Updated the inclusion weakness.
- P1712: Lack of security monitoring in Microservices environments [Added]
- T2119: Deploy circuit breakers in Microservices environments [Updated]
- INFO: Updated the inclusion weakness.
- P1711: Lack of strategies to limit resource consumption in Microservices environments [Added]
- T2120: Exercise security best practices for load balancing in Microservices environments [Updated]
- INFO: Updated the inclusion weakness.
- P1711: Lack of strategies to limit resource consumption in Microservices environments [Added]
- T2121: Exercise security best practices for service rate limiting in Microservices environments [Updated]
- INFO: Updated the inclusion weakness.
- P1711: Lack of strategies to limit resource consumption in Microservices environments [Added]
- T2210: Prevent signals conflict between a hardware IP and the parent system (Hardware/Firmware) [Updated]
- INFO: Updated the phase.
- T2214: Protect unexpected behavior of system due to sequence of processor instructions (Halt and Catch Fire) (Hardware/Firmware) [Updated]
- INFO: Updated the phase.
- T2221: Prevent debugging messages revealing sensitive Information (Hardware/Firmware) [Updated]
- INFO: Updated the phase.
- T2294: Enable logs and configuration monitoring in your cloud environment (Cloud) (1/4)
- P1667: Lack of monitoring (Cloud) [Updated]
- INFO: Updated the match conditions.
- P1667: Lack of monitoring (Cloud) [Updated]
- T2296: Securely install and configure all software components
- P1669: Lack of a process for securely installing and configuring all software components [Updated]
- INFO: Updated the match conditions.
- P1669: Lack of a process for securely installing and configuring all software components [Updated]
- T2309: Securely configure worker nodes (Containerization) [Deactivated]
- T2310: Implement proper authentication and authorization (Containerization) (1/2) [Deactivated]
- T2311: Ensure proper network settings and configuration (Containerization)
- I1840: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.4.2) [Added]
- I1849: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 5.4.2) [Added]
- I1850: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.4.3) [Added]
- TA6320: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.4.2) [Added]
- TA6348: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 5.4.2) [Added]
- TA6350: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.4.3) [Added]
- TA6352: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.4.4) [Added]
- TA6354: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 5.4.5) [Added]
- P1673: Improper network settings and configuration (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2312: Ensure proper logging and security monitoring (Containerization)
- I1809: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 2.1.1) [Added]
- TA6258: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 2.1.1) [Added]
- P1674: Inadequate logging and security monitoring (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2313: Keep data and secrets safe (Containerization)
- I1826: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.2) [Added]
- I1841: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.5.1) [Added]
- I1842: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.5.2) [Added]
- TA6292: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.2) [Added]
- TA6322: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.5.1) [Added]
- TA6324: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.5.2) [Added]
- TA6344: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.3.1) [Added]
- P1675: Lack of data and secrets protection (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2314: Enforce secure policies (Containerization)
- I1839: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.4.1) [Added]
- I1843: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.7.1) [Added]
- I1844: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.7.2) [Added]
- TA6318: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.4.1) [Added]
- TA6326: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.6.1) [Added]
- TA6328: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.7.1) [Added]
- TA6330: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.7.2) [Added]
- TA6362: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 5.6.2) [Added]
- P1676: Lack of secure policies (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2315: Use managed services (Containerization) [Deactivated]
- T2317: Verify worker nodes are configured securely (Containerization) [Deactivated]
- T2318: Verify proper authentication and authorization are implemented (Containerization) [Deactivated]
- T2319: Verify proper network settings and configuration (Containerization)
- TA6321: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.4.2) [Added]
- P1673: Improper network settings and configuration (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2321: Verify data and secrets are kept safe (Containerization)
- TA6293: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.2) [Added]
- TA6323: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.5.1) [Added]
- TA6325: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.5.2) [Added]
- P1675: Lack of data and secrets protection (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2322: Verify secure policies are enforced (Containerization)
- TA6319: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.4.1) [Added]
- TA6327: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.6.1) [Added]
- TA6329: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.7.1) [Added]
- TA6331: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.7.2) [Added]
- P1676: Lack of secure policies (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2323: Verify managed services are used (Containerization) [Deactivated]
- T2332: Adhere to an appropriate Global Privacy Control (GPC) header [Updated]
- INFO: Updated the match conditions.
- P732: Insufficient consent for user tracking [Updated]
- INFO: Updated the match conditions.
- T2377: Implement proper authentication and authorization (Containerization) (2/2) [Deactivated]
- T2378: Ensure compatibility with the United Nations automotive cybersecurity regulation WP.29
- P1688: Lack of processes for the approval of vehicles with regards to cyber security and cyber security management system [Updated]
- INFO: Updated the text.
- P1688: Lack of processes for the approval of vehicles with regards to cyber security and cyber security management system [Updated]
- T2380: Review and verify playbooks (Ansible) [Updated]
- INFO: Updated the text.
- T2399: Perform a data access audit for sensitive data (Android) [Added]
- P1703: Lack of sensitive data access audits [Added]
- I1808: Performing data audit access inside an activity [Added]
- T2400: Verify data access audits (Android) [Added]
- P1703: Lack of sensitive data access audits [Added]
- T2404: Enforce a minimum TLS version for API connections (Amazon API Gateway) [Added]
- P1694: Using deprecated encryption protocols [Added]
- T2405: Verify a minimum TLS version for API connections is used (Amazon API Gateway) [Added]
- P1694: Using deprecated encryption protocols [Added]
- T2406: Encrypt the API cache (Amazon API Gateway) [Added]
- P1695: Lack of encryption for server-side cached data [Added]
- T2407: Verify the API cache is encrypted (Amazon API Gateway) [Added]
- P1695: Lack of encryption for server-side cached data [Added]
- T2408: Ensure API Gateway actions are logged (Amazon API Gateway) [Added]
- P1667: Lack of monitoring (Cloud) [Updated]
- INFO: Updated the match conditions.
- P1667: Lack of monitoring (Cloud) [Updated]
- T2409: Verify API Gateway actions are logged (Amazon API Gateway) [Added]
- P1667: Lack of monitoring (Cloud) [Updated]
- INFO: Updated the match conditions.
- P1667: Lack of monitoring (Cloud) [Updated]
- T2410: Restrict outside access to internal APIs (Amazon API Gateway) [Added]
- P1696: Exposed APIs with public endpoints [Added]
- T2411: Verify outside access to internal APIs is restricted (Amazon API Gateway) [Added]
- P1696: Exposed APIs with public endpoints [Added]
- T2412: Protect APIs with a Web Application Firewall (Amazon API Gateway) [Added]
- P1697: API endpoints without basic firewall protections [Added]
- T2413: Verify APIs are protected with a Web Application Firewall (Amazon API Gateway) [Added]
- P1697: API endpoints without basic firewall protections [Added]
- T2414: Don't use API keys for authentication and authorization (Amazon API Gateway) [Added]
- P1139: Weak Authentication [Updated]
- INFO: Updated the title, text, and match conditions.
- P1139: Weak Authentication [Updated]
- T2415: Verify API keys are not the only mechanism for authentication and authorization (Amazon API Gateway) [Added]
- P1139: Weak Authentication [Updated]
- INFO: Updated the title, text, and match conditions.
- P1139: Weak Authentication [Updated]
- T2416: Encrypt Kinesis Firehose delivery streams (Amazon Kinesis Data Firehose) [Added]
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- INFO: Updated the match conditions.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T2417: Verify Kinesis Firehose delivery streams are encrypted (Amazon Kinesis Data Firehose) [Added]
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- INFO: Updated the match conditions.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T2418: Ensure Cognito uses strong authentication requirements (Amazon Cognito) [Added]
- P1139: Weak Authentication [Updated]
- INFO: Updated the title, text, and match conditions.
- P1139: Weak Authentication [Updated]
- T2419: Verify Cognito uses strong authentication requirements (Amazon Cognito) [Added]
- P1139: Weak Authentication [Updated]
- INFO: Updated the title, text, and match conditions.
- P1139: Weak Authentication [Updated]
- T2420: Add advanced security to user pool (Amazon Cognito) [Added]
- T2421: Verify Cognito user pools are protected by adaptive security (AWS) [Added]
- T2422: Check the S3 backup for Kinesis Firehose delivery failures (Amazon Kinesis Data Firehose) [Added]
- P1699: Transfer failure that leads to orphaned data [Added]
- T2423: Verify the S3 backup for Kinesis Firehose delivery failures are checked regularly (Amazon Kinesis Data Firehose) [Added]
- P1699: Transfer failure that leads to orphaned data [Added]
- T2424: Defend Cognito user pools with a WAF (Amazon Cognito) [Added]
- P1698: Not using a WAF to protect web applications and services against common attacks [Added]
- T2425: Encrypt Kinesis streams on the server (Amazon Kinesis Data Streams) [Added]
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- INFO: Updated the match conditions.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T2426: Verify WAF is enabled for Cognito user pools (Amazon Cognito) [Added]
- P1698: Not using a WAF to protect web applications and services against common attacks [Added]
- T2427: Verify Kinesis streams are encrypted on the server (Amazon Kinesis Data Streams) [Added]
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- INFO: Updated the match conditions.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T2428: Implement least privilege access to Kinesis streams (Amazon Kinesis Data Streams) [Added]
- P1700: Unnecessary and excessive privileges [Added]
- T2429: Verify least privilege access to Kinesis streams is implemented (Amazon Kinesis Data Streams) [Added]
- P1700: Unnecessary and excessive privileges [Added]
- T2430: Use IAM policy to safeguard Cognito user records against accidents (Amazon Cognito) [Added]
- P1700: Unnecessary and excessive privileges [Added]
- T2431: Verify IAM policies to safeguard Cognito user records against accidents is used (Amazon Cognito) [Added]
- P1700: Unnecessary and excessive privileges [Added]
- T2432: Ensure Kinesis events are logged (Amazon Kinesis Data Streams) [Added]
- P1667: Lack of monitoring (Cloud) [Updated]
- INFO: Updated the match conditions.
- P1667: Lack of monitoring (Cloud) [Updated]
- T2433: Verify Kinesis events are logged (Amazon Kinesis Data Streams) [Added]
- P1667: Lack of monitoring (Cloud) [Updated]
- INFO: Updated the match conditions.
- P1667: Lack of monitoring (Cloud) [Updated]
- T2434: Enable Web Application Firewall (AWS Web Application Firewall) [Added]
- P1698: Not using a WAF to protect web applications and services against common attacks [Added]
- T2435: Verify the Web Application Firewall is enabled (AWS Web Application Firewall) [Added]
- P1698: Not using a WAF to protect web applications and services against common attacks [Added]
- T2436: Ensure Cognito events are logged (Amazon Cognito) [Added]
- P1667: Lack of monitoring (Cloud) [Updated]
- INFO: Updated the match conditions.
- P1667: Lack of monitoring (Cloud) [Updated]
- T2437: Verify Cognito events are logged (Amazon Cognito) [Added]
- P1667: Lack of monitoring (Cloud) [Updated]
- INFO: Updated the match conditions.
- P1667: Lack of monitoring (Cloud) [Updated]
- T2438: Ensure Web Application Firewall ACLs are logged (AWS Web Application Firewall) [Added]
- P1702: Lack of collecting log data for WAF rules [Added]
- T2439: Review Web Application Firewall logs for issues (AWS Web Application Firewall) [Added]
- P1701: Lack of monitoring WAF for false positives and suspicious activity [Added]
- T2440: Verify Web Application Firewall ACLs are logged (AWS Web Application Firewall) [Added]
- P1702: Lack of collecting log data for WAF rules [Added]
- T2441: Verify WAF logs are reviewed in a timely manner for issues (AWS Web Application Firewall) [Added]
- P1701: Lack of monitoring WAF for false positives and suspicious activity [Added]
- T2442: Ensure proper permissions for files on worker nodes (Containerization) [Added]
- P1704: Lack of proper access rights for configuration files (Containerization) [Added]
- I1810: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.1) [Added]
- I1811: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.2) [Added]
- I1812: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.3) [Added]
- I1813: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.4) [Added]
- TA6260: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.1) [Added]
- TA6262: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.2) [Added]
- TA6264: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.3) [Added]
- TA6266: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.4) [Added]
- TA5962: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.1) [Updated]
- INFO: Updated the inclusion standard.
- TA5964: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.2) [Updated]
- INFO: Updated the inclusion standard.
- TA5966: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.3) [Updated]
- INFO: Updated the inclusion standard.
- TA5968: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.4) [Updated]
- INFO: Updated the inclusion standard.
- I1654: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.1) [Updated]
- INFO: Updated the inclusion standard.
- I1655: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.2) [Updated]
- INFO: Updated the inclusion standard.
- I1656: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.3) [Updated]
- INFO: Updated the inclusion standard.
- I1657: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.4) [Updated]
- INFO: Updated the inclusion standard.
- T2443: Verify proper permissions for files on worker nodes (Containerization) [Added]
- P1704: Lack of proper access rights for configuration files (Containerization) [Added]
- TA6261: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.1) [Added]
- TA6263: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.2) [Added]
- TA6265: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.3) [Added]
- TA6267: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.1.4) [Added]
- TA5963: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.1) [Updated]
- INFO: Updated the inclusion standard.
- TA5965: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.2) [Updated]
- INFO: Updated the inclusion standard.
- TA5967: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.3) [Updated]
- INFO: Updated the inclusion standard.
- TA5969: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.4) [Updated]
- INFO: Updated the inclusion standard.
- T2444: Secure authentication to and from worker nodes (Containerization) [Added]
- P1705: Insecure authentication to and from worker nodes (Containerization) [Added]
- I1814: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.1) [Added]
- I1816: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.3) [Added]
- TA6268: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.1) [Added]
- TA6272: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.3) [Added]
- TA5970: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.1) [Updated]
- INFO: Updated the inclusion standard.
- TA5974: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.3) [Updated]
- INFO: Updated the inclusion standard.
- I1658: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.1) [Updated]
- INFO: Updated the inclusion standard.
- I1659: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.3) [Updated]
- INFO: Updated the inclusion standard.
- T2445: Verify secure authentication to and from worker nodes (Containerization) [Added]
- P1705: Insecure authentication to and from worker nodes (Containerization) [Added]
- TA6269: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.1) [Added]
- TA6273: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.3) [Added]
- TA5971: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.1) [Updated]
- INFO: Updated the inclusion standard.
- TA5975: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.3) [Updated]
- INFO: Updated the inclusion standard.
- T2446: Collect and protect sensitive information on worker nodes (Containerization) [Added]
- P1706: Poor collection and protection of sensitive information on worker nodes (Containerization) [Added]
- I1817: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.4) [Added]
- I1822: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 3.2.9) [Added]
- TA6274: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.4) [Added]
- TA6284: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 3.2.9) [Added]
- TA5976: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6033: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.9) [Updated]
- INFO: Updated the inclusion standard.
- I1660: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.4) [Updated]
- INFO: Updated the inclusion standard.
- I1666: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.9) [Updated]
- INFO: Updated the inclusion standard.
- T2447: Verify the collection and protection of sensitive information on worker nodes (Containerization) [Added]
- P1706: Poor collection and protection of sensitive information on worker nodes (Containerization) [Added]
- TA6275: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.4) [Added]
- TA6285: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 3.2.9) [Added]
- TA5977: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6034: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.9) [Updated]
- INFO: Updated the inclusion standard.
- T2448: Ensure the availability of worker nodes (Containerization) [Added]
- P1707: Unavailabilty of worker nodes (Containerization) [Added]
- I1818: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.5) [Added]
- I1823: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 3.2.10) [Added]
- I1824: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.11) [Added]
- TA6276: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.5) [Added]
- TA6286: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 3.2.10) [Added]
- TA6288: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.11) [Added]
- TA5978: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.5) [Updated]
- INFO: Updated the inclusion standard.
- TA5986: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.11) [Updated]
- INFO: Updated the inclusion standard.
- TA6035: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.10) [Updated]
- INFO: Updated the inclusion standard.
- I1661: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.5) [Updated]
- INFO: Updated the inclusion standard.
- I1665: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.11) [Updated]
- INFO: Updated the inclusion standard.
- I1667: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.10) [Updated]
- INFO: Updated the inclusion standard.
- T2449: Verify the availability of worker nodes (Containerization) [Added]
- P1707: Unavailabilty of worker nodes (Containerization) [Added]
- TA6277: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.5) [Added]
- TA6287: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 3.2.10) [Added]
- TA6289: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.11) [Added]
- TA5979: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.5) [Updated]
- INFO: Updated the inclusion standard.
- TA5987: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.11) [Updated]
- INFO: Updated the inclusion standard.
- TA6036: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.10) [Updated]
- INFO: Updated the inclusion standard.
- T2450: Protect worker nodes with proper flags and arguments (Containerization) [Added]
- P1708: Failure to protect worker nodes with proper flags and arguments (Containerization) [Added]
- I1819: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.6) [Added]
- I1820: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.7) [Added]
- I1821: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.8) [Added]
- TA6278: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.6) [Added]
- TA6280: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.7) [Added]
- TA6282: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.8) [Added]
- TA5980: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.6) [Updated]
- INFO: Updated the inclusion standard.
- TA5982: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.7) [Updated]
- INFO: Updated the inclusion standard.
- TA5984: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.8) [Updated]
- INFO: Updated the inclusion standard.
- I1662: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.6) [Updated]
- INFO: Updated the inclusion standard.
- I1663: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.7) [Updated]
- INFO: Updated the inclusion standard.
- I1664: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.8) [Updated]
- INFO: Updated the inclusion standard.
- T2451: Verify that worker nodes are protected with proper flags and arguments (Containerization) [Added]
- P1708: Failure to protect worker nodes with proper flags and arguments (Containerization) [Added]
- TA6279: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.6) [Added]
- TA6281: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.7) [Added]
- TA6283: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.8) [Added]
- TA5981: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.6) [Updated]
- INFO: Updated the inclusion standard.
- TA5983: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.7) [Updated]
- INFO: Updated the inclusion standard.
- TA5985: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.8) [Updated]
- INFO: Updated the inclusion standard.
- T2452: Use managed components (Containerization) [Added]
- P1710: Using unmanaged components (Containerization) [Added]
- I1848: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.2.1) [Added]
- TA6342: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.2.1) [Added]
- TA6360: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.6.1) [Added]
- TA6023: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.2.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6031: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.6.1) [Updated]
- INFO: Updated the inclusion standard.
- I1699: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.2.1) [Updated]
- INFO: Updated the inclusion standard.
- I1700: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.6.1) [Updated]
- INFO: Updated the inclusion standard.
- T2453: Verify that managed components are used (Containerization). [Added]
- P1710: Using unmanaged components (Containerization) [Added]
- TA6343: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.2.1) [Added]
- TA6024: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.2.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6032: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.6.1) [Updated]
- INFO: Updated the inclusion standard.
- T2454: Verify that managed container registries are securely configured (Containerization) [Added]
- P1709: Insecurely configured managed container registries (Containerization) [Added]
- TA6341: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 5.1.4) [Added]
- TA6019: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6022: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.3) [Updated]
- INFO: Updated the inclusion standard.
- T2455: Securely configure managed container registries (Containerization) [Added]
- P1709: Insecurely configured managed container registries (Containerization) [Added]
- I1846: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.1.2) [Added]
- I1847: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 5.1.4) [Added]
- TA6334: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.1.1) [Added]
- TA6336: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.1.2) [Added]
- TA6338: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.1.3) [Added]
- TA6340: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 5.1.4) [Added]
- TA6018: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6020: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6021: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6053: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.1.4) [Updated]
- INFO: Updated the inclusion standard.
- I1681: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.2) [Updated]
- INFO: Updated the inclusion standard.
- I1697: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.1) [Updated]
- INFO: Updated the inclusion standard.
- I1698: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.3) [Updated]
- INFO: Updated the inclusion standard.
- T2456: Assign roles properly (Containerization) [Added]
- I1825: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.1) [Added]
- I1827: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.3) [Added]
- TA6290: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.1) [Added]
- TA6294: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.3) [Added]
- TA6356: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 5.5.1) [Added]
- TA6358: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 5.5.2) [Added]
- TA5988: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.1) [Updated]
- INFO: Updated the inclusion standard.
- TA5992: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6056: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.5.1) [Updated]
- INFO: Updated the inclusion standard.
- I1669: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.1) [Updated]
- INFO: Updated the inclusion standard.
- I1670: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.3) [Updated]
- INFO: Updated the inclusion standard.
- I1686: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.5.1) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2457: Verify roles are assigned Properly(Containerization) [Added]
- TA6291: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.1) [Added]
- TA6295: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.3) [Added]
- TA5989: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.1) [Updated]
- INFO: Updated the inclusion standard.
- TA5993: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6057: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.5.1) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2458: Restrict user access (Containerization) [Added]
- I1828: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.4) [Added]
- TA6296: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.4) [Added]
- TA6346: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 5.4.1) [Added]
- TA5994: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6027: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.1) [Updated]
- INFO: Updated the inclusion standard.
- I1671: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.4) [Updated]
- INFO: Updated the inclusion standard.
- I1682: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.1) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2459: Verify user access is restricted (Containerization) [Added]
- TA6297: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.4) [Added]
- TA5995: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6028: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.1) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2460: Restrict service access (Containerization) [Added]
- I1815: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.2) [Added]
- I1829: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.5) [Added]
- I1830: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.6) [Added]
- TA6270: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.2) [Added]
- TA6298: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.5) [Added]
- TA6300: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.6) [Added]
- TA5972: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.2) [Updated]
- INFO: Updated the inclusion standard.
- TA5996: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.5) [Updated]
- INFO: Updated the inclusion standard.
- TA5998: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.6) [Updated]
- INFO: Updated the inclusion standard.
- I1668: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.2) [Updated]
- INFO: Updated the inclusion standard.
- I1672: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.5) [Updated]
- INFO: Updated the inclusion standard.
- I1673: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.6) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2461: Verify service access is restricted (Containerization) [Added]
- TA6271: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 3.2.2) [Added]
- TA6299: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.5) [Added]
- TA6301: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.1.6) [Added]
- TA5973: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.2) [Updated]
- INFO: Updated the inclusion standard.
- TA5997: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.5) [Updated]
- INFO: Updated the inclusion standard.
- TA5999: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.6) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2462: Minimize the admission of high-privileged containers (Containerization) [Added]
- I1831: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.1) [Added]
- I1835: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.5) [Added]
- I1836: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.2.6) [Added]
- TA6302: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.1) [Added]
- TA6310: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.5) [Added]
- TA6312: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.2.6) [Added]
- TA6000: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6008: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.5) [Updated]
- INFO: Updated the inclusion standard.
- TA6037: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.6) [Updated]
- INFO: Updated the inclusion standard.
- I1674: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.1) [Updated]
- INFO: Updated the inclusion standard.
- I1678: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.5) [Updated]
- INFO: Updated the inclusion standard.
- I1683: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.6) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2463: Verify that containers with excessive privileges are minimized (Containerization) [Added]
- TA6303: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.1) [Added]
- TA6311: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.5) [Added]
- TA6313: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.2.6) [Added]
- TA6001: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6009: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.5) [Updated]
- INFO: Updated the inclusion standard.
- TA6038: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.6) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2464: Minimize the admission of containers wishing to share namespaces (Containerization) [Added]
- I1832: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.2) [Added]
- I1833: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.3) [Added]
- I1834: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.4) [Added]
- I1845: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.7.3) [Added]
- TA6304: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.2) [Added]
- TA6306: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.3) [Added]
- TA6308: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.4) [Added]
- TA6332: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.7.3) [Added]
- TA6002: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6004: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6006: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6051: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.3) [Updated]
- INFO: Updated the inclusion standard.
- I1675: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.2) [Updated]
- INFO: Updated the inclusion standard.
- I1676: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.3) [Updated]
- INFO: Updated the inclusion standard.
- I1677: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.4) [Updated]
- INFO: Updated the inclusion standard.
- I1685: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.3) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2465: Verify that containers wishing to share namespaces are minimized (Containerization) [Added]
- TA6305: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.2) [Added]
- TA6307: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.3) [Added]
- TA6309: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.4) [Added]
- TA6333: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.7.3) [Added]
- TA6003: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6005: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6007: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6052: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.3) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2466: Minimize the admission of containers with undesired capabilities (Containerization) [Added]
- I1837: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.7) [Added]
- I1838: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.2.8) [Added]
- TA6314: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.7) [Added]
- TA6316: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.2.8) [Added]
- TA6010: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6012: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.8) [Updated]
- INFO: Updated the inclusion standard.
- TA6039: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.9) [Updated]
- INFO: Updated the inclusion standard.
- I1679: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.7) [Updated]
- INFO: Updated the inclusion standard.
- I1680: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.8) [Updated]
- INFO: Updated the inclusion standard.
- I1684: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.9) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2467: Verify that containers with undesired capabilities are minimized (Containerization) [Added]
- TA6315: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 1, Recommendation 4.2.7) [Added]
- TA6317: CIS Azure Kubernetes Service (AKS) Benchmark v1.2.0 (Level 2, Recommendation 4.2.8) [Added]
- TA6011: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6013: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.8) [Updated]
- INFO: Updated the inclusion standard.
- TA6040: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.9) [Updated]
- INFO: Updated the inclusion standard.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
T2468: Manage PCI-DSS compliance [Added]
- P1713: Lack of processes for the approval of compliance with PCI-DSS [Added]
- TA6366: Identify and confirm the scope of the PCI DSS [Added]
Changes to Project Properties and Profiles
- Q193: Components
- Q101: Components In Development
- A1077: Firmware, embedded, or hardware solution [Updated]
- INFO: Updated the children.
- A1077: Firmware, embedded, or hardware solution [Updated]
- Q101: Components In Development
- Q195: Language and Framework
- Q109: Programming Language
- Q110: Technology/Framework
- A1223: Technology/Framework - Angular [Updated]
- INFO: Updated the children.
- A1223: Technology/Framework - Angular [Updated]
- A1352: TypeScript [Added]
- Q110: Technology/Framework
- Q109: Programming Language
- Q243: Internal Hidden Properties
- Q189: Internal Properties (Use this, for all hidden answers)
- A1061: Set of default answers for all profiles [Updated]
- INFO: Updated the children.
- A1061: Set of default answers for all profiles [Updated]
- Q189: Internal Properties (Use this, for all hidden answers)
- Q284: Context and Characteristics
- Q252: Application's Context and Characteristics
- A1350: Include countermeasures in the Activity phase (process engineering tasks) in this project [Added]
- Q252: Application's Context and Characteristics
- Q289: Cloud Computing
- Q290: Cloud Providers
- Q298: AWS Services
- A1331: EKS [Updated]
- INFO: Updated the children.
- A1345: API Gateway [Added]
- A1346: Cognito [Added]
- A1347: Kinesis Data Streams [Added]
- A1348: Kinesis Data Firehose [Added]
- A1349: WAF [Added]
- A1331: EKS [Updated]
- Q306: Azure Services
- A1351: AKS [Added]
- Q298: AWS Services
- Q290: Cloud Providers
- Q307: Containerization
- Q308: Containerization Technologies
- A1329: Managed Kubernetes [Updated]
- INFO: Updated the children.
- A1329: Managed Kubernetes [Updated]
- Q308: Containerization Technologies
- Q193: Components
2022.3
October 15, 2022
New features and enhancements
Project Threats
- Introduced Project Threats, which are created per project based on survey answers and match conditions.
- Threats are automatically generated and presented on the threats page within the side panel of the diagram.
- Each threat consists of weaknesses and countermeasures.
- Where applicable, threats are mapped to reusable components.
Language change
- Changed default terminology in our platform from problems and tasks to weaknesses and countermeasures, to stay in line with the industry.
- To allow flexibility, users can customize weaknesses and countermeasures in the UI.
- For existing customers who have changed the Problems label, we will be migrating that language in this release (SaaS only).
Advanced Reporting dashboards
- Introduced the ability for users to create their own dashboards based on visualizations from Advanced Reports.
- Users with appropriate permissions will see the new Dashboard List page, which allows them to view existing dashboards or create a new dashboard.
- Users can set a default dashboard for their homepage and organize their Dashboard List page with the ability to pin dashboards.
- Introduced the ability for users to create their own dashboards based on visualizations from Advanced Reports.
Advanced Reports
- Added four new tables to Advanced Reports.
- Added Library Threats and Project Threats. Users can create reporting on threats across their entire security portfolio or focus more granularly at the project level.
- Added Training (JITT) and Training enablement tables. Users can now create training-based reports to better understand the courses or modules into which users have enrolled.
- Added four new tables to Advanced Reports.
Project survey
- Added Comments Required
- Library users with customize_content permissions will be able to mark questions and subquestions as comments required. Once a question and sub question is marked as comments required, project users who are answering the survey will need to add at least one comment before saving the survey. Questions and subquestions that require a comment will have a visual indicator and a textbox attached to it in the survey.
- Improved mandatory indicators
- Project users answering the survey will be able to better understand which questions and subquestions require an answer or comment when the survey initially appears. Sections and subsections will have a counter and each question or subquestion will have a red outline.
- Added Comments Required
Integrations
- Added Fortify on Demand integration under Verification Tools.
Other product improvements
- Integrations
- Fixed a bug on the JIRA integration that prevented custom field mappings from appearing correctly in JIRA Labels field.
- Addressed an issue while parsing data from Prisma Cloud formerly Twistlock.
- Renamed Twistlock to Prisma Cloud formerly Twistlock
- Renamed Whitesource to Mend formerly Whitesource
- API
- Updated the feature Flags API to allow all authenticated users the ability to view the list of feature flags.
Content improvements summary
Countermeasure (Task) Priority
- Countermeasure priority levels may change as SD Elements revises its content. These changes may affect your risk policies. Ensure that you review changes to your risk policies after accepting changes from new releases.
Ansible
- Added new Weaknesses, Countermeasures, Additional Requirements, and How-tos for Ansible security.
Automotive industry (WP.29-Rev.3 and ISO/SAE 21434)
- Added new Weaknesses and Countermeasures to cover the WP.29-Rev.3 regulation.
- Added an activity Countermeasure for ISO/SAE 21434.
EO 14028: Critical Software & Verification Req. (NISTIR 8397)
- Added two regulations and Countermeasures to cover the requirements of the Executive Order.
Improved hardware, WiFi, and bluetooth content
- Added new Countermeasures and Additional Requirements.
Threat Modeling
- Updated terminology used from Task/Problem to Countermeasure/Weakness.
Control Correlation Identifier (CCI)
- Added a regulation for Control Correlation Identifier (CCI) and mapped relevant countermeasures to it.
Reusable components
- Mapped reusable components to Countermeasures.
Content additions and updates (as of September 13, 2022):
Compliance Regulations and Mappings
- Added WP.29-Rev.3
- Added NIST-EO-Critical-Software
- Added NIST-EO-Software-Verification
- Added Control Correlation Identifier (CCI)
Content Packs
- Added WP.29
- Added NIST EO Critical Software
- Added NIST EO Software-Verification
- Added CCI
- Added ISO/SAE 21434
- Added Ansible
T13: Change Automatically Generated Passwords [Updated]
- INFO: Updated the text.
- T15: Centralize authorization
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- T21: Ensure all data in transit is encrypted using a secure TLS channel [Updated]
- INFO: Updated the text.
- TA6253: Secure files transfer [Added]
- TA6254: Connect to a remote system securely [Added]
- T26: Expire sessions on logout
- P694: Sessions Not Expired Upon Logout [Updated]
- INFO: Updated the text.
- P694: Sessions Not Expired Upon Logout [Updated]
- T27: Turn off session rewriting [Updated]
- INFO: Updated the text.
- T36: Escape untrusted data in HTML, HTML attributes, CSS, and JavaScript
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Updated the text.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T40: Use XML encoding when interacting with XML data [Updated]
- INFO: Updated the text.
- T45: Log potential critical security events [Updated]
- INFO: Updated the text.
- T49: Disable and remove debug capabilities and code/data, and prepare application for release [Updated]
- INFO: Updated the text.
- TA6247: Deploy the product with a secure initial configuration [Added]
- T50: Use indirect object reference maps if accessing files [Updated]
- INFO: Updated the text.
- T53: Prevent the upload of malicious files and malware
- TA6243: Avoid the use of removable media [Added]
- T62: Protect passwords in property and configuration files [Updated]
- INFO: Updated the text.
- T71: Capture sufficient information for each transaction in audit logs [Updated]
- INFO: Updated the text.
- TA6245: Enable USB event tracing and logging [Added]
- T119: Test for clickjacking [Updated]
- INFO: Updated the text.
- T135: Assign each person using the system a unique user ID [Updated]
- INFO: Updated the text.
- T146: Use encryption for network communications in mobile environments
- TA6250: Enabling Confidentiality on the Air Interface [Added]
- TA6251: Ensure Confidentiality Protection of S1 Interface [Added]
- TA6252: Employ a SIM/USIM PIN [Added]
- T156: Validate certificate and its chain of trust properly
- P716: Certificate Validation Issues [Updated]
- INFO: Updated the text.
- P716: Certificate Validation Issues [Updated]
- T161: Treat unique device IDs as personal information [Updated]
- INFO: Updated the text.
- T171: Follow spam-free guidelines for sending solicitation emails [Updated]
- INFO: Updated the text.
- T177: Allow users to review and update their personal information [Updated]
- INFO: Updated the text.
- T178: Obtain consent from users prior to collecting personal information [Updated]
- INFO: Updated the text.
- T186: Use recommended settings and the latest patches for third party libraries and software [Updated]
- INFO: Updated the text.
- T193: Review non-categorized/miscellaneous findings from automated analysis [Updated]
- INFO: Updated the text.
- T194: Obtain user consent for tracking cookies [Updated]
- INFO: Updated the text and priority.
- T195: Design lawful procedures to obtain consent for processing personal information and to withdraw it when requested [Updated]
- INFO: Updated the text.
- T197: Encrypt and sign any remote code/update and then validate the signature to verify its origin and integrity [Updated]
- INFO: Updated the text.
- T203: Avoid uncontrolled format strings
- P35: Uncontrolled Format String [Updated]
- INFO: Updated the text.
- P35: Uncontrolled Format String [Updated]
- T207: Provide special data protection for children's personal information [Updated]
- INFO: Updated the text and priority.
- T226: Verify that authorization is centralized [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T227: Verify that application's access to database is restricted [Updated]
- INFO: Updated the text.
- T240: Test whether users can remove their data from the system [Updated]
- INFO: Updated the text.
- T248: Protect secret keys and passwords in the application [Updated]
- INFO: Updated the text.
- T257: Secure cross origin resource sharing (CORS) [Updated]
- INFO: Updated the text.
- T259: Follow best practices when storing data in Local or Session Storage [Updated]
- INFO: Updated the text.
- T262: Mask passwords by default on mobiles but consider usability options [Updated]
- INFO: Updated the text.
- T270: Follow best practices for storing application data on Android devices [Updated]
- INFO: Updated the text.
- T272: Restrict access to the application's exported components (Android) [Updated]
- INFO: Updated the text.
- T298: Verify that Pasteboards are securely managed [Updated]
- INFO: Updated the text.
- T304: Verify that unique device IDs are treated as personal information [Updated]
- INFO: Updated the text.
- T312: Verify that inter-process communication (IPC) endpoints are secured in client [Updated]
- INFO: Updated the text.
- T313: Identify and classify categories of personal information [Updated]
- INFO: Updated the text.
- T338: Control access to resources through user authentication and authorization [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T344: Enforce different rules for access to the system based on the origin, type and medium of request [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T349: Protect audit information and logs against unauthorized access [Updated]
- INFO: Updated the text.
- T353: Control the inbound and outbound data flow across the boundaries of zones [Updated]
- INFO: Updated the text.
- T370: Follow best practices for using third-party software libraries/modules and open source/COTS components [Updated]
- INFO: Updated the text.
- T374: Offload HTTP request handling to dedicated modules [Updated]
- INFO: Updated the text.
- T376: Fill out the manufacturer disclosure statement for the medical device security (MDS2) form [Updated]
- INFO: Updated the text.
- T379: Provide sufficient documentation for security-related features
- TA6248: Document insecure settings [Added]
- T408: Set secure flag on Android Activities with sensitive content [Updated]
- INFO: Updated the text.
- T410: Manage use of Android third-party keyboards with sensitive data [Updated]
- INFO: Updated the text.
- T417: Avoid passing dynamic data to trustAs or bypassSecurityTrust functions [Updated]
- INFO: Updated the text.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Updated the text.
- T418: Use Angular's built-in sanitization for user output with limited code or markup [Updated]
- INFO: Updated the text.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Updated the text.
- T420: Prevent Client-Side Template Injection (CSTI) [Updated]
- INFO: Updated the text.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Updated the text.
- T422: Verify that built-in sanitization is used in Angular with limited code or markup [Updated]
- INFO: Updated the text.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Updated the text.
- T427: Implement previous login (access) notification [Updated]
- INFO: Updated the title and text.
- P774: Inadequate Login Activity Monitoring and Notification [Updated]
- INFO: Updated the title and text.
- T428: Test that the system provides previous login (access) notifications [Updated]
- INFO: Updated the title and text.
- P774: Inadequate Login Activity Monitoring and Notification [Updated]
- INFO: Updated the title and text.
- T429: Limit the number of concurrent sessions for each account [Updated]
- INFO: Updated the text.
- T456: Change default security settings to the most stringent ones and disable unnecessary services and modules [Updated]
- INFO: Updated the text.
- TA6244: Secure the use of USB ports when they are enabled [Added]
- TA6249: Disable Bluetooth when it is unnecessary [Added]
- T472: Authenticate RFID reader before sending sensitive data or executing a command [Updated]
- INFO: Updated the text.
- T482: Secure password-based authentication for RFID tags [Updated]
- INFO: Updated the text.
- T508: Require authentication for accessing HyperCat catalogs and resources [Updated]
- INFO: Updated the title and text.
- T509: Protect the integrity of HyperCat catalogs and resources [Updated]
- INFO: Updated the title and text.
- T510: Test if authentication is enforced on HyperCat catalogs [Updated]
- INFO: Updated the title and text.
- T511: Test if HyperCat resources have license and access control metadata [Updated]
- INFO: Updated the title and text.
- T520: Design secure SOAP web services [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T536: Restrict the size of incoming messages in services [Updated]
- INFO: Updated the text.
- T537: Test that the size of incoming messages in services is restricted [Updated]
- INFO: Updated the text.
- T552: Verify that SOAP web services are securely designed [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T554: Verify that REST web services are securely designed [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T564: Follow best practices for sharing data between Android applications [Updated]
- INFO: Updated the text.
- T565: Verify that data sharing between Android applications is secure [Updated]
- INFO: Updated the text.
- T566: Enable network layer encryption for local area network communications [Updated]
- INFO: Updated the text.
- T574: Prevent information exposure in HyperCat
- P96: Information Exposure [Updated]
- INFO: Updated the text.
- P96: Information Exposure [Updated]
- T578: Execute only compiled programs in mainframe [Updated]
- INFO: Updated the text.
- T580: Validate return codes in mainframe programs [Updated]
- INFO: Updated the text.
- T581: Verify that return codes are evaluated in mainframe programs [Updated]
- INFO: Updated the text.
- T605: Verify if consent is obtained prior to personal information collection (where applicable) [Updated]
- INFO: Updated the text.
- T612: Detect rooted devices and assess the runtime environment with the aid of SafetyNet Attestation API [Updated]
- INFO: Updated the text.
- T613: Mitigate DDoS attacks with NGINX [Updated]
- INFO: Updated the text.
- T616: Keep user iOS device token private
- P818: Privacy Issue due to Device Token Mishandling in Apple Push Notifications (APNs) [Updated]
- INFO: Updated the text.
- P818: Privacy Issue due to Device Token Mishandling in Apple Push Notifications (APNs) [Updated]
- T629: Authenticate the game server to the clients before logging in [Updated]
- INFO: Updated the text.
- T633: Mitigate Deadlock and Recursion in Services
- P827: Service Deadlock and Recursion [Updated]
- INFO: Updated the text.
- P827: Service Deadlock and Recursion [Updated]
- T683: Integrate CloudTrail logs with CloudWatch Logs for real-time analysis (AWS) [Updated]
- INFO: Updated the text.
- T735: Verify that personal information is removed when it is no longer needed [Updated]
- INFO: Updated the text.
- T750: Limit personal information collection and processing to the specified purpose [Updated]
- INFO: Updated the text and priority.
- T752: Verify if users are notified about processing their personal information [Updated]
- INFO: Updated the text.
- T757: Verify if personal information processing stops when user objects to it [Updated]
- INFO: Updated the text.
- T858: Use the vendor supplied version of binaries
- P941: Not using vendor supplied binaries [Updated]
- INFO: Updated the text.
- P941: Not using vendor supplied binaries [Updated]
- T867: Restrict Apache options and disable default content (Apache HTTP Server) [Updated]
- INFO: Updated the text.
- T871: Log Apache errors and access (Apache HTTP Server) [Updated]
- INFO: Updated the text.
- T873: Apply applicable patches (Apache HTTP Server) [Updated]
- INFO: Updated the text.
- T896: Design a secure architecture for AWS deployment (AWS) [Updated]
- INFO: Updated the text.
- T928: Ensure debug is turned off (Microsoft IIS) [Updated]
- INFO: Updated the text.
- T975: Use a sandboxing alternative to Security Manager (Apache Tomcat) [Updated]
- INFO: Updated the title and text.
- P983: Lack of a sandboxing mechanism or relying on the deprecated Security Manager (Apache Tomcat) [Updated]
- INFO: Updated the title and text.
- T977: Do not allow symbolic linking (Apache Tomcat)
- P985: Allowing symbolic linking (Apache Tomcat) [Updated]
- INFO: Updated the text.
- P985: Allowing symbolic linking (Apache Tomcat) [Updated]
- T1004: Verify that a sandboxing alternative to Security Manager is used (Apache Tomcat) [Updated]
- INFO: Updated the title and text.
- P983: Lack of a sandboxing mechanism or relying on the deprecated Security Manager (Apache Tomcat) [Updated]
- INFO: Updated the title and text.
- T1028: Log sufficiently and protect logs (Apache Tomcat)
- P1008: Insufficient Logging or Insufficient Protection of Logs (Apache Tomcat) [Updated]
- INFO: Updated the text.
- P1008: Insufficient Logging or Insufficient Protection of Logs (Apache Tomcat) [Updated]
- T1034: Protect manager application (Apache Tomcat)
- P1012: Unprotected manager application (Apache Tomcat) [Updated]
- INFO: Updated the text.
- P1012: Unprotected manager application (Apache Tomcat) [Updated]
- T1051: Enable 'All Users' group (Microsoft Azure)
- P1019: Not using "All Users" for permissions (Microsoft Azure) [Updated]
- INFO: Updated the title and text.
- P1019: Not using "All Users" for permissions (Microsoft Azure) [Updated]
- T1130: Configure authentication (MySQL)
- P1057: Improper authentication (MySQL) [Updated]
- INFO: Updated the text.
- P1057: Improper authentication (MySQL) [Updated]
- T1144: Prevent Server-Side Template Injection (SSTI) [Updated]
- INFO: Updated the text.
- T1158: Configure TLS authentication for the Docker daemon (Docker)
- P1068: Lack of proper TLS authentication for the Docker daemon (Docker) [Updated]
- INFO: Updated the text.
- P1068: Lack of proper TLS authentication for the Docker daemon (Docker) [Updated]
- T1164: Secure swarm mode (Docker)
- P1071: Insecure swarm mode (Docker) [Updated]
- INFO: Updated the text.
- P1071: Insecure swarm mode (Docker) [Updated]
- T1176: Use trusted base images and include the latest security patches (Docker) [Updated]
- INFO: Updated the text.
- T1182: Avoid image caching weakness (Docker) [Updated]
- INFO: Updated the title.
- T1222: Do not change base device size until needed (Docker)
- P1100: Changing base device size when it's not needed (Docker) [Updated]
- INFO: Updated the text.
- P1100: Changing base device size when it's not needed (Docker) [Updated]
- T1224: Use authorization plugin (Docker)
- P1101: Failing to use the authorization plugin (Docker) [Updated]
- INFO: Updated the text.
- P1101: Failing to use the authorization plugin (Docker) [Updated]
- T1258: Configure service account securely (Kubernetes) [Updated]
- INFO: Updated the text.
- T1286: Avoid using Kubernetes Secrets (Kubernetes)
- P1132: Using Kubernetes Secrets (Kubernetes) [Updated]
- INFO: Updated the text.
- P1132: Using Kubernetes Secrets (Kubernetes) [Updated]
- T1310: Include sufficient information in the log files (Google Cloud)
- P1144: Insufficient information included in the log files (Google Cloud) [Updated]
- INFO: Updated the title.
- P1144: Insufficient information included in the log files (Google Cloud) [Updated]
- T1318: Enable and configure DNSSEC (Google Cloud)
- P1148: Insecure DNS configuration (Google Cloud) [Updated]
- INFO: Updated the title.
- P1148: Insecure DNS configuration (Google Cloud) [Updated]
- T1322: Disable connection to serial ports for VM Instance (Google Cloud)
- P1150: Enabling interactive serial console access (Google Cloud) [Updated]
- INFO: Updated the title.
- P1150: Enabling interactive serial console access (Google Cloud) [Updated]
- T1324: Disable IP forwarding on Instances (Google Cloud)
- P1151: Enabling IP forwarding on Instances (Google Cloud) [Updated]
- INFO: Updated the title.
- P1151: Enabling IP forwarding on Instances (Google Cloud) [Updated]
- T1326: Disable public or anonymous access to storage and database (Google Cloud)
- P1152: Allowing public access to storage and database (Google Cloud) [Updated]
- INFO: Updated the title.
- P1152: Allowing public access to storage and database (Google Cloud) [Updated]
- T1338: Ensure Kubernetes clusters are configured with Labels (Google Cloud)
- P1158: Kubernetes clusters configured without Labels (Google Cloud) [Updated]
- INFO: Updated the title.
- P1158: Kubernetes clusters configured without Labels (Google Cloud) [Updated]
- T1346: Ensure Kubernetes clusters are created with Alias IP ranges enabled (Google Cloud)
- P1162: Kubernetes cluster created without Alias IP ranges enabled (Google Cloud) [Updated]
- INFO: Updated the title.
- P1162: Kubernetes cluster created without Alias IP ranges enabled (Google Cloud) [Updated]
- T1348: Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters (Google Cloud)
- P1163: Disabled PodSecurityPolicy controller on Kubernetes Engine Clusters (Google Cloud) [Updated]
- INFO: Updated the title.
- P1163: Disabled PodSecurityPolicy controller on Kubernetes Engine Clusters (Google Cloud) [Updated]
- T1354: Enable Private Google Access for all subnetwork in VPC Network (Google Cloud)
- P1166: Disabled Private Google Access for all subnetworks in VPC Network (Google Cloud) [Updated]
- INFO: Updated the title.
- P1166: Disabled Private Google Access for all subnetworks in VPC Network (Google Cloud) [Updated]
- T1356: Ensure VM disks for critical VMs are encrypted with Customer-Supplied Encryption Keys (CSEK) (Google Cloud)
- P1167: VM disks for critical VMs not encrypted with Customer-Supplied Encryption Keys (CSEK) (Google Cloud) [Updated]
- INFO: Updated the title.
- P1167: VM disks for critical VMs not encrypted with Customer-Supplied Encryption Keys (CSEK) (Google Cloud) [Updated]
- T1358: Use Container-Optimized OS (cos) for Kubernetes Engine Clusters Node image (Google Cloud)
- P1168: Container-Optimized OS (cos) not used for Kubernetes Engine Clusters Node image (Google Cloud) [Updated]
- INFO: Updated the title.
- P1168: Container-Optimized OS (cos) not used for Kubernetes Engine Clusters Node image (Google Cloud) [Updated]
- T1362: Perform message throttling in Web APIs [Updated]
- INFO: Updated the text.
- T1365: Mitigate Server Side Request Forgery
- P1169: Server Side Request Forgery (SSRF) [Updated]
- INFO: Updated the text.
- P1169: Server Side Request Forgery (SSRF) [Updated]
- T1368: Perform security testing using SAST tools [Updated]
- INFO: Updated the text.
- TA6239: Review hardcoded secrets using Heuristic tools [Added]
- T1369: Perform security testing using DAST tools [Updated]
- INFO: Updated the text.
- TA6241: Run the product with various test cases [Added]
- T1370: Identify and track common software weaknesses and threats [Updated]
- INFO: Updated the text.
- T1373: Maintain the integrity of all software code
- P1175: Insufficient software code control [Updated]
- INFO: Updated the text.
- P1175: Insufficient software code control [Updated]
- T1380: Enforce secure user registration and access control [Updated]
- INFO: Updated the text.
- T1381: Establish secure processes for key management [Updated]
- INFO: Updated the text.
- T1382: Manage performance and capacity
- P1190: Lack of process for performance and capacity management [Updated]
- INFO: Updated the text.
- P1190: Lack of process for performance and capacity management [Updated]
- T1383: Separate development, test, and operational environments [Updated]
- INFO: Updated the text.
- T1385: Institute secure logging and event monitoring [Updated]
- INFO: Updated the text.
- T1421: Do not use default ports (Microsoft SQL Server)
- P1204: Using default ports (Microsoft SQL Server) [Updated]
- INFO: Updated the text.
- P1204: Using default ports (Microsoft SQL Server) [Updated]
- T1425: Disable 'sa' login account (Microsoft SQL Server)
- P1206: Enabled SQL server account with sysadmin privileges (Microsoft SQL Server) [Updated]
- INFO: Updated the text.
- P1206: Enabled SQL server account with sysadmin privileges (Microsoft SQL Server) [Updated]
- T1451: Maintain audit logs for all database activities (Microsoft SQL Server) [Updated]
- INFO: Updated the text.
- P1219: Not logging important events (Microsoft SQL Server) [Updated]
- INFO: Updated the title and text.
- T1465: Decide how to handle sessions/authorization state in your Angular application (Angular) [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T1466: Restrict sending of authorization state to approved origins in Angular (Angular) [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T1468: Encrypt sensitive data at rest in the browser [Updated]
- INFO: Updated the text.
- T1469: Prevent sensitive data leakage through Content Security Policy (CSP) reports [Updated]
- INFO: Updated the text.
- T1538: Avoid DOM-based Cross-Site Scripting (XSS) in Angular applications (Angular) [Updated]
- INFO: Updated the text.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Updated the text.
- T1541: Decide on the best CSRF defense for your application [Updated]
- INFO: Updated the text.
- T1542: Use the correct HTTP methods for making state-changing operations [Updated]
- INFO: Updated the text.
- T1544: Isolate untrusted content in a sandbox [Updated]
- INFO: Updated the text.
- T1619: Keep audit parameters enabled at all times (Oracle Database)
- P1298: Not monitoring user activities (Oracle Database) [Updated]
- INFO: Updated the text.
- P1298: Not monitoring user activities (Oracle Database) [Updated]
- T1621: Only allow authorized domains to connect with database (Oracle Database)
- P1299: Unauthorized domain sources connecting to the database (Oracle Database) [Updated]
- INFO: Updated the text.
- P1299: Unauthorized domain sources connecting to the database (Oracle Database) [Updated]
- T1659: Revoke excessive system privileges from unauthorized users (Oracle Database)
- P1318: Unauthorized users with excessive privileges can impact confidentiality and integrity of data (Oracle Database) [Updated]
- INFO: Updated the text.
- P1318: Unauthorized users with excessive privileges can impact confidentiality and integrity of data (Oracle Database) [Updated]
- T1887: Decide on the right OAuth 2.0 flow for your application [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T1889: Secure the configuration of the authorization server [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T1890: Implement OAuth 2.0 securely on the resource server [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T1893: Perform a cloud solution security posture assessment [Updated]
- INFO: Updated the text.
- T1906: Enforce authentication on your relational database services (AWS)
- P1430: Improper authentication on your database engine [Updated]
- INFO: Updated the text.
- P1430: Improper authentication on your database engine [Updated]
- T1915: Perform network vulnerability assessment [Updated]
- INFO: Updated the text.
- T1921: Track and manage usage of third-party and commercial off the shelf (COTS) hardware or software [Updated]
- INFO: Updated the text.
- T1922: Use secure OAuth 2.0 and OpenID Connect integration (where applicable) [Updated]
- INFO: Updated the text.
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Updated the text.
- T1973: Do not disable use-service-account-credentials argument (OpenShift)
- P1464: Disabling use-service-account-credentials argument (OpenShift) [Updated]
- INFO: Updated the text.
- P1464: Disabling use-service-account-credentials argument (OpenShift) [Updated]
- T2081: Encrypt data at rest properly (Kubernetes)
- P1517: Cleartext or weakly encrypted data at rest (Kubernetes) [Updated]
- INFO: Updated the text.
- P1517: Cleartext or weakly encrypted data at rest (Kubernetes) [Updated]
- T2124: Exercise security best practices for inducing new versions of microservices
- P1536: Insecure induction of new versions for microservices [Updated]
- INFO: Updated the text.
- P1536: Insecure induction of new versions for microservices [Updated]
- T2160: Avoid vendor lock-in as a customer when migrating into or out of solutions (Cloud)
- P1560: Insufficient data portability in the cloud and insecure migration to the cloud (in and out) [Updated]
- INFO: Updated the text.
- P1560: Insufficient data portability in the cloud and insecure migration to the cloud (in and out) [Updated]
- T2206: Prevent the generation of incorrect security tokens (Hardware/Firmware)
- P1604: Generation of incorrect security tokens (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- P1604: Generation of incorrect security tokens (Hardware/Firmware) [Updated]
- T2208: Restrict sharing device unlocking credentials across multiple parties (Hardware/Firmware)
- P1606: Device unlock credential sharing (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- P1606: Device unlock credential sharing (Hardware/Firmware) [Updated]
- T2218: Prevent same Public Key usage for different environments (Debug and Production) (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2247: Use the strongest Security Mode and Level in devices (Bluetooth) [Updated]
- INFO: Updated the text.
- T2259: Minimize access rights assigned to RBAC roles and Service Accounts (Kubernetes)
- P1653: Inappropriate access settings for RBAC roles and Service Accounts (Kubernetes) [Updated]
- INFO: Updated the text.
- P1653: Inappropriate access settings for RBAC roles and Service Accounts (Kubernetes) [Updated]
- T2296: Securely install and configure all software components [Updated]
- INFO: Updated the text.
- T2309: Securely configure worker nodes (Containerization)
- P1671: Insecure configuration of worker nodes (Containerization) [Updated]
- INFO: Updated the match conditions.
- P1671: Insecure configuration of worker nodes (Containerization) [Updated]
- T2310: Implement proper authentication and authorization (Containerization) (1/2)
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- INFO: Updated the match conditions.
- P1672: Lack of proper authentication and authorization (Containerization) [Updated]
- T2311: Ensure proper network settings and configuration (Containerization)
- P1673: Improper network settings and configuration (Containerization) [Updated]
- INFO: Updated the match conditions.
- P1673: Improper network settings and configuration (Containerization) [Updated]
- T2312: Ensure proper logging and security monitoring (Containerization) [Updated]
- INFO: Updated the text.
- P1674: Inadequate logging and security monitoring (Containerization) [Updated]
- INFO: Updated the match conditions.
- T2313: Keep data and secrets safe (Containerization)
- P1675: Lack of data and secrets protection (Containerization) [Updated]
- INFO: Updated the match conditions.
- P1675: Lack of data and secrets protection (Containerization) [Updated]
- T2314: Enforce secure policies (Containerization)
- P1676: Lack of secure policies (Containerization) [Updated]
- INFO: Updated the match conditions.
- P1676: Lack of secure policies (Containerization) [Updated]
- T2315: Use managed services (Containerization)
- P1677: Using unmanaged services (Containerization) [Updated]
- INFO: Updated the text and match conditions.
- P1677: Using unmanaged services (Containerization) [Updated]
- T2335: Securely automate your infrastructure provisioning process (Terraform)
- P1678: Unsafe infrastructure as code (IaC) processes [Updated]
- INFO: Updated the title and text.
- P1678: Unsafe infrastructure as code (IaC) processes [Updated]
- T2336: Use a remote backend to securely store your infrastructure state (Terraform)
- P1679: Unsafe infrastructure as code (IaC) state [Updated]
- INFO: Updated the title and text.
- P1679: Unsafe infrastructure as code (IaC) state [Updated]
- T2343: Define security-related roles and provide role-base training [Updated]
- INFO: Updated the title and text.
- TA6238: Train all users of EO-critical software (NIST-EO-Critical-Software) [Added]
- P1680: Lack of defining proper security roles and responsibilities [Updated]
- INFO: Updated the title, text, and match conditions.
- T2344: Implement and augment supporting toolchains by automating SDLC security activities [Updated]
- INFO: Updated the text.
- T2350: Create a Product Security Incident Response Team (PSIRT)
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the title.
- P1687: Lack of a Product Security Incident Response [Updated]
- T2351: Verify that security-related roles and responsibilities are properly defined and assigned [Updated]
- INFO: Updated the title and text.
- P1680: Lack of defining proper security roles and responsibilities [Updated]
- INFO: Updated the title, text, and match conditions.
- T2378: Ensure compatibility with the United Nations automotive cybersecurity regulation WP.29 [Added]
- P1688: Lack of processes for the approval of vehicles with regards to cyber security and cyber security management system [Added]
- T2379: Ensure compliance with ISO/SAE 21434 [Added]
- P1688: Lack of processes for the approval of vehicles with regards to cyber security and cyber security management system [Added]
- T2380: Review and verify playbooks (Ansible) [Added]
- P1691: Insecure Ansible playbooks [Added]
- I1792: Deploy playbooks to store configurations and tasks (Ansible) [Added]
- T2381: Follow a secure and guided workflow process (Ansible) [Added]
- P1691: Insecure Ansible playbooks [Added]
- T2382: Automate the workflow (Ansible) [Added]
- P1691: Insecure Ansible playbooks [Added]
- T2383: Avoid using the 'root' account (Ansible) [Added]
- I1794: Use Accounts with Limited Privileges (Ansible) [Added]
- T2384: Use public-private key authentication for SSH (Ansible) [Added]
- P1692: Weak authentication (Ansible) [Added]
- I1795: Use public-private key pair authentication (Ansible) [Added]
- T2385: Use Ansible Vault (Ansible) [Added]
- P1689: Unprotected credentials in Ansible files [Added]
- I1796: Encrypt secrets with Ansible Vault (Ansible) [Added]
- I1797: Ansible Vault integrations (Ansible) [Added]
- I1798: Ansible editor integrations (Ansible) [Added]
- I1799: Manage Ansible Vault passwords (Ansible) [Added]
- I1800: Use a cloud-based key manager (Ansible) [Added]
- I1801: Rotate passwords with rekey (Ansible) [Added]
- I1802: Encrypt sensitive Vault values separately (Ansible) [Added]
- T2386: Use role-based access control in Automation Controller (Ansible) [Added]
- P1690: Inadequate access control in Ansible Automation Controller (Ansible) [Added]
- I1803: Add team permissions to a job template (Ansible) [Added]
- I1804: Configure user account security in Automation Controller (Ansible) [Added]
- T2387: Collect logs for analysis and auditing (Ansible) [Added]
- TA6242: Use Automation Hub (Ansible) [Added]
- T2388: Enforce the principle of separation of duties [Added]
- TA6246: Separate the roles for code signing and code submitting [Added]
- T2389: Prevent co-channel and adjacent channel interference [Added]
- P1693: Poor WiFi Settings Configuration [Added]
- T2390: Limit the WiFi network coverage [Added]
- P1693: Poor WiFi Settings Configuration [Added]
- T2391: Change the default value of the Service Set Identifier (SSID) and protect it [Added]
- P1693: Poor WiFi Settings Configuration [Added]
- T2392: Create an Incident Response Plan [Added]
- TA6255: Create an Incident Response Plan for compromised cryptographic keys [Added]
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the title.
- T2393: Verify the principle of Separation of Duties is strongly implemented [Added]
- T2394: Test co-channel and adjacent channel interference is prevented [Added]
- P1693: Poor WiFi Settings Configuration [Added]
- T2395: Test the default value of the Service Set Identifier (SSID) is changed [Added]
- P1693: Poor WiFi Settings Configuration [Added]
- T2396: Verify that the organization has a Product Security Incident Plan [Added]
- P1687: Lack of a Product Security Incident Response [Updated]
- INFO: Updated the title.
- P1687: Lack of a Product Security Incident Response [Updated]
- T2397: Detect rogue stations in a wireless network [Added]
- P96: Information Exposure [Updated]
- INFO: Updated the text.
- P96: Information Exposure [Updated]
T2398: Verify all rogue stations are detected in your wireless network [Added]
- P96: Information Exposure [Updated]
- INFO: Updated the text.
- P96: Information Exposure [Updated]
Changes to Project Properties and Profiles
- Q243: Internal Hidden Properties
- Q189: Internal Properties (Use this, for all hidden answers)
- A1061: Set of default answers for all profiles [Updated]
- INFO: Updated the children.
- A1330: Generic Container Orchestration [Updated]
- INFO: Updated the text, description, question, and children.
- A1061: Set of default answers for all profiles [Updated]
- Q189: Internal Properties (Use this, for all hidden answers)
- Q289: Cloud Computing
- Q290: Cloud Providers
- Q309: Google Cloud Services
- A1213: Kubernetes Engine [Updated]
- INFO: Updated the children.
- A1213: Kubernetes Engine [Updated]
- Q298: AWS Services
- A1331: EKS [Updated]
- INFO: Updated the text, description, children, and match conditions.
- A1331: EKS [Updated]
- A1190: Microsoft Azure [Updated]
- INFO: Updated the children.
- A1212: Google Cloud Content (Not Story-driven) [Updated]
- INFO: Updated the children.
- Q309: Google Cloud Services
- Q290: Cloud Providers
- Q299: General
- Q346: IaC Tools
- A1342: Ansible [Added]
- Q346: IaC Tools
- Q307: Containerization
- Q308: Containerization Technologies
- A1209: Unmanaged Kubernetes [Updated]
- INFO: Updated the text.
- A1329: Managed Kubernetes [Updated]
- INFO: Updated the text, description, and children.
- A1209: Unmanaged Kubernetes [Updated]
- Q308: Containerization Technologies
- Q331: US Federal and NIST
- Q348: In-Scope for EO 14028 compliance [Added]
- A1340: NIST EO Critical Software [Added]
- A1341: NIST EO Software-Verification [Added]
- Q348: In-Scope for EO 14028 compliance [Added]
- Q349: Broadband cellular networks [Added]
- A1344: Long-Term Evolution (LTE) or Fifth-generation (5G) technologies [Added]
- Q243: Internal Hidden Properties
New Just-in-Time Training
- Secure Software Testing (20)
- PCI SSF (17)
- Securing Terraform (17)
- Defending C and C++ (25)
2022.2
July 7, 2022
New features and enhancements
Diagrams
- Introduced a Threat Model Diagrams feature that allows users to identify and communicate threats with data flow diagrams.
- Users have the option to create a diagram after filling out the Project Survey, which will automatically generate threat modeling components and place them within the diagram.
- Users can export a diagram in JSON or PNG format.
- Each diagram is attached to new releases so that the diagram can evolve with the project.
- If you don't see Diagrams enabled, contact your SD Elements Administrator or Customer Success Manager.
Reusable Components
- Added a Components object in the SD Elements Library, accessible to users with the permission to customize content.
- Built-in components are usable initially.
- Users can create and configure additional components called Custom Components.
- Each component has a Project Survey Answer mapping (a rule for adding the component to a project), a list of Mark as Complete Tasks and a list of Mark as Incomplete Tasks.
- Users can add an activated component to projects.
- Adding a component to a project will apply the component's Mark as Complete and Mark as Incomplete lists, after which users will see their Tasks for the project marked as either complete (automatically) or as needing additional attention.
Advanced Reports
- Added Advanced Reports functionality that allows users the ability to create rich reports with data visualization using pre-built report templates or from a blank template. Accessible to users with permission to view Reporting Dashboard for all projects.
- Users can select up to 6 different visualizations to represent their data.
- Users have access to pull data over 200 dimensions and measures across 40 tables from their SD Elements instance to build reports.
- Users can choose from one of five pre-built templates, or they can create a report from a blank template.
- Users can take advantage of AND/OR logical operators when filtering.
- Users can filter reports by relative dates, arrange column orders, and multi-sort data.
- Users can view their saved advanced reports in the new Advanced Reports page, which includes the ability to export the report as CSV or JSON, ability to edit the report and the ability to expand view size of the report.
- Added Reusable Component tables to Advanced Reports.
- Added a new and improved Report Builder UI that enhances the user experience when building out a report.
Integrations
- Added Black Duck SCA integration under Verification Tools.
- JIRA Feature Enhancements:
- Added a new configuration to provide a summary of errors found within a completed sync job.
- Enabled Comment Syncing from SD Elements to JIRA only under the Authoritative Source (not supported for RIA customers).
- Added a mapping option within JIRA Global Configuration that allows users to leverage the Native Jira field "resolution" with a JIRA Status to provide a different definition to "Done". For example, (Done, Won't Fix) maps to "Not Applicable".
Turning features on/off in the UI
- Users can turn specific features on or off through the SD Elements UI. Toggling features on or off through the API remains a supported feature as well.
- This functionality is available to SD Elements Administrators with the correct permissions.
Other product improvements
Integrations
- Checkmarx Project ID Configurations: Users can now define a project_id alternatively to project_name in Checkmarx project-level configurations.
Problems related Task view
- Updated sorting so that a Problem's related Tasks will be sorted alphabetically.
Content additions and updates (as of June 16, 2022):
Compliance Regulations and Mappings
- Added California Civil Code (CCPA and CPRA)
- Added NIST-SSDF-v1.1
- Updated ISASecure CSA 311 [INFO: Updated the regulation sections].
- Updated ISASecure SSA 311 [INFO: Updated the regulation sections].
Content Packs
- Added Cybersecurity
- Added Application Server
- Added Terraform
- Added NIST SSDF
T1: Use multi-factor authentication for remote access to high risk systems or administrative access to services
- TA46: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA216: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA262: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA867: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA46: MDS2 Notes [Updated]
- T2: Secure the password reset mechanism
- TA47: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA2893: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA47: MDS2 Notes [Updated]
- T3: Require old passwords when users change passwords
- TA48: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA217: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA878: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA48: MDS2 Notes [Updated]
- T4: Use configurable password policies
- TA49: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA149: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA218: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA2894: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA49: MDS2 Notes [Updated]
- T5: Use minimum standards for passwords
- TA50: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA150: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA219: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA871: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA50: MDS2 Notes [Updated]
- T6: Implement account lockout or authentication throttling
- TA51: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA151: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA220: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA846: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA51: MDS2 Notes [Updated]
- T7: Salt and hash stored passwords
- TA52: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA152: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA221: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA872: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA52: MDS2 Notes [Updated]
- T8: Use Consistent Error Handling for All Authentication Failures
- TA53: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA2895: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA53: MDS2 Notes [Updated]
- T9: Implement authorization and screening for highly sensitive transactions
- TA54: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA245: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA2896: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA54: MDS2 Notes [Updated]
- T10: Use server-to-server authentication
- TA55: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA2897: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA55: MDS2 Notes [Updated]
- T12: Mask User Passwords by Default
- TA56: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA879: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA56: MDS2 Notes [Updated]
- T13: Change Automatically Generated Passwords
- TA57: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA2898: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA57: MDS2 Notes [Updated]
- T14: Enforce the principle of least privilege
- TA58: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA153: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA2899: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA58: MDS2 Notes [Updated]
- T15: Centralize authorization
- TA2900: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2900: ASD-STIG requirements [Updated]
- T16: Authorize every non-public page
- TA2901: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2901: ASD-STIG requirements [Updated]
- T17: Do not only rely on client-side authorization
- TA2902: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2902: ASD-STIG requirements [Updated]
- T18: Make authorization decisions using full context
- TA2903: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2903: ASD-STIG requirements [Updated]
- T19: Restrict Application's Access to Database
- TA2904: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2904: ASD-STIG requirements [Updated]
- T20: Generate unique session IDs and reset old IDs after authentication [Updated]
- INFO: Updated the priority.
- TA59: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA898: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T21: Ensure all data in transit is encrypted using a secure TLS channel
- TA60: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA154: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA246: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA852: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA965: Choice of cipher [Updated]
- INFO: Updated the text.
- I479: Apache HTTP Server [Updated]
- INFO: Updated the text.
- TA60: MDS2 Notes [Updated]
- T22: Set secure flags on session cookies
- TA896: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA896: ASD-STIG requirements [Updated]
- T23: Set HttpOnly flag on session cookies
- TA895: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA895: ASD-STIG requirements [Updated]
- T24: Enforce idle session timeout
- TA43: PCI/PA DSS notes [Updated]
- INFO: Updated the title.
- TA61: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA155: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA851: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA43: PCI/PA DSS notes [Updated]
- T25: Enforce absolute session timeouts
- TA874: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA874: ASD-STIG requirements [Updated]
- T26: Expire sessions on logout
- TA881: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA881: ASD-STIG requirements [Updated]
- T27: Turn off session rewriting
- TA897: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA897: ASD-STIG requirements [Updated]
- T28: Avoid 'Remember Me' features
- TA2905: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2905: ASD-STIG requirements [Updated]
- T29: Use anti-Cross-Site Request Forgery (CSRF) tokens
- TA905: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA905: ASD-STIG requirements [Updated]
- T30: Protect forms authentication submissions
- TA62: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA2906: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA62: MDS2 Notes [Updated]
- T31: Validate all forms of input
- TA907: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3499: Input validation (GraphQL) [Updated]
- INFO: Updated the text.
- TA907: ASD-STIG requirements [Updated]
- T32: Always perform input validation on a server [Updated]
- INFO: Updated the text.
- TA2907: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T33: Verify integrity of client-supplied read-only data
- TA892: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA892: ASD-STIG requirements [Updated]
- T34: Refuse overly-long, malformed, and non-printable characters unless required
- TA2908: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2908: ASD-STIG requirements [Updated]
- T35: Fine-tune HTTP server settings
- TA888: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA888: ASD-STIG requirements [Updated]
- T36: Escape untrusted data in HTML, HTML attributes, CSS, and JavaScript
- TA904: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA904: ASD-STIG requirements [Updated]
- T37: Avoid DOM-based Cross-Site Scripting (XSS)
- TA2909: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2909: ASD-STIG requirements [Updated]
- T38: Bind variables in SQL statements
- TA908: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA908: ASD-STIG requirements [Updated]
- T40: Use XML encoding when interacting with XML data
- I116: ASP.NET / C# XML encoding with Microsoft Anti XSS [Updated]
- INFO: Updated the text.
- I116: ASP.NET / C# XML encoding with Microsoft Anti XSS [Updated]
- T43: Avoid unsafe operating system interaction [Updated]
- INFO: Updated the text.
- TA906: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T45: Log potential critical security events
- TA156: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA247: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA844: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA156: DIACAP Notes [Updated]
- T46: Do not log confidential data
- I1787: Mark sensitive variables for log redaction (Terraform) [Added]
- TA63: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA860: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T49: Disable and remove debug capabilities and code/data, and prepare application for release
- TA901: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA901: ASD-STIG requirements [Updated]
- T53: Prevent the upload of malicious files and malware
- TA64: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA157: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA5239: ISASecure CSA 311 requirements: Levels (1, 2, 3, 4), Components (Embedded Device) [Updated]
- INFO: Updated the text.
- TA64: MDS2 Notes [Updated]
- T55: Validate all XML input
- TA887: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA887: ASD-STIG requirements [Updated]
- T58: Do not process user-supplied XSLTs in XML digital signatures
- TA2910: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2910: ASD-STIG requirements [Updated]
- T59: Use standard libraries for cryptography
- TA2911: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2911: ASD-STIG requirements [Updated]
- T60: Use correct and approved cryptographic algorithms, parameters, and key lengths
- TA158: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA222: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA880: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA158: DIACAP Notes [Updated]
- T61: Disable default accounts or change all default passwords
- TA65: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA159: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA840: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA65: MDS2 Notes [Updated]
- T62: Protect passwords in property and configuration files
- TA66: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA2912: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA66: MDS2 Notes [Updated]
- T65: Restrict accepted HTTP verbs
- TA2913: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2913: ASD-STIG requirements [Updated]
- T68: Encrypt credit card PANs in storage
- TA67: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA160: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA223: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA2914: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA67: MDS2 Notes [Updated]
- T69: Strong password requirements for server-to-server system accounts
- TA68: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA161: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA2915: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA68: MDS2 Notes [Updated]
- T70: Implement account lockout or authentication throttling for system accounts
- TA69: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA162: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA2916: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA69: MDS2 Notes [Updated]
- T71: Capture sufficient information for each transaction in audit logs
- TA70: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA163: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA856: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA70: MDS2 Notes [Updated]
- T72: Use safe arithmetic to avoid integer overflow
- TA2917: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2917: ASD-STIG requirements [Updated]
- T73: Use random delays in authentication failures
- TA71: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA2918: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA71: MDS2 Notes [Updated]
- T74: Avoid HTTP parameter pollution
- TA2919: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2919: ASD-STIG requirements [Updated]
- T76: Do not hard code passwords
- TA72: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA877: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA72: MDS2 Notes [Updated]
- T77: Test for single-factor authentication
- TA73: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA224: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA248: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA73: MDS2 Notes [Updated]
- T78: Test strength of password reset mechanism
- TA74: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA74: MDS2 Notes [Updated]
- T79: Test password change functions
- TA75: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA75: MDS2 Notes [Updated]
- T80: Test password requirements
- TA76: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA164: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA225: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA76: MDS2 Notes [Updated]
- T81: Test account lockout
- TA77: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA165: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA77: MDS2 Notes [Updated]
- T82: Test authentication error consistency
- TA78: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA78: MDS2 Notes [Updated]
- T83: Verify transactional authorization and screening
- TA79: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA249: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA79: MDS2 Notes [Updated]
- T86: Test session ID uniqueness and rotation after authentication
- TA80: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA80: MDS2 Notes [Updated]
- T87: Verify that all data in transit is encrypted using a secure TLS channel
- TA81: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA166: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA250: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA81: MDS2 Notes [Updated]
- T90: Test idle session timeout
- TA82: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA167: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA226: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA82: MDS2 Notes [Updated]
- T107: Test that application forbids uploading or transferring malware
- TA83: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA168: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA5238: ISASecure CSA 311 requirements: Levels (1, 2, 3, 4), Components (Embedded Device) [Updated]
- INFO: Updated the text.
- TA83: MDS2 Notes [Updated]
- T114: Test system-to-system authentication lockout or throttling
- TA84: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA169: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA84: MDS2 Notes [Updated]
- T124: Test for authentication timing vulnerability
- TA85: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA85: MDS2 Notes [Updated]
- T131: Test for forced password change upon login
- TA86: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA86: MDS2 Notes [Updated]
- T133: Mask credit card PAN numbers when displayed
- TA227: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA2954: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA227: PCI/PA DSS Notes [Updated]
- T134: Do not send unprotected PANs in emails or text messages
- TA87: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA228: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA87: MDS2 Notes [Updated]
- T135: Assign each person using the system a unique user ID
- TA88: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA170: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA229: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA866: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA88: MDS2 Notes [Updated]
- T136: Do not store sensitive credit card data
- TA230: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA2955: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA230: PCI/PA DSS Notes [Updated]
- T137: Encrypt protected health information in storage [Updated]
- INFO: Updated the priority.
- TA89: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA171: DIACAP Notes [Updated]
- INFO: Updated the title.
- T139: Use secure channels to transmit protected health information on the Internet [Updated]
- INFO: Updated the priority.
- TA90: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA172: DIACAP Notes [Updated]
- INFO: Updated the title.
- T143: Apply minimum password standards for mobile environments
- TA91: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA173: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA2957: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA91: MDS2 Notes [Updated]
- T144: Do not rely on client for account lockout or authentication throttling
- TA92: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA2958: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA92: MDS2 Notes [Updated]
- T145: Avoid client-side authorization for mobile clients
- TA2959: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2959: ASD-STIG requirements [Updated]
- T146: Use encryption for network communications in mobile environments
- TA93: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA174: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA2960: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA93: MDS2 Notes [Updated]
- T148: Avoid caching confidential data on client
- TA900: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA900: ASD-STIG requirements [Updated]
- T150: Validate data received from server before handling
- TA95: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA2961: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA95: MDS2 Notes [Updated]
- T151: Use cryptographically secure random numbers
- TA894: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA894: ASD-STIG requirements [Updated]
- T152: Avoid asking for and using excessive permissions
- TA843: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA843: ASD-STIG requirements [Updated]
- T153: Scrub buffers holding sensitive information when releasing/deleting
- TA175: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA2962: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA175: DIACAP Notes [Updated]
- T154: Do not store or cache credit card information on client
- TA96: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA231: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA2963: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA96: MDS2 Notes [Updated]
- T155: Avoid storing sensitive logs on the client
- TA2964: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2964: ASD-STIG requirements [Updated]
- T156: Validate certificate and its chain of trust properly
- TA97: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA876: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA97: MDS2 Notes [Updated]
- T158: Verify integrity of client-supplied read-only data from rich clients
- TA891: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA891: ASD-STIG requirements [Updated]
- T159: Follow best practices for secure error and exception handling
- TA232: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA893: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA232: PCI/PA DSS Notes [Updated]
- T160: Avoid relying on jailbreak or root detection as a strong security measure
- TA2965: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2965: ASD-STIG requirements [Updated]
- T161: Treat unique device IDs as personal information
- TA2966: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2966: ASD-STIG requirements [Updated]
- T163: Handle health data securely [Updated]
- INFO: Updated the priority.
- TA98: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA176: DIACAP Notes [Updated]
- INFO: Updated the title.
- T164: Clear session information from client upon logout
- TA850: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA850: ASD-STIG requirements [Updated]
- T165: Do not rely on Unique Device ID values in security controls
- TA99: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA99: MDS2 Notes [Updated]
- T168: Prevent auto-snapshot from saving sensitive data (iOS)
- TA2967: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2967: ASD-STIG requirements [Updated]
- T173: Test that user data is transmitted over secure channel in mobile environment
- TA101: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA177: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA101: MDS2 Notes [Updated]
- T175: Test that the client validates digital certificates [Updated]
- INFO: Updated the text.
- T176: Apply principles of privacy when handling personal information [Updated]
- INFO: Updated the text.
- TA2972: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T177: Allow users to review and update their personal information
- TA6230: California Civil Code: Requests to know [Added]
- T178: Obtain consent from users prior to collecting personal information
- TA2973: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2973: ASD-STIG requirements [Updated]
- T179: Allow access for users to remove their personal information from the system
- TA2863: California Civil Code: Requests to delete [Updated]
- INFO: Updated the title and text.
- TA2863: California Civil Code: Requests to delete [Updated]
- T184: Perform authorization checks on RESTful web services
- TA2974: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2974: ASD-STIG requirements [Updated]
- T185: Follow best practices to secure SAML implementations
- TA2975: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2975: ASD-STIG requirements [Updated]
- T186: Use recommended settings and the latest patches for third party libraries and software
- TA102: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA863: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA102: MDS2 Notes [Updated]
- T193: Review non-categorized/miscellaneous findings from automated analysis
- TA178: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA2977: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA178: DIACAP Notes [Updated]
- T194: Obtain user consent for tracking cookies [Updated]
- INFO: Updated the priority.
- T197: Encrypt and sign any remote code/update and then validate the signature to verify its origin and integrity
- TA103: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA179: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA251: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA882: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA103: MDS2 Notes [Updated]
- T202: Prevent buffer overflow/underflow
- TA909: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA909: ASD-STIG requirements [Updated]
- T205: Avoid inter-process race conditions
- TA883: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA883: ASD-STIG requirements [Updated]
- T207: Provide special data protection for children's personal information [Updated]
- INFO: Updated the priority.
- TA2979: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T210: Encrypt sensitive data during transmission for rich clients
- TA104: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA180: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA2980: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA104: MDS2 Notes [Updated]
- T214: Protect confidential files on operating system or server [Updated]
- INFO: Updated the priority.
- TA2981: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T217: Use compiler settings to mitigate buffer overflows
- TA2982: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2982: ASD-STIG requirements [Updated]
- T219: Avoid transmitting confidential data through URL parameters
- TA2983: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2983: ASD-STIG requirements [Updated]
- T220: Verify that user password is salted and hashed
- TA105: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA181: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA105: MDS2 Notes [Updated]
- T222: Verify server-to-server authentication
- TA106: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA106: MDS2 Notes [Updated]
- T225: Test that password fields are masked by default
- TA107: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA107: MDS2 Notes [Updated]
- T229: Verify that logs do not contain confidential data
- TA108: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA108: MDS2 Notes [Updated]
- T230: Test that sever-to-server system accounts meet minimum password requirements
- TA109: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA182: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA109: MDS2 Notes [Updated]
- T232: Verify that end-user transaction logs capture sufficient information
- TA110: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA183: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA252: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA110: MDS2 Notes [Updated]
- T233: Verify that each person using the system is assigned a unique user ID
- TA111: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA184: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA111: MDS2 Notes [Updated]
- T235: Verify that application does not store protected health information insecurely
- TA185: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA185: DIACAP Notes [Updated]
- T236: Test that the application encrypts protected health information on the Internet
- TA112: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA186: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA112: MDS2 Notes [Updated]
- T241: Verify that third party libraries use secure settings and the latest patches
- TA113: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA113: MDS2 Notes [Updated]
- T243: Check the authenticity and integrity of received SOAP messages
- TA114: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA853: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA114: MDS2 Notes [Updated]
- T244: Securely delete any unprotected sensitive data before a resource is released or shared
- TA187: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA233: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA886: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA187: DIACAP Notes [Updated]
- T245: Verify that sensitive unprotected data is securely deleted
- TA188: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA234: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA188: DIACAP Notes [Updated]
- T246: Control access to encrypted volumes independent of native operating system
- TA235: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA2998: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA235: PCI/PA DSS Notes [Updated]
- T248: Protect secret keys and passwords in the application
- TA189: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA236: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA875: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA189: DIACAP Notes [Updated]
- T249: Verify that keys and passwords are protected in the application
- TA190: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA237: PCI/PA DSS Notes [Updated]
- INFO: Updated the title.
- TA190: DIACAP Notes [Updated]
- T252: Configure XML parsers for secure processing
- TA3001: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3001: ASD-STIG requirements [Updated]
- T257: Secure cross origin resource sharing (CORS)
- TA3004: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3004: ASD-STIG requirements [Updated]
- T259: Follow best practices when storing data in Local or Session Storage
- TA117: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA191: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA3005: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA117: MDS2 Notes [Updated]
- T261: Manage iOS Pasteboards that are used with sensitive data
- TA3006: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3006: ASD-STIG requirements [Updated]
- T262: Mask passwords by default on mobiles but consider usability options
- TA118: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA3007: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA118: MDS2 Notes [Updated]
- T263: Test that password fields are masked by default on mobiles and usability improvement options are implemented
- TA119: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA119: MDS2 Notes [Updated]
- T264: Do not use method swizzling in Objective-C
- TA3009: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3009: ASD-STIG requirements [Updated]
- T270: Follow best practices for storing application data on Android devices
- TA120: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA192: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA3010: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA120: MDS2 Notes [Updated]
- T275: Avoid sending sensitive data using implicit Intents or Broadcasts
- TA3011: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3011: ASD-STIG requirements [Updated]
- T276: Validate the content of received Intents
- TA3012: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3012: ASD-STIG requirements [Updated]
- T279: Avoid dynamically loading any code without proper security considerations
- TA3013: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3013: ASD-STIG requirements [Updated]
- T282: Bind variables in SQL statements for client applications
- TA3014: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3014: ASD-STIG requirements [Updated]
- T286: Make sure username rules are consistent among the registration system, authentication system, and application
- TA121: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA3016: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA121: MDS2 Notes [Updated]
- T287: Test that usernames are handled consistently by registration system, authentication system and application
- TA122: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA122: MDS2 Notes [Updated]
- T288: Prevent unauthorized access to information through XML external references
- TA3018: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3018: ASD-STIG requirements [Updated]
- T295: Avoid storing unencrypted confidential data without access control mechanisms
- TA123: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA193: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA3020: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA123: MDS2 Notes [Updated]
- T296: Test that unencrypted confidential data is not stored without access control mechanisms
- TA124: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA194: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA124: MDS2 Notes [Updated]
- T301: Verify that buffers holding sensitive information are scrubbed
- TA195: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA195: DIACAP Notes [Updated]
- T302: Test that sensitive data is transmitted over secure channel for rich clients
- TA125: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA196: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA125: MDS2 Notes [Updated]
- T309: Verify that data received from server is validated before handling
- TA126: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA126: MDS2 Notes [Updated]
- T313: Identify and classify categories of personal information
- TA127: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA3032: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA127: MDS2 Notes [Updated]
- T314: Verify that personal and confidential information is identified and classified
- TA128: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA128: MDS2 Notes [Updated]
- T315: Verify that potential security-critical events are logged
- TA197: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA197: DIACAP Notes [Updated]
- T316: Prevent unauthorized access to information through keyboard caches and shared dictionaries
- TA3035: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3035: ASD-STIG requirements [Updated]
- T321: Verify that Local and Session Storage are securely used
- TA129: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA198: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA129: MDS2 Notes [Updated]
- T322: Include HTTP Strict-Transport-Security headers in HTTPS responses
- TA3039: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3039: ASD-STIG requirements [Updated]
- T323: Test that default accounts are disabled or default passwords are changed
- TA130: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA199: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA130: MDS2 Notes [Updated]
- T327: Review security of Node.js modules before installation
- TA3041: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3041: ASD-STIG requirements [Updated]
- T335: Sanitize user input before passing to NoSQL operators
- TA3043: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3043: ASD-STIG requirements [Updated]
- T337: Include a 'break glass' feature that enables emergency functions
- TA131: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA3483: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA131: MDS2 Notes [Updated]
- T338: Control access to resources through user authentication and authorization
- TA132: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA200: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA253: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA841: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA132: MDS2 Notes [Updated]
- T340: Use an account and identity management system
- TA133: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA201: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA3484: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA133: MDS2 Notes [Updated]
- T341: Test that certificate validation and subject identification are properly performed in PKI based authentication [Deactivated]
- T342: Inform and warn users about using critical system services
- TA202: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA3047: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA202: DIACAP Notes [Updated]
- T343: Test that proper system use notification is displayed or sent for critical features
- TA203: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA203: DIACAP Notes [Updated]
- T344: Enforce different rules for access to the system based on the origin, type and medium of request
- TA135: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA3049: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA5450: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA135: MDS2 Notes [Updated]
- T345: Check the integrity of critical configuration and data files
- TA136: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA3050: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA136: MDS2 Notes [Updated]
- T346: Test that the integrity of important configuration and data files are checked
- TA137: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA137: MDS2 Notes [Updated]
- T347: Fail to a known state with predefined outputs
- TA899: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA899: ASD-STIG requirements [Updated]
- T349: Protect audit information and logs against unauthorized access
- TA204: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA254: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA859: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA204: DIACAP Notes [Updated]
- T350: Verify that audit information is sufficiently protected
- TA205: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA255: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA205: DIACAP Notes [Updated]
- T353: Control the inbound and outbound data flow across the boundaries of zones
- TA206: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA842: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA206: DIACAP Notes [Updated]
- T355: Verify that inbound/outbound traffic is properly filtered
- TA207: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA207: DIACAP Notes [Updated]
- T356: Break the system into zones and design the conduits
- TA864: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA864: ASD-STIG requirements [Updated]
- T360: Partition the application in a way that facilitates adoption of a zoning model
- TA902: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA902: ASD-STIG requirements [Updated]
- T363: Design a priority scheme for application services and operations
- TA208: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA3056: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA208: DIACAP Notes [Updated]
- T364: Enable secure backup and restore capabilities
- TA138: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA209: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA865: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA138: MDS2 Notes [Updated]
- T365: Verify the security of backing up and restoring procedures
- TA139: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA210: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA139: MDS2 Notes [Updated]
- T367: Mitigate the security risks of power cut and power supply switch
- TA212: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA890: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA212: DIACAP Notes [Updated]
- T368: Test system/application security in the event of a power cut or power supply switch
- TA213: DIACAP Notes [Updated]
- INFO: Updated the title.
- TA213: DIACAP Notes [Updated]
- T370: Follow best practices for using third-party software libraries/modules and open source/COTS components [Updated]
- INFO: Updated the text.
- TA141: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA861: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T371: Provide unified and manageable interfaces for security settings and configuration parameters
- TA142: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA845: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA142: MDS2 Notes [Updated]
- T373: Design and regulate access to unauthenticated parts of the application
- TA3059: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3059: ASD-STIG requirements [Updated]
- T377: De-identify protected health information before using it for a secondary purpose
- TA144: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA144: MDS2 Notes [Updated]
- T378: Authorize every request for data objects
- TA3060: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3060: ASD-STIG requirements [Updated]
- T379: Provide sufficient documentation for security-related features
- TA6234: Define security policies (NIST-SSDF) [Added]
- TA145: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA256: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA885: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T380: Verify that security documents are complete
- TA146: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA257: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA146: MDS2 Notes [Updated]
- T381: Test break-glass procedures
- TA147: MDS2 Notes [Updated]
- INFO: Updated the title.
- TA147: MDS2 Notes [Updated]
- T394: Secure one-time passwords (OTP)
- TA258: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA873: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA258: EBA-Security of Internet Payments Notes [Updated]
- T395: Verify that one-time passwords (OTP) are securely used
- TA259: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA259: EBA-Security of Internet Payments Notes [Updated]
- T396: Set maximum limits for authorized transactions
- TA260: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA3064: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA260: EBA-Security of Internet Payments Notes [Updated]
- T397: Test the limits of authorized transactions
- TA261: EBA-Security of Internet Payments Notes [Updated]
- INFO: Updated the title.
- TA261: EBA-Security of Internet Payments Notes [Updated]
- T399: Separate delegated payment pages from the rest of the application
- TA3066: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3066: ASD-STIG requirements [Updated]
- T415: Develop features to allow verifying the authenticity of the product
- TA3069: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3069: ASD-STIG requirements [Updated]
- T425: Check the authenticity of external devices/applications
- TA868: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA868: ASD-STIG requirements [Updated]
- T427: Implement previous logon (access) notification
- TA848: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA848: ASD-STIG requirements [Updated]
- T429: Limit the number of concurrent sessions for each account
- TA849: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA849: ASD-STIG requirements [Updated]
- T431: Design a response to logging failures and other minor failures
- TA858: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA858: ASD-STIG requirements [Updated]
- T433: Design a fallback mechanism or a degraded mode for the system
- TA3075: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3075: ASD-STIG requirements [Updated]
- T437: Include log reduction and report generation capabilities
- TA857: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA857: ASD-STIG requirements [Updated]
- T451: Disable index and search capabilities for confidential content on iOS
- TA3081: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3081: ASD-STIG requirements [Updated]
- T453: Perform security function verification on a regular basis
- TA903: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA903: ASD-STIG requirements [Updated]
- T456: Change default security settings to the most stringent ones and disable unnecessary services and modules
- TA862: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA862: ASD-STIG requirements [Updated]
- T459: Remove factory default reset button or key metadata used for IoT device registration
- TA3085: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3085: ASD-STIG requirements [Updated]
- T468: Develop an RFID usage, safety, and privacy policy
- TA3087: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3087: ASD-STIG requirements [Updated]
- T485: Sign audit records for non-repudiation
- TA3089: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3089: ASD-STIG requirements [Updated]
- T502: Limit MQTT broker resource consumption
- TA3091: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3091: ASD-STIG requirements [Updated]
- T504: Check the integrity of MQTT messages
- TA3093: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3093: ASD-STIG requirements [Updated]
- T514: Prevent formula injection in CSV/Excel files
- TA3094: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3094: ASD-STIG requirements [Updated]
- T515: Limit resource consumption of outgoing HTTP requests sent to external user-defined webhooks
- TA3095: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3095: ASD-STIG requirements [Updated]
- T517: Protect user registration and account modification pages against user enumeration
- TA3097: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3097: ASD-STIG requirements [Updated]
- T520: Design secure SOAP web services
- TA854: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA854: ASD-STIG requirements [Updated]
- T521: Protect the ZigBee network infrastructure with a Network Key
- TA3100: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3100: ASD-STIG requirements [Updated]
- T536: Restrict the size of incoming messages in services
- TA3102: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3102: ASD-STIG requirements [Updated]
- T544: Anonymize (de-identify) identifying information before using it for a secondary purpose [Updated]
- INFO: Updated the priority.
- T553: Design secure RESTful web services
- TA3105: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3105: ASD-STIG requirements [Updated]
- T555: Acquire a secret token from users for signing the payload of webhook notifications
- TA3107: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3107: ASD-STIG requirements [Updated]
- T558: Authenticate all other components before any network communication with them
- TA869: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA869: ASD-STIG requirements [Updated]
- T562: Consider Doze, Standby, and battery saving limitations when developing Android applications
- TA3110: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3110: ASD-STIG requirements [Updated]
- T566: Enable network layer encryption for local area network communications
- TA3112: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3112: ASD-STIG requirements [Updated]
- T567: Enable network access control for local area network communications
- TA3113: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3113: ASD-STIG requirements [Updated]
- T569: Prevent parameter tampering in web services
- TA3114: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3114: ASD-STIG requirements [Updated]
- T570: Sign the parent tag of the SAML assertion before forwarding
- TA3115: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3115: ASD-STIG requirements [Updated]
- T571: Validate SAML assertions
- TA855: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA855: ASD-STIG requirements [Updated]
- T574: Prevent information exposure in HyperCat
- TA3116: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3116: ASD-STIG requirements [Updated]
- T580: Validate return codes in mainframe programs
- TA884: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA884: ASD-STIG requirements [Updated]
- T582: Secure SYSABEND, SYSUDUMP, or SNAP dumps in mainframe
- TA3120: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3120: ASD-STIG requirements [Updated]
- T584: Implement update capabilities for your application
- TA3122: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3122: ASD-STIG requirements [Updated]
- T586: Implement Secure Boot if possible
- TA3123: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3123: ASD-STIG requirements [Updated]
- T604: Implement a consent withdrawal mechanism [Updated]
- INFO: Updated the priority.
- T608: Obfuscate your executables
- TA3133: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3133: ASD-STIG requirements [Updated]
- T609: Protect your application against debuggers
- TA3134: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3134: ASD-STIG requirements [Updated]
- T613: Mitigate DDoS attacks with NGINX
- TA3135: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3135: ASD-STIG requirements [Updated]
- T615: Check your mobile application's integrity and installation source
- TA3136: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3136: ASD-STIG requirements [Updated]
- T617: Do not rely on APN for delivering critical notifications
- TA3137: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3137: ASD-STIG requirements [Updated]
- T620: Use SSL/TLS offloading, encryption and certificates with NGINX
- TA3138: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3138: ASD-STIG requirements [Updated]
- T622: Assign a random revocable token to actions and achievements in the game
- TA3139: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3139: ASD-STIG requirements [Updated]
- T624: Implement a verifiable log for the game
- TA3141: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3141: ASD-STIG requirements [Updated]
- T639: Use secure functions to load DLL files
- TA3143: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3143: ASD-STIG requirements [Updated]
- T640: Design and implement some rootkit detection techniques
- TA3144: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3144: ASD-STIG requirements [Updated]
- T641: Limit resource consumption of WebSocket connections
- TA3145: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3145: ASD-STIG requirements [Updated]
- T643: Implement certificate pinning in a hostile environment
- TA3147: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3147: ASD-STIG requirements [Updated]
- T663: Avoid the use of the 'root' account (AWS) [Updated]
- INFO: Updated the title.
- I592: How to avoid the use of the "root" account (AWS) [Updated]
- INFO: Updated the title.
- T664: Enable multi-factor authentication (MFA) for all IAM users that have a console password (AWS) [Updated]
- INFO: Updated the title.
- I593: How to enable multi-factor authentication (MFA) for all IAM users that have a console password (AWS) [Updated]
- INFO: Updated the title.
- T665: Disable credentials unused for 90 days or greater (AWS) [Updated]
- INFO: Updated the title.
- I594: How to disable credentials unused for 90 days or greater (AWS) [Updated]
- INFO: Updated the title.
- P840: Not disabling inactive user accounts (AWS) [Updated]
- INFO: Updated the title.
- T666: Rotate access keys every 90 days or less (AWS) [Updated]
- INFO: Updated the title.
- I595: How to rotate access keys every 90 days or less (AWS) [Updated]
- INFO: Updated the title.
- P161: Password Aging with Long Expiration [Updated]
- INFO: Updated the title.
- T667: Apply minimum IAM password policy requirements (AWS) [Updated]
- INFO: Updated the title.
- I596: How to apply minimum IAM password policy requirements (AWS) [Updated]
- INFO: Updated the title.
- T671: Enable multi-factor authentication for the 'root' account (AWS) [Updated]
- INFO: Updated the title.
- I600: How to enable MFA for the "root" account (AWS) [Updated]
- INFO: Updated the title.
- T672: Register security questions in the AWS account (AWS) [Updated]
- INFO: Updated the title.
- I601: How to register security questions in the AWS account (AWS) [Updated]
- INFO: Updated the title.
- P847: No backup of passwords and no secondary ways of accessing accounts (AWS) [Updated]
- INFO: Updated the title.
- T673: Attach IAM policies only to groups or roles (AWS) [Updated]
- INFO: Updated the title.
- I602: How to attach IAM policies only to groups or roles (AWS) [Updated]
- INFO: Updated the title.
- T676: Maintain current contact details (AWS) [Updated]
- INFO: Updated the title.
- I605: How to maintain current contact details (AWS) [Updated]
- INFO: Updated the title.
- P856: Improper contact details associated to account (AWS) [Updated]
- INFO: Updated the title.
- T677: Register security contact information (AWS) [Updated]
- INFO: Updated the title.
- I606: How to register security contact information (AWS) [Updated]
- INFO: Updated the title.
- P857: Lack of registered security contact information (AWS) [Updated]
- INFO: Updated the title.
- T678: Create a support role to manage incidents with AWS Support (AWS) [Updated]
- INFO: Updated the title.
- I607: How to create a support role to manage incidents with AWS Support (AWS) [Updated]
- INFO: Updated the title.
- P844: No support role or insufficient permissions to manage incidents (AWS) [Updated]
- INFO: Updated the title.
- T679: Do not set up access keys during initial IAM user setup (AWS) [Updated]
- INFO: Updated the title.
- I608: How to do delete access keys that are created during initial IAM user setup (AWS) [Updated]
- INFO: Updated the title.
- P845: Generating unnecessary access keys during initial IAM user setup (AWS) [Updated]
- INFO: Updated the title.
- T680: Do not create IAM policies that allow full administrative privileges (AWS) [Updated]
- INFO: Updated the title.
- I609: How to delete IAM policies that allow full administrative privileges (AWS) [Updated]
- INFO: Updated the title.
- T681: Enable CloudTrail in all regions (AWS) [Updated]
- INFO: Updated the title.
- I610: How to enable CloudTrail in all regions (AWS) [Updated]
- INFO: Updated the title.
- P846: Lack of CloudTrail logs for all regions (AWS) [Updated]
- INFO: Updated the title.
- T682: Make S3 bucket CloudTrail logs publicly inaccessible (AWS) [Updated]
- INFO: Updated the title.
- I611: How to make S3 bucket CloudTrail logs publicly inaccessible (AWS) [Updated]
- INFO: Updated the title.
- P848: Unauthorized access to CloudTrail log content (AWS) [Updated]
- INFO: Updated the title.
- T683: Integrate CloudTrail logs with CloudWatch Logs for real-time analysis (AWS) [Updated]
- INFO: Updated the title.
- I612: How to integrate CloudTrail logs with CloudWatch Logs for real-time analysis (AWS) [Updated]
- INFO: Updated the title.
- P849: Nonintegrated CloudTrail trails with CloudWatch Logs (AWS) [Updated]
- INFO: Updated the title.
- T684: Enable AWS Config in all regions (AWS) [Updated]
- INFO: Updated the title.
- I613: How to enable AWS Config in all regions (AWS) [Updated]
- INFO: Updated the title.
- P851: Disabled AWS Config (AWS) [Updated]
- INFO: Updated the title.
- T685: Enable S3 bucket access logging on the CloudTrail S3 bucket (AWS) [Updated]
- INFO: Updated the title.
- I614: How to enable S3 bucket access logging on the CloudTrail S3 bucket (AWS) [Updated]
- INFO: Updated the title.
- P852: Disabled S3 bucket logging on target S3 buckets (AWS) [Updated]
- INFO: Updated the title.
- T686: Create log metrics and alarms (AWS) [Updated]
- INFO: Updated the title.
- I615: How to create log metrics and alarms (AWS) [Updated]
- INFO: Updated the title.
- I626: How to create log metrics and alarms (AWS) - In-depth controls [Updated]
- INFO: Updated the title.
- T688: Apply security group requirements (AWS) [Updated]
- INFO: Updated the title.
- I617: How to apply security group requirements (AWS) [Updated]
- INFO: Updated the title.
- P839: Unrestricted connectivity to remote console services (AWS) [Updated]
- INFO: Updated the title.
- T689: Enable hardware multi-factor authentication (MFA) for the 'root' account (AWS) [Updated]
- INFO: Updated the title.
- I618: How to enable hardware multi-factor authentication (MFA) for the "root" account (AWS) [Updated]
- INFO: Updated the title.
- P841: Missing hardware multi-factor authentication (MFA) (AWS) [Updated]
- INFO: Updated the title.
- T690: Use IAM instance roles for resource access from instances (AWS) [Updated]
- INFO: Updated the title.
- I619: How to use IAM instance roles for resource access from instances (AWS) [Updated]
- INFO: Updated the title.
- P842: Failing to properly use AWS IAM roles (AWS) [Updated]
- INFO: Updated the title.
- T691: Enable CloudTrail log file validation (AWS) [Updated]
- INFO: Updated the title.
- I620: How to enable CloudTrail log file validation (AWS) [Updated]
- INFO: Updated the title.
- P843: Unsecure use of CloudTrail logs (AWS) [Updated]
- INFO: Updated the title.
- T692: Encrypt CloudTrail logs at rest using KMS CMKs (AWS) [Updated]
- INFO: Updated the title.
- I621: How to encrypt CloudTrail logs at rest using KMS CMKs (AWS) [Updated]
- INFO: Updated the title.
- P843: Unsecure use of CloudTrail logs (AWS) [Updated]
- INFO: Updated the title.
- T693: Enable rotation for customer created CMKs (AWS) [Updated]
- INFO: Updated the title.
- I622: How to enable rotation for customer created CMKs (AWS) [Updated]
- INFO: Updated the title.
- P850: Missing rotation for encryption keys (AWS) [Updated]
- INFO: Updated the title.
- T694: Enable VPC flow logging in all VPCs (AWS) [Updated]
- INFO: Updated the title.
- I623: How to enable VPC flow logging in all VPCs (AWS) [Updated]
- INFO: Updated the title.
- T695: Restrict all traffic in the default security group of every VPC (AWS) [Updated]
- INFO: Updated the title.
- I624: How to restrict all traffic in the default security group of every VPC (AWS) [Updated]
- INFO: Updated the title.
- T696: Change routing tables for VPC peering to 'least access' (AWS) [Updated]
- INFO: Updated the title.
- I625: How to change routing tables for VPC peering to "least access" (AWS) [Updated]
- INFO: Updated the title.
- T697: Test that 'root' account is not used (AWS) [Updated]
- INFO: Updated the title.
- T698: Test that multi-factor authentication (MFA) is enabled for all IAM users that have a console password (AWS) [Updated]
- INFO: Updated the title.
- T699: Test that credentials unused for 90 days or greater are disabled (AWS) [Updated]
- INFO: Updated the title.
- P840: Not disabling inactive user accounts (AWS) [Updated]
- INFO: Updated the title.
- T700: Test that access keys are rotated every 90 days or less (AWS) [Updated]
- INFO: Updated the title.
- P161: Password Aging with Long Expiration [Updated]
- INFO: Updated the title.
- T701: Test that minimum IAM password policy requirements are applied (AWS) [Updated]
- INFO: Updated the title.
- T705: Test that multi-factor authentication is enabled for the 'root' account (AWS) [Updated]
- INFO: Updated the title.
- T706: Test that security questions are registered in the AWS account (AWS) [Updated]
- INFO: Updated the title.
- P847: No backup of passwords and no secondary ways of accessing accounts (AWS) [Updated]
- INFO: Updated the title.
- T707: Test that IAM policies are attached only to groups or roles (AWS) [Updated]
- INFO: Updated the title.
- T710: Verify that contact details are current (AWS) [Updated]
- INFO: Updated the title.
- P856: Improper contact details associated to account (AWS) [Updated]
- INFO: Updated the title.
- T711: Verify that security contact information is registered (AWS) [Updated]
- INFO: Updated the title.
- P857: Lack of registered security contact information (AWS) [Updated]
- INFO: Updated the title.
- T712: Test if a support role has been created to manage incidents with AWS Support (AWS) [Updated]
- INFO: Updated the title.
- P844: No support role or insufficient permissions to manage incidents (AWS) [Updated]
- INFO: Updated the title.
- T713: Test if access keys have been created during initial IAM user setup (AWS) [Updated]
- INFO: Updated the title.
- P845: Generating unnecessary access keys during initial IAM user setup (AWS) [Updated]
- INFO: Updated the title.
- T714: Test if any IAM policy exists that allows full administrative privileges (AWS) [Updated]
- INFO: Updated the title.
- T715: Test if CloudTrail is enabled in all regions (AWS) [Updated]
- INFO: Updated the title.
- P846: Lack of CloudTrail logs for all regions (AWS) [Updated]
- INFO: Updated the title.
- T716: Test if S3 bucket CloudTrail logs are not publicly accessible (AWS) [Updated]
- INFO: Updated the title.
- P848: Unauthorized access to CloudTrail log content (AWS) [Updated]
- INFO: Updated the title.
- T717: Test that CloudTrail trails are integrated with CloudWatch Logs (AWS) [Updated]
- INFO: Updated the title.
- P849: Nonintegrated CloudTrail trails with CloudWatch Logs (AWS) [Updated]
- INFO: Updated the title.
- T718: Test if AWS Config is enabled in all regions (AWS) [Updated]
- INFO: Updated the title.
- P851: Disabled AWS Config (AWS) [Updated]
- INFO: Updated the title.
- T719: Test if S3 bucket access logging is enabled on the CloudTrail S3 bucket (AWS) [Updated]
- INFO: Updated the title.
- P852: Disabled S3 bucket logging on target S3 buckets (AWS) [Updated]
- INFO: Updated the title.
- T720: Test that log metrics and alarms are created (AWS) [Updated]
- INFO: Updated the title.
- T722: Test Security Group requirements (AWS) [Updated]
- INFO: Updated the title.
- P839: Unrestricted connectivity to remote console services (AWS) [Updated]
- INFO: Updated the title.
- T723: Test that hardware multi-factor authentication (MFA) is enabled for the 'root' account (AWS) [Updated]
- INFO: Updated the title.
- P841: Missing hardware multi-factor authentication (MFA) (AWS) [Updated]
- INFO: Updated the title.
- T724: Test that IAM instance roles are used for resource access from instances (AWS) [Updated]
- INFO: Updated the title.
- P842: Failing to properly use AWS IAM roles (AWS) [Updated]
- INFO: Updated the title.
- T725: Test that log file validation is enabled (AWS) [Updated]
- INFO: Updated the title.
- P843: Unsecure use of CloudTrail logs (AWS) [Updated]
- INFO: Updated the title.
- T726: Test that CloudTrail logs are encrypted at rest using KMS CMKs (AWS) [Updated]
- INFO: Updated the title.
- P843: Unsecure use of CloudTrail logs (AWS) [Updated]
- INFO: Updated the title.
- T727: Test that rotation is enabled for customer created CMKs (AWS) [Updated]
- INFO: Updated the title.
- P850: Missing rotation for encryption keys (AWS) [Updated]
- INFO: Updated the title.
- T728: Test that VPC flow logging is enabled in all VPCs (AWS) [Updated]
- INFO: Updated the title.
- T729: Test that the default security group of every VPC restricts all traffic (AWS) [Updated]
- INFO: Updated the title.
- T730: Test that routing tables for VPC peering are 'least access' (AWS) [Updated]
- INFO: Updated the title.
- T738: Determine the legal basis for transferring personal information [Updated]
- INFO: Updated the priority.
- T740: Provide personal information and its processing information to users in an appropriate format [Updated]
- INFO: Updated the text.
- T742: Implement technical measures to ensure the accuracy of personal information [Updated]
- INFO: Updated the priority.
- T744: Protect pseudonymized personal information [Updated]
- INFO: Updated the priority.
- T750: Limit personal information collection and processing to the specified purpose [Updated]
- INFO: Updated the priority.
- TA2864: California Civil Code: Service Provider obligations [Updated]
- INFO: Updated the title and text.
- T751: Provide users with a notification of personal information processing
- TA6228: California Civil Code: Privacy policy [Added]
- TA6229: California Civil Code: Notice of financial incentive [Added]
- TA847: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA2860: California Civil Code: Privacy notice [Updated]
- INFO: Updated the title and text.
- T753: Verify whether personal information is collected only for specified purposes [Updated]
- INFO: Updated the priority.
- T754: Enable the restriction of processing personal information of an individual for a specific purpose [Updated]
- INFO: Updated the priority.
- TA2865: California Civil Code: Requests to opt out of the sale of personal information [Updated]
- INFO: Updated the title and text.
- T755: Maintain a Data Processing Register or Record of Business Processing Activities [Updated]
- INFO: Updated the priority.
- T765: Authorize user before launching the iOS app via a widget
- TA3179: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3179: ASD-STIG requirements [Updated]
- T766: Configure the relational database service correctly (AWS) [Updated]
- INFO: Updated the title.
- I629: How to configure the relational database service correctly (AWS) [Updated]
- INFO: Updated the title.
- T767: Encrypt the sensitive Elastic Block Storage volumes (AWS) [Updated]
- INFO: Updated the title.
- I630: How to encrypt the sensitive Elastic Block Storage volumes (AWS) [Updated]
- INFO: Updated the title.
- P867: Encryption on the sensitive Elastic Block Storage volumes is disabled (AWS) [Updated]
- INFO: Updated the title.
- T768: Do not share sensitive Amazon Machine Images publicly (AWS) [Updated]
- INFO: Updated the title.
- I631: How to remove public launch permissions from Amazon Machine Images (AWS) [Updated]
- INFO: Updated the title.
- P868: Public Access to sensitive Amazon Machine Images (AWS) [Updated]
- INFO: Updated the title and match conditions.
- T769: Configure Web- and App-tier ELB correctly (AWS) [Updated]
- INFO: Updated the title.
- I632: How to configure Web- and App-tier ELB correctly (AWS) [Updated]
- INFO: Updated the title.
- I664: How to configure Web and App -tier ELB correctly (AWS) - In-depth controls [Updated]
- INFO: Updated the title.
- T770: Configure S3 buckets correctly (AWS) [Updated]
- INFO: Updated the title.
- I633: How to configure S3 buckets correctly (AWS) [Updated]
- INFO: Updated the title.
- P870: Misconfiguring S3 buckets (AWS) [Updated]
- INFO: Updated the title.
- T771: Create IAM roles and policies correctly for Amazon EC2 (AWS) [Updated]
- INFO: Updated the title.
- I634: How to create IAM roles and policies correctly for Amazon EC2 (AWS) [Updated]
- INFO: Updated the title.
- P871: IAM roles and policies are not created properly for Amazon EC2 (AWS) [Updated]
- INFO: Updated the title.
- T772: Configure Auto Scaling Group Launch correctly (AWS) [Updated]
- INFO: Updated the title.
- I635: How to configure Auto Scaling Group Launch correctly (AWS) [Updated]
- INFO: Updated the title.
- P872: Auto Scaling Group Launch is not configured correctly (AWS) [Updated]
- INFO: Updated the title.
- T773: Create separate IAM groups and policies for administration (AWS) [Updated]
- INFO: Updated the title.
- I636: How to create separate IAM groups and policies for administration (AWS) [Updated]
- INFO: Updated the title.
- P873: No separate IAM groups and policies for administration (AWS) [Updated]
- INFO: Updated the title.
- T775: Associate an Elastic Load Balancer to each sensitive Auto Scaling Group (AWS) [Updated]
- INFO: Updated the title.
- I638: How to associate an Elastic Load Balancer to each sensitive Auto Scaling Group (AWS) [Updated]
- INFO: Updated the title.
- P875: An Elastic Load Balancer Is Not Associated to Each Sensitive Auto Scaling Group (AWS) [Updated]
- INFO: Updated the title.
- T776: Ensure each Auto Scaling Group is configured for multiple Availability Zones (AWS) [Updated]
- INFO: Updated the title.
- I639: How to ensure each Auto Scaling Group is configured for multiple Availability Zones (AWS) [Updated]
- INFO: Updated the title.
- P876: Auto Scaling Group Is Not Configured Correctly for Multiple Availability Zones (AWS) [Updated]
- INFO: Updated the title.
- T777: Use an approved Amazon Machine Image in Auto Scaling Launch Configuration (AWS) [Updated]
- INFO: Updated the title.
- I640: How to use an approved Amazon Machine Image in Auto Scaling Launch Configuration (AWS) [Updated]
- INFO: Updated the title.
- P877: An Approved Amazon Machine Image Is Not Used in Auto Scaling Launch Configuration (AWS) [Updated]
- INFO: Updated the title and match conditions.
- T779: Ensure Billing Alerts are enabled for increments of X spend (AWS) [Updated]
- INFO: Updated the title.
- I642: How to ensure Billing Alerts are enabled for increments of X spend (AWS) [Updated]
- INFO: Updated the title.
- P879: Billing Alerts are disabled for increments of X spend (AWS) [Updated]
- INFO: Updated the title.
- T780: Enable AWS Elastic Load Balancer logging (AWS) [Updated]
- INFO: Updated the title.
- I643: How to enable AWS Elastic Load Balancer logging (AWS) [Updated]
- INFO: Updated the title.
- P880: Inactive AWS Elastic Load Balancer logging (AWS) [Updated]
- INFO: Updated the title.
- T781: Enable AWS CloudFront Logging (AWS) [Updated]
- INFO: Updated the title.
- I644: How to enable AWS CloudFront Logging (AWS) [Updated]
- INFO: Updated the title.
- T782: Create CloudWatch Log Groups (AWS) [Updated]
- INFO: Updated the title.
- I645: How to create CloudWatch Log Groups (AWS) [Updated]
- INFO: Updated the title.
- P882: CloudWatch Log Groups have same settings (AWS) [Updated]
- INFO: Updated the title.
- T783: Install an agent for AWS CloudWatch Logs within required Auto-Scaling Groups (AWS) [Updated]
- INFO: Updated the title.
- I646: How to install an agent for AWS CloudWatch Logs within required Auto-Scaling Groups (AWS) [Updated]
- INFO: Updated the title.
- P883: Insufficient monitoring of AWS logs within required Auto-Scaling Groups (AWS) [Updated]
- INFO: Updated the title.
- T784: Create required AWS Managed Config Rules (AWS) [Updated]
- INFO: Updated the title.
- I647: How to create required AWS Managed Config Rules (AWS) [Updated]
- INFO: Updated the title.
- P884: Failing to create required AWS Managed Config Rules (AWS) [Updated]
- INFO: Updated the title.
- T785: Use CloudFront Content Distribution Network (AWS) [Updated]
- INFO: Updated the title.
- I648: How to use CloudFront Content Distribution Network (AWS) [Updated]
- INFO: Updated the title.
- P885: Failing to use CloudFront Content Distribution Network (AWS) [Updated]
- INFO: Updated the title.
- T786: Create required subnets (AWS) [Updated]
- INFO: Updated the title.
- I649: How to create required subnets (AWS) [Updated]
- INFO: Updated the title.
- P886: Misconfiguration of VPCs and subnets (AWS) [Updated]
- INFO: Updated the title.
- T787: Create NAT gateways (AWS) [Updated]
- INFO: Updated the title.
- I650: How to create NAT gateways (AWS) [Updated]
- INFO: Updated the title.
- T789: Create and configure ELB Security Groups (AWS) [Updated]
- INFO: Updated the title.
- I652: How to create and configure ELB Security Groups (AWS) [Updated]
- INFO: Updated the title.
- P889: Misconfiguration of Security Groups (AWS) [Updated]
- INFO: Updated the title.
- T790: Create and configure Security Groups (AWS) [Updated]
- INFO: Updated the title.
- I653: How to create and configure Security Groups (AWS) [Updated]
- INFO: Updated the title.
- P889: Misconfiguration of Security Groups (AWS) [Updated]
- INFO: Updated the title.
- T791: Remove redundant Elastic / Public IP addresses (AWS) [Updated]
- INFO: Updated the title.
- I654: How to remove redundant Elastic / Public IP addresses (AWS) [Updated]
- INFO: Updated the title.
- P891: Redundant Elastic / Public IP addresses (AWS) [Updated]
- INFO: Updated the title.
- T792: Create required Customer Master Keys (AWS) [Updated]
- INFO: Updated the title.
- I655: How to create required Customer Master Keys (AWS) [Updated]
- INFO: Updated the title.
- P892: Lack of customer-managed Customer Master Keys (AWS) [Updated]
- INFO: Updated the title.
- T794: Extend all public Web-tier SSL/TLS certificates if required (AWS) [Updated]
- INFO: Updated the title.
- I657: How to extend all public Web-tier SSL/TLS certificates if required (AWS) [Updated]
- INFO: Updated the title.
- P894: Expired public SSL/TLS certificates (AWS) [Updated]
- INFO: Updated the title.
- T795: Configure CloudFront correctly (AWS) [Updated]
- INFO: Updated the title.
- I658: How to configure CloudFront correctly (AWS) [Updated]
- INFO: Updated the title.
- P895: Misconfiguration of CloudFront (AWS) [Updated]
- INFO: Updated the title.
- T796: Configure DNS for Root Domain (AWS) [Updated]
- INFO: Updated the title.
- I659: How to configure DNS for Root Domain (AWS) [Updated]
- INFO: Updated the title.
- P896: Misconfiguration of DNS for Root Domain (AWS) [Updated]
- INFO: Updated the title.
- T797: Make all RDS Databases private and ensure RDS instances are inside a VPC (AWS) [Updated]
- INFO: Updated the title.
- I660: How to make all RDS Databases private (AWS) [Updated]
- INFO: Updated the title.
- T798: Don't use the default VPC (AWS) [Updated]
- INFO: Updated the title.
- I661: How to change the default VPC (AWS) [Updated]
- INFO: Updated the title.
- P898: Using the default VPC (AWS) [Updated]
- INFO: Updated the title.
- T799: Test if the Relational Database Service is configured correctly (AWS) [Updated]
- INFO: Updated the title.
- T800: Test if the sensitive Elastic Block Storage volumes are encrypted (AWS) [Updated]
- INFO: Updated the title.
- P867: Encryption on the sensitive Elastic Block Storage volumes is disabled (AWS) [Updated]
- INFO: Updated the title.
- T801: Test if the sensitive Amazon Machine Images are shared publicly (AWS) [Updated]
- INFO: Updated the title.
- P868: Public Access to sensitive Amazon Machine Images (AWS) [Updated]
- INFO: Updated the title and match conditions.
- T802: Test if Web- and App-tier Elastic Load Balancing is correctly configured (AWS) [Updated]
- INFO: Updated the title.
- T803: Test if S3 buckets are configured correctly (AWS) [Updated]
- INFO: Updated the title.
- P870: Misconfiguring S3 buckets (AWS) [Updated]
- INFO: Updated the title.
- T804: Test if IAM roles and policies are created correctly for Amazon EC2 (AWS) [Updated]
- INFO: Updated the title.
- P871: IAM roles and policies are not created properly for Amazon EC2 (AWS) [Updated]
- INFO: Updated the title.
- T805: Test if Auto Scaling Group Launch is configured correctly (AWS) [Updated]
- INFO: Updated the title.
- P872: Auto Scaling Group Launch is not configured correctly (AWS) [Updated]
- INFO: Updated the title.
- T806: Test if separate IAM groups and policies are created for administration (AWS) [Updated]
- INFO: Updated the title.
- P873: No separate IAM groups and policies for administration (AWS) [Updated]
- INFO: Updated the title.
- T808: Test if an Elastic Load Balancer is associated to each sensitive Auto Scaling Group (AWS) [Updated]
- INFO: Updated the title.
- P875: An Elastic Load Balancer Is Not Associated to Each Sensitive Auto Scaling Group (AWS) [Updated]
- INFO: Updated the title.
- T809: Test if each Auto Scaling Group is configured for multiple Availability Zones (AWS) [Updated]
- INFO: Updated the title.
- P876: Auto Scaling Group Is Not Configured Correctly for Multiple Availability Zones (AWS) [Updated]
- INFO: Updated the title.
- T810: Test if an approved Amazon Machine Image is used in Auto Scaling Launch Configuration (AWS) [Updated]
- INFO: Updated the title.
- P877: An Approved Amazon Machine Image Is Not Used in Auto Scaling Launch Configuration (AWS) [Updated]
- INFO: Updated the title and match conditions.
- T812: Test if Billing Alerts are enabled for increments of X spend (AWS) [Updated]
- INFO: Updated the title.
- P879: Billing Alerts are disabled for increments of X spend (AWS) [Updated]
- INFO: Updated the title.
- T813: Test that AWS Elastic Load Balancer logging is enabled (AWS) [Updated]
- INFO: Updated the title.
- P880: Inactive AWS Elastic Load Balancer logging (AWS) [Updated]
- INFO: Updated the title.
- T814: Test that AWS CloudFront Logging is enabled (AWS) [Updated]
- INFO: Updated the title.
- T815: Test that CloudWatch Log Groups are created (AWS) [Updated]
- INFO: Updated the title.
- P882: CloudWatch Log Groups have same settings (AWS) [Updated]
- INFO: Updated the title.
- T816: Test that AWS CloudWatch Logs agent is installed within required Auto-Scaling Groups (AWS) [Updated]
- INFO: Updated the title.
- P883: Insufficient monitoring of AWS logs within required Auto-Scaling Groups (AWS) [Updated]
- INFO: Updated the title.
- T817: Test for required AWS Managed Config Rules (AWS) [Updated]
- INFO: Updated the title.
- P884: Failing to create required AWS Managed Config Rules (AWS) [Updated]
- INFO: Updated the title.
- T818: Test that CloudFront Content Distribution Network is used (AWS) [Updated]
- INFO: Updated the title.
- P885: Failing to use CloudFront Content Distribution Network (AWS) [Updated]
- INFO: Updated the title.
- T819: Test the configuration of VPCs and subnets (AWS) [Updated]
- INFO: Updated the title.
- P886: Misconfiguration of VPCs and subnets (AWS) [Updated]
- INFO: Updated the title.
- T822: Test the configuration of ELB Security Groups (AWS) [Updated]
- INFO: Updated the title.
- P889: Misconfiguration of Security Groups (AWS) [Updated]
- INFO: Updated the title.
- T823: Test the configuration of Security Groups (AWS) [Updated]
- INFO: Updated the title.
- P889: Misconfiguration of Security Groups (AWS) [Updated]
- INFO: Updated the title.
- T824: Test that redundant Elastic / Public IP addresses are removed (AWS) [Updated]
- INFO: Updated the title.
- P891: Redundant Elastic / Public IP addresses (AWS) [Updated]
- INFO: Updated the title.
- T825: Test that required Customer Master Keys are created (AWS) [Updated]
- INFO: Updated the title.
- P892: Lack of customer-managed Customer Master Keys (AWS) [Updated]
- INFO: Updated the title.
- T827: Test that public Web-tier SSL/TLS certificates are more than 30 days from expiration (AWS) [Updated]
- INFO: Updated the title.
- P894: Expired public SSL/TLS certificates (AWS) [Updated]
- INFO: Updated the title.
- T828: Test that CloudFront is configured correctly (AWS) [Updated]
- INFO: Updated the title.
- P895: Misconfiguration of CloudFront (AWS) [Updated]
- INFO: Updated the title.
- T829: Test that DNS for Root Domain is configured correctly (AWS) [Updated]
- INFO: Updated the title.
- P896: Misconfiguration of DNS for Root Domain (AWS) [Updated]
- INFO: Updated the title.
- T830: Test that RDS Databases are not publicly accessible and are defined in a VPC (AWS) [Updated]
- INFO: Updated the title.
- T831: Verify that the default VPC is not used (AWS) [Updated]
- INFO: Updated the title.
- P898: Using the default VPC (AWS) [Updated]
- INFO: Updated the title.
- T837: Adhere to HTTP DNT header [Updated]
- INFO: Updated the priority.
- T839: Follow best practices for securely using Android autofill framework
- TA3199: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3199: ASD-STIG requirements [Updated]
- T856: Keep your web server separate from other services
- TA3201: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3201: ASD-STIG requirements [Updated]
- T858: Use the vendor supplied version of binaries
- TA3203: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3203: ASD-STIG requirements [Updated]
- T859: Minimize Apache HTTP Server modules (Apache HTTP Server)
- TA3204: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3204: ASD-STIG requirements [Updated]
- T861: Set up a non-root user account for running the Apache Web server (Apache HTTP Server)
- TA3206: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3206: ASD-STIG requirements [Updated]
- T863: Secure Apache directories and files (Apache HTTP Server)
- TA3208: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3208: ASD-STIG requirements [Updated]
- T865: Secure Apache access control (Apache HTTP Server)
- TA3210: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3210: ASD-STIG requirements [Updated]
- T867: Restrict Apache options and disable default content (Apache HTTP Server)
- TA3212: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3212: ASD-STIG requirements [Updated]
- T871: Log Apache errors and access (Apache HTTP Server)
- TA3214: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3214: ASD-STIG requirements [Updated]
- T873: Apply applicable patches (Apache HTTP Server)
- TA3216: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3216: ASD-STIG requirements [Updated]
- T875: Secure Apache SSL/TLS (Apache HTTP Server)
- TA3218: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3218: ASD-STIG requirements [Updated]
- T877: Limit information exposed by Apache (Apache HTTP Server)
- TA3220: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3220: ASD-STIG requirements [Updated]
- T879: Protect Apache against DoS attacks (Apache HTTP Server)
- TA3222: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3222: ASD-STIG requirements [Updated]
- T890: Limit the size of Apache's request parameters (Apache HTTP Server)
- TA3224: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3224: ASD-STIG requirements [Updated]
- T893: Configure AppArmor to restrict Apache processes (Apache HTTP Server)
- TA3226: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3226: ASD-STIG requirements [Updated]
- T898: Create bastion hosts for administrative access to the resources (AWS)
- TA3228: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3228: ASD-STIG requirements [Updated]
- T900: Seek user consent before updating your application or installing other software in the background
- TA3230: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3230: ASD-STIG requirements [Updated]
- T905: Configure application pools securely (Microsoft IIS)
- TA3232: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3232: ASD-STIG requirements [Updated]
- T906: Set 'global authorization rule' to restrict access (Microsoft IIS)
- TA3233: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3233: ASD-STIG requirements [Updated]
- T908: Require SSL/TLS for 'forms authentication' (Microsoft IIS)
- TA3234: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3234: ASD-STIG requirements [Updated]
- T910: Configure transport layer security for 'basic authentication' (Microsoft IIS)
- TA3235: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3235: ASD-STIG requirements [Updated]
- T913: Ensure HTTP detailed errors are hidden from displaying remotely (Microsoft IIS)
- TA3236: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3236: ASD-STIG requirements [Updated]
- T914: Ensure cookies are set with HttpOnly attribute (Microsoft IIS)
- TA3237: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3237: ASD-STIG requirements [Updated]
- T916: Ensure global .NET trust level is configured securely (Microsoft IIS)
- TA3238: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3238: ASD-STIG requirements [Updated]
- T919: Do not allow unlisted file extensions (Microsoft IIS)
- TA3239: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3239: ASD-STIG requirements [Updated]
- T923: Configure logging securely on Microsoft IIS (Microsoft IIS)
- TA3240: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3240: ASD-STIG requirements [Updated]
- T925: Configure TLS/SSL securely for Microsoft IIS (Microsoft IIS)
- TA3241: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3241: ASD-STIG requirements [Updated]
- T926: Use cookies for forms authentication (Microsoft IIS)
- TA3242: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3242: ASD-STIG requirements [Updated]
- T927: Do not store 'credentials' in configuration files (Microsoft IIS)
- TA3243: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3243: ASD-STIG requirements [Updated]
- T929: Ensure custom error messages are not off (Microsoft IIS)
- TA3244: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3244: ASD-STIG requirements [Updated]
- T931: Ensure httpcookie mode is configured for session state (Microsoft IIS)
- TA3245: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3245: ASD-STIG requirements [Updated]
- T971: Protect the Shutdown Port (Apache Tomcat)
- TA3260: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3260: ASD-STIG requirements [Updated]
- T972: Apply access restrictions in Tomcat configurations (Apache Tomcat)
- TA3261: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3261: ASD-STIG requirements [Updated]
- T973: Accurately set scheme (Apache Tomcat)
- TA3262: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3262: ASD-STIG requirements [Updated]
- T974: Restrict runtime access to sensitive packages (Apache Tomcat)
- TA3263: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3263: ASD-STIG requirements [Updated]
- T978: Do not run applications as privileged (Apache Tomcat)
- TA3264: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3264: ASD-STIG requirements [Updated]
- T983: Force TLS for manager application (Apache Tomcat)
- TA3265: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3265: ASD-STIG requirements [Updated]
- T984: Enable strict servlet compliance (Apache Tomcat)
- TA3266: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3266: ASD-STIG requirements [Updated]
- T989: Setup Client-cert Authentication (Apache Tomcat)
- TA3267: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3267: ASD-STIG requirements [Updated]
- T991: Configure connectionTimeout (Apache Tomcat)
- TA3268: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3268: ASD-STIG requirements [Updated]
- T993: Force TLS for all applications (Apache Tomcat)
- TA3269: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3269: ASD-STIG requirements [Updated]
- T1027: Configure TLS/SSL securely (Apache Tomcat)
- TA3280: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3280: ASD-STIG requirements [Updated]
- T1028: Log sufficiently and protect logs (Apache Tomcat)
- TA3281: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3281: ASD-STIG requirements [Updated]
- T1041: Enable multi-factor authentication (Microsoft Azure)
- TA3284: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3284: ASD-STIG requirements [Updated]
- T1055: Update VMs (Microsoft Azure)
- TA3286: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3286: ASD-STIG requirements [Updated]
- T1057: Enable disk and storage encryption (Microsoft Azure)
- TA3288: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3288: ASD-STIG requirements [Updated]
- T1065: Enable data encryption in transit (Microsoft Azure)
- TA3290: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3290: ASD-STIG requirements [Updated]
- T1077: Log critical events (Microsoft Azure)
- TA3292: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3292: ASD-STIG requirements [Updated]
- T1083: Disable non-required user capabilities (Microsoft Azure)
- TA3294: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3294: ASD-STIG requirements [Updated]
- T1092: Do not store sensitive cleartext information in cookies
- TA3296: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3296: ASD-STIG requirements [Updated]
- T1094: Place MySQL data and logs on non-system partitions (MySQL)
- TA3298: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3298: ASD-STIG requirements [Updated]
- T1096: Keep MySQL separate from other services (MySQL)
- TA3300: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3300: ASD-STIG requirements [Updated]
- T1102: Securely set file and directory permissions (MySQL)
- TA3302: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3302: ASD-STIG requirements [Updated]
- T1104: Apply the latest security patches (MySQL)
- TA3304: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3304: ASD-STIG requirements [Updated]
- T1108: Ensure that password policy is in place (MySQL)
- TA3306: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3306: ASD-STIG requirements [Updated]
- T1116: Drop the default 'test' database (MySQL)
- TA3308: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3308: ASD-STIG requirements [Updated]
- T1126: Log errors and critical events (MySQL)
- TA3310: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3310: ASD-STIG requirements [Updated]
- T1128: Ensure raw logging of password is disabled (MySQL)
- TA3312: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3312: ASD-STIG requirements [Updated]
- T1132: Set up SSL/TLS properly (MySQL)
- TA3314: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3314: ASD-STIG requirements [Updated]
- T1146: Enable DEP and ASLR on your server
- TA3316: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3316: ASD-STIG requirements [Updated]
- T1148: Validate JSON files
- TA3318: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3318: ASD-STIG requirements [Updated]
- T1166: Encrypt data exchanged between containers on different nodes on the overlay network (Docker)
- TA3320: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3320: ASD-STIG requirements [Updated]
- T1172: Secure daemon configuration files (Docker)
- TA3322: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3322: ASD-STIG requirements [Updated]
- T1176: Use trusted base images and include the latest security patches (Docker)
- TA3324: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3324: ASD-STIG requirements [Updated]
- T1188: Configure Linux Security Modules (Docker)
- TA3326: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3326: ASD-STIG requirements [Updated]
- T1214: Restrict containers from acquiring additional privileges (Docker)
- TA3328: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3328: ASD-STIG requirements [Updated]
- T1224: Use authorization plugin (Docker)
- TA3330: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3330: ASD-STIG requirements [Updated]
- T1252: Configure logs securely (Kubernetes)
- TA3332: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3332: ASD-STIG requirements [Updated]
- T1266: Set permissions for sensitive files properly (Kubernetes)
- TA3336: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3336: ASD-STIG requirements [Updated]
- T1272: Create administrative boundaries between resources using namespaces (Kubernetes)
- TA3338: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3338: ASD-STIG requirements [Updated]
- T1290: Apply security context to your pods and containers (Kubernetes)
- TA3340: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3340: ASD-STIG requirements [Updated]
- T1342: Enable automatic node repair and upgrades for Kubernetes clusters (Google Cloud)
- TA3352: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3352: ASD-STIG requirements [Updated]
- T1346: Ensure Kubernetes clusters are created with Alias IP ranges enabled (Google Cloud)
- TA3354: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3354: ASD-STIG requirements [Updated]
- T1348: Ensure PodSecurityPolicy controller is enabled on the Kubernetes Engine Clusters (Google Cloud)
- TA3356: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3356: ASD-STIG requirements [Updated]
- T1362: Perform message throttling in Web APIs
- TA3360: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3360: ASD-STIG requirements [Updated]
- T1367: Identify and classify critical assets
- TA3363: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3363: ASD-STIG requirements [Updated]
- T1368: Perform security testing using SAST tools
- TA3364: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3364: ASD-STIG requirements [Updated]
- T1369: Perform security testing using DAST tools
- TA3365: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3365: ASD-STIG requirements [Updated]
- T1370: Identify and track common software weaknesses and threats
- TA6237: Establish a vulnerability disclosure program (NIST-SSDF) [Added]
- TA3366: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T1371: Use a software security management solution to select and track security controls
- TA3367: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3367: ASD-STIG requirements [Updated]
- T1372: Follow software change management process
- TA3368: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3368: ASD-STIG requirements [Updated]
- T1373: Maintain the integrity of all software code
- TA3369: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3369: ASD-STIG requirements [Updated]
- T1374: Ensure the integrity of software release and update delivery
- TA6235: Securely archive necessary files and other data to be retained for each software release (NIST-SSDF) [Added]
- T1376: Provide and maintain guidance on secure installation, maintenance, and configuration of all software components
- TA3370: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3370: ASD-STIG requirements [Updated]
- T1377: Establish and maintain a bi-directional communication channel for receiving security reports and sending security notifications
- TA3371: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3371: ASD-STIG requirements [Updated]
- T1378: Release a change summary for each software update
- TA3372: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3372: ASD-STIG requirements [Updated]
- T1380: Enforce secure user registration and access control
- TA3373: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3373: ASD-STIG requirements [Updated]
- T1382: Manage performance and capacity
- TA3374: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3374: ASD-STIG requirements [Updated]
- T1383: Separate development, test, and operational environments [Updated]
- INFO: Updated the text.
- TA3375: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T1384: Back up and restore securely
- TA3376: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3376: ASD-STIG requirements [Updated]
- T1385: Institute secure logging and event monitoring
- TA3377: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3377: ASD-STIG requirements [Updated]
- T1388: Triage and fix vulnerabilities discovered during automated and manual security tests
- TA3378: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3378: ASD-STIG requirements [Updated]
- T1389: Perform penetration testing
- TA3379: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3379: ASD-STIG requirements [Updated]
- T1397: Use the most recent service packs and hotfixes (Microsoft SQL Server)
- TA3380: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3380: ASD-STIG requirements [Updated]
- T1417: Disable 'Trustworthy' database option (Microsoft SQL Server)
- TA3382: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3382: ASD-STIG requirements [Updated]
- T1451: Maintain audit logs for all database activities (Microsoft SQL Server)
- TA3384: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3384: ASD-STIG requirements [Updated]
- T1453: Validate user input before transmitting it to the SQL server (Microsoft SQL Server)
- TA3386: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3386: ASD-STIG requirements [Updated]
- T1457: Use a strong symmetric key encryption algorithm (Microsoft SQL Server)
- TA3388: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3388: ASD-STIG requirements [Updated]
- T1459: Use asymmetric keys of at least 2048-bit long (Microsoft SQL Server)
- TA3390: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3390: ASD-STIG requirements [Updated]
- T1465: Decide how to handle sessions/authorization state in your Angular application (Angular)
- TA3392: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3392: ASD-STIG requirements [Updated]
- T1466: Restrict sending of authorization state to approved origins in Angular (Angular)
- TA3393: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3393: ASD-STIG requirements [Updated]
- T1468: Encrypt sensitive data at rest in the browser
- TA3395: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3395: ASD-STIG requirements [Updated]
- T1469: Prevent sensitive data leakage through Content Security Policy (CSP) reports
- TA3396: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3396: ASD-STIG requirements [Updated]
- T1538: Avoid DOM-based Cross-Site Scripting (XSS) in Angular applications (Angular)
- TA3397: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3397: ASD-STIG requirements [Updated]
- T1539: Clear browser data on user logout
- TA3398: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3398: ASD-STIG requirements [Updated]
- T1541: Decide on the best CSRF defense for your application
- TA3400: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3400: ASD-STIG requirements [Updated]
- T1542: Use the correct HTTP methods for making state-changing operations
- TA3401: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3401: ASD-STIG requirements [Updated]
- T1543: Leverage origin isolation for compartmentalization
- TA3402: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3402: ASD-STIG requirements [Updated]
- T1544: Isolate untrusted content in a sandbox
- TA3403: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3403: ASD-STIG requirements [Updated]
- T1613: Use latest versions and patches (Oracle Database)
- TA3404: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3404: ASD-STIG requirements [Updated]
- T1615: Keep passwords secure (Oracle Database)
- TA3406: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3406: ASD-STIG requirements [Updated]
- T1617: Remove all sample data and sample schemas (Oracle Database)
- TA3408: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3408: ASD-STIG requirements [Updated]
- T1619: Keep audit parameters enabled at all times (Oracle Database)
- TA3410: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3410: ASD-STIG requirements [Updated]
- T1639: Maintain server logs for bad packets received from the client (Oracle Database)
- TA3412: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3412: ASD-STIG requirements [Updated]
- T1649: Lock out accounts after 5 unsuccessful attempts (Oracle Database)
- TA3414: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3414: ASD-STIG requirements [Updated]
- T1651: Accounts must be unlocked automatically after a period of time (Oracle Database)
- TA3416: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3416: ASD-STIG requirements [Updated]
- T1655: Limit the number of sessions per user (Oracle Database)
- TA3418: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3418: ASD-STIG requirements [Updated]
- T1659: Revoke excessive system privileges from unauthorized users (Oracle Database)
- TA3420: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3420: ASD-STIG requirements [Updated]
- T1673: All traditional audit options must be enabled at all times (Oracle Database)
- TA3422: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3422: ASD-STIG requirements [Updated]
- T1733: Enable all unified audit options (Oracle Database)
- TA3424: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3424: ASD-STIG requirements [Updated]
- T1878: Grant minimal IAM permissions (especially to Lambda functions) (AWS)
- TA3426: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3426: ASD-STIG requirements [Updated]
- T1881: Mitigate the risk of uncontrolled data harvesting
- TA3427: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3427: ASD-STIG requirements [Updated]
- T1885: Ensure Lambda functions handle input safely (AWS)
- TA3429: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3429: ASD-STIG requirements [Updated]
- T1887: Decide on the right OAuth 2.0 flow for your application
- TA3430: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3430: ASD-STIG requirements [Updated]
- T1888: Decide on the right OpenID Connect flow for your application
- TA3431: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3431: ASD-STIG requirements [Updated]
- T1892: Perform a Threat and Risk Assessment (TRA) [Updated]
- INFO: Updated the text.
- TA3432: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T1897: Encrypt SQS queue messages (AWS)
- TA3433: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3433: ASD-STIG requirements [Updated]
- T1899: Do not allow unauthorized access to SQS queues (AWS)
- TA3435: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3435: ASD-STIG requirements [Updated]
- T1903: Enforce Network ACLs for RDS (AWS)
- TA3437: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3437: ASD-STIG requirements [Updated]
- T1906: Enforce authentication on your relational database services (AWS)
- TA3438: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3438: ASD-STIG requirements [Updated]
- T1919: Use JSON Web Token (JWT) securely
- TA3440: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3440: ASD-STIG requirements [Updated]
- T1920: Conduct security architecture and design reviews before starting code development
- TA6236: Review the software design (NIST-SSDF) [Added]
- T1947: Configure auditing properly on the API server (OpenShift)
- TA3441: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3441: ASD-STIG requirements [Updated]
- T2037: Set root filesystems to be read-only (Amazon ECS)
- TA3443: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3443: ASD-STIG requirements [Updated]
- T2038: Apply resource limits on containers (Amazon ECS)
- TA3444: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3444: ASD-STIG requirements [Updated]
- T2040: Ensure host operating systems are up to date (Amazon ECS)
- TA3445: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3445: ASD-STIG requirements [Updated]
- T2044: Utilize AWS parameter store for sensitive data storage (Amazon ECS)
- TA3446: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3446: ASD-STIG requirements [Updated]
- T2047: Attach IAM policies to DynamoDB resources (Amazon DynamoDB)
- TA3447: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3447: ASD-STIG requirements [Updated]
- T2059: Enable App Service authentication and identity management (Microsoft Azure)
- TA3448: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3448: ASD-STIG requirements [Updated]
- T2067: Use the latest version of software on App Service (Microsoft Azure)
- TA3450: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3450: ASD-STIG requirements [Updated]
- T2071: Enable logging of important PostgreSQL security events (Microsoft Azure)
- TA3452: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3452: ASD-STIG requirements [Updated]
- T2111: Set the 'Per-User Session Limit' to a value of '3' or lower (Docker)
- TA3454: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3454: ASD-STIG requirements [Updated]
- T2113: Set the 'Lifetime Minutes' and 'Renewal Threshold Minutes' values to '15' or lower and '0' respectively (Docker)
- TA3456: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3456: ASD-STIG requirements [Updated]
- T2118: Exercise security monitoring best practices in Microservices environments
- TA3458: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3458: ASD-STIG requirements [Updated]
- T2121: Exercise security best practices for service rate limiting in Microservices environments [Updated]
- INFO: Updated the text.
- TA3459: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T2122: Update Android Security Provider
- TA3460: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3460: ASD-STIG requirements [Updated]
- T2125: Exercise security strategies for handling session persistence
- TA3462: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3462: ASD-STIG requirements [Updated]
- T2128: Develop a process to notify users and regulators of breaches of personal information
- TA3463: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3463: ASD-STIG requirements [Updated]
- T2130: Exercise best practices for securing microservices communication
- TA3464: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3464: ASD-STIG requirements [Updated]
- T2133: Protect the security of data in iOS
- TA3465: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3465: ASD-STIG requirements [Updated]
- T2134: Compile iOS applications with PIE and ARC flags
- TA3466: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3466: ASD-STIG requirements [Updated]
- T2141: Perform function level authorization in API
- TA3467: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3467: ASD-STIG requirements [Updated]
- T2144: Implement CAN bus protocol properly (Connected Cars)
- P1548: Poor implementation of CAN bus protocol (Connected Cars) [Updated]
- INFO: Updated the match conditions.
- P1548: Poor implementation of CAN bus protocol (Connected Cars) [Updated]
- T2145: Enable gRPC Server-Client Certificate Authentication (.NET Core 3) [Updated]
- INFO: Updated the title and text.
- T2149: Perform security checks before external infotainment communication (Connected Cars)
- TA3469: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3469: ASD-STIG requirements [Updated]
- T2154: Validate all YAML input
- TA3471: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3471: ASD-STIG requirements [Updated]
- T2155: Follow security best practices for YAML parsers
- TA3472: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3472: ASD-STIG requirements [Updated]
- T2161: Ensure the cloud management interface is secured properly (Cloud)
- TA3473: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3473: ASD-STIG requirements [Updated]
- T2162: Prevent malicious insider risks and privileged user abuse in cloud providers (Cloud)
- TA3474: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3474: ASD-STIG requirements [Updated]
- T2165: Ensure security governance when outsourcing to cloud providers (Cloud)
- TA6231: Use official cloud providers (Terraform) [Added]
- TA3475: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- T2166: Ensure business continuity over cloud services (Cloud)
- TA3476: ASD-STIG requirements [Updated]
- INFO: Updated the title.
- TA3476: ASD-STIG requirements [Updated]
- T2175: Provide documentation for design (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- P1573: Missing documentation for design (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2180: Review Access Control Policy (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2189: Prevent Semiconductor Defects in Hardware Logic with Security-Sensitive Implications (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2196: Prevent exposure of sensitive system information due to uncleared debug information (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2201: Enforce physical access control (Hardware/Firmware) [Updated]
- INFO: Updated the title and text.
- P1599: Improper physical access control (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2203: Ensure a policy that prevents the use of obsolete encoding (Hardware/Firmware) [Updated]
- INFO: Updated the title and text.
- P1601: Policy uses obsolete encoding (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2204: Enforce policy privilege assignments consistently between control and data agents (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- P1602: Policy privileges are not assigned consistently between control and data agents (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2205: Prevent a product being released in non-release configuration (Hardware/Firmware) [Updated]
- INFO: Updated the title and text.
- P1603: Product released in non-release configuration (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2206: Prevent the generation of incorrect security tokens (Hardware/Firmware) [Updated]
- INFO: Updated the title and text.
- P1604: Generation of incorrect security tokens (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2211: Include a firmware update mechanism/feature (Hardware/Firmware) [Updated]
- INFO: Updated the title and text.
- P1609: Firmware cannot be updated (Hardware/Firmware) [Updated]
- INFO: Updated the title and text.
- T2278: Test to confirm that different rules for access to the system are enforced based on the origin, type, and medium of the request
- TA5449: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- INFO: Updated the text.
- TA5449: ISASecure SSA 311 requirements: Levels (3, 4) [Updated]
- T2286: Configure a secure user authentication (Cloud) (1/2) [Updated]
- INFO: Updated the title.
- T2287: Configure a secure user authorization (Cloud) (1/2) [Updated]
- INFO: Updated the title.
- T2288: Design a secure application architecture for the cloud environment (Cloud) (1/2) [Updated]
- INFO: Updated the title.
- T2289: Secure network access control (Cloud) (1/4) [Updated]
- INFO: Updated the title.
- T2290: Secure data in transit (Cloud) (1/2) [Updated]
- INFO: Updated the title.
- T2292: Protect data at rest (Cloud) (1/3) [Updated]
- INFO: Updated the title.
- T2293: Enable logging and protect log files in your cloud environment (Cloud) (1/4) [Updated]
- INFO: Updated the title.
- T2294: Enable logs and configuration monitoring in your cloud environment (Cloud) (1/4) [Updated]
- INFO: Updated the title.
- T2305: Verify that logging is enabled and log files are protected (Cloud) (1/2) [Updated]
- INFO: Updated the title.
- T2306: Verify that log monitoring and configuration monitoring are enabled (Cloud) (1/3) [Updated]
- INFO: Updated the title.
- T2310: Implement proper authentication and authorization (Containerization) (1/2) [Updated]
- INFO: Updated the title.
- T2315: Use managed services (Containerization) [Updated]
- INFO: Updated the text.
- T2335: Securely automate your infrastructure provisioning process (Terraform) [Added]
- P1678: Unsafe infrastructure as a code(IaC) process [Added]
- T2336: Use a remote backend to securely store your infrastructure state (Terraform) [Added]
- P1679: Unsafe state of infrastructure as a code(IaC) [Added]
- I1784: Configure a remote backend (Terraform) [Added]
- T2337: Keep your infrastructure state secure (Terraform) [Added]
- P1679: Unsafe state of infrastructure as a code(IaC) [Added]
- T2338: Protect your credentials (Terraform) [Added]
- I1785: Use a secret manager (Terraform) [Added]
- I1786: Use dynamically generated, short-lived credentials (Terraform) [Added]
- I1791: Setting and retrieving credentials in Terraform [Added]
- T2339: Restrict direct access to your cloud provider (Terraform) [Added]
- P1678: Unsafe infrastructure as a code(IaC) process [Added]
- T2340: Use Terraform Teams to implement role-based security (Terraform) [Added]
- P1679: Unsafe state of infrastructure as a code(IaC) [Added]
- T2341: Catch common security mistakes with a linter (Terraform) [Added]
- P1679: Unsafe state of infrastructure as a code(IaC) [Added]
- T2342: Improve your security posture with Sentinel policies (Terraform) [Added]
- P1679: Unsafe state of infrastructure as a code(IaC) [Added]
- I1788: A sample Sentinel policy [Added]
- I1789: Use the Sentinel CLI to test policies [Added]
- I1790: Apply Sentinel policies in your Terraform workflow [Added]
- TA6233: Implement CIS Benchmarks with the Terraform Foundational Policy Library (Sentinel) [Added]
- T2343: Implement SSDF-related roles and responsibilities (NIST-SSDF) [Added]
- P1680: Lack of defining proper SSDF roles and responsibilities [Added]
- T2344: Implement and augment supporting toolchains by automating SDLC security activities [Added]
- P1681: Lack of automation and implementation of supporting toolchains [Added]
- T2345: Define and implement criteria for software security checks [Added]
- P1682: Lack of proper criteria for software security checks [Added]
- T2346: Establish an organization-wide software and code repository [Added]
- P1683: Lack of organization-wide software and code repository [Added]
- T2347: Configure the Integrated Development Environment, Compilation, Interpreter, and Build Processes [Added]
- P1684: Lack of proper integration of the development environment and tools [Added]
- T2348: Perform code reviews [Added]
- P1685: Lack of proper code reviews [Added]
- T2349: Configure software to have secure settings by default [Added]
- P1686: Lack of secure default settings [Added]
- T2350: Create a Product Security Incident Response Team (PSIRT) [Added]
- P1687: Lack of a Product Security Incident Response Team (PSIRT) [Added]
- T2351: Verify that SSDF-related roles and responsibilities are properly defined and assigned (NIST-SSDF) [Added]
- P1680: Lack of defining proper SSDF roles and responsibilities [Added]
- T2352: Verify that supporting toolchains are properly implemented [Added]
- P1681: Lack of automation and implementation of supporting toolchains [Added]
- T2353: Verify that proper criteria for software security checks are defined and implemented [Added]
- P1682: Lack of proper criteria for software security checks [Added]
- T2354: Verify that an organization-wide software and code repository is established and used [Added]
- P1683: Lack of organization-wide software and code repository [Added]
- T2355: Verify that the IDE, compiler, interpreter, and build processes are configured securely [Added]
- P1684: Lack of proper integration of the development environment and tools [Added]
- T2356: Verify that code reviews are performed properly [Added]
- P1685: Lack of proper code reviews [Added]
- T2357: Verify that software is configured to have secure settings by default [Added]
- P1686: Lack of secure default settings [Added]
- T2358: Verify that the organization has a Product Security Incident Response Team (PSIRT) [Added]
- P1687: Lack of a Product Security Incident Response Team (PSIRT) [Added]
- T2359: Configure a secure user authentication (Cloud) (2/2) [Added]
- TA5646: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.19) [Updated]
- INFO: Updated the inclusion standard.
- TA6062: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6066: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6072: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6082: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.12) [Updated]
- INFO: Updated the inclusion standard.
- TA6084: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.13) [Updated]
- INFO: Updated the inclusion standard.
- TA6086: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.14) [Updated]
- INFO: Updated the inclusion standard.
- TA6088: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.15) [Updated]
- INFO: Updated the inclusion standard.
- I1520: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.19) [Updated]
- INFO: Updated the inclusion standard.
- I1702: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.2) [Updated]
- INFO: Updated the inclusion standard.
- I1704: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.4) [Updated]
- INFO: Updated the inclusion standard.
- I1707: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.7) [Updated]
- INFO: Updated the inclusion standard.
- I1712: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.12) [Updated]
- INFO: Updated the inclusion standard.
- I1713: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.13) [Updated]
- INFO: Updated the inclusion standard.
- I1714: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.14) [Updated]
- INFO: Updated the inclusion standard.
- I1715: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.15) [Updated]
- INFO: Updated the inclusion standard.
- TA5646: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.19) [Updated]
- T2360: Configure a secure user authorization (Cloud) (2/2) [Added]
- TA5770: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.6) [Updated]
- INFO: Updated the inclusion standard.
- TA5772: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.7) [Updated]
- INFO: Updated the inclusion standard.
- TA5774: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.8) [Updated]
- INFO: Updated the inclusion standard.
- TA5776: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.9) [Updated]
- INFO: Updated the inclusion standard.
- TA5778: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.10) [Updated]
- INFO: Updated the inclusion standard.
- TA6068: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.5) [Updated]
- INFO: Updated the inclusion standard.
- TA6070: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.6) [Updated]
- INFO: Updated the inclusion standard.
- I1582: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.6) [Updated]
- INFO: Updated the inclusion standard.
- I1583: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.7) [Updated]
- INFO: Updated the inclusion standard.
- I1584: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.8) [Updated]
- INFO: Updated the inclusion standard.
- I1585: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.9) [Updated]
- INFO: Updated the inclusion standard.
- I1586: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.10) [Updated]
- INFO: Updated the inclusion standard.
- I1705: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.5) [Updated]
- INFO: Updated the inclusion standard.
- I1706: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.6) [Updated]
- INFO: Updated the inclusion standard.
- TA5770: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.6) [Updated]
- T2361: Design a secure application architecture for the cloud environment (Cloud) (2/2) [Added]
- TA5850: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.3) [Updated]
- INFO: Updated the inclusion standard.
- TA5854: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.5) [Updated]
- INFO: Updated the inclusion standard.
- TA5856: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.6) [Updated]
- INFO: Updated the inclusion standard.
- TA5858: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.7) [Updated]
- INFO: Updated the inclusion standard.
- TA5860: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.8) [Updated]
- INFO: Updated the inclusion standard.
- TA5862: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.9) [Updated]
- INFO: Updated the inclusion standard.
- TA5864: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.10) [Updated]
- INFO: Updated the inclusion standard.
- TA5908: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.32) [Updated]
- INFO: Updated the inclusion standard.
- TA5910: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.33) [Updated]
- INFO: Updated the inclusion standard.
- I1622: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.3) [Updated]
- INFO: Updated the inclusion standard.
- I1624: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.5) [Updated]
- INFO: Updated the inclusion standard.
- I1625: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.6) [Updated]
- INFO: Updated the inclusion standard.
- I1626: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.7) [Updated]
- INFO: Updated the inclusion standard.
- I1627: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.8) [Updated]
- INFO: Updated the inclusion standard.
- I1628: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.9) [Updated]
- INFO: Updated the inclusion standard.
- I1629: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.10) [Updated]
- INFO: Updated the inclusion standard.
- I1651: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.32) [Updated]
- INFO: Updated the inclusion standard.
- I1652: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.33) [Updated]
- INFO: Updated the inclusion standard.
- TA5850: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.3) [Updated]
- T2362: Secure network access control (Cloud) (2/4) [Added]
- TA5878: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.17) [Updated]
- INFO: Updated the inclusion standard.
- TA5888: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.22) [Updated]
- INFO: Updated the inclusion standard.
- TA5890: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.23) [Updated]
- INFO: Updated the inclusion standard.
- I1636: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.17) [Updated]
- INFO: Updated the inclusion standard.
- I1641: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.22) [Updated]
- INFO: Updated the inclusion standard.
- I1642: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.23) [Updated]
- INFO: Updated the inclusion standard.
- TA5878: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.17) [Updated]
- T2363: Secure network access control (Cloud) (3/4) [Added]
- TA5892: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.24) [Updated]
- INFO: Updated the inclusion standard.
- TA5894: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.25) [Updated]
- INFO: Updated the inclusion standard.
- TA5896: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.26) [Updated]
- INFO: Updated the inclusion standard.
- TA5898: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.27) [Updated]
- INFO: Updated the inclusion standard.
- TA5900: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.28) [Updated]
- INFO: Updated the inclusion standard.
- TA5902: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.29) [Updated]
- INFO: Updated the inclusion standard.
- TA5904: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.30) [Updated]
- INFO: Updated the inclusion standard.
- TA5906: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.31) [Updated]
- INFO: Updated the inclusion standard.
- TA5912: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.34) [Updated]
- INFO: Updated the inclusion standard.
- TA6114: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6116: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6118: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6120: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.4) [Updated]
- INFO: Updated the inclusion standard.
- I1643: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.24) [Updated]
- INFO: Updated the inclusion standard.
- I1644: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.25) [Updated]
- INFO: Updated the inclusion standard.
- I1645: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.26) [Updated]
- INFO: Updated the inclusion standard.
- I1646: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.27) [Updated]
- INFO: Updated the inclusion standard.
- I1647: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.28) [Updated]
- INFO: Updated the inclusion standard.
- I1648: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.29) [Updated]
- INFO: Updated the inclusion standard.
- I1649: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.30) [Updated]
- INFO: Updated the inclusion standard.
- I1650: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.31) [Updated]
- INFO: Updated the inclusion standard.
- I1653: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.34) [Updated]
- INFO: Updated the inclusion standard.
- I1728: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.1) [Updated]
- INFO: Updated the inclusion standard.
- I1729: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.2) [Updated]
- INFO: Updated the inclusion standard.
- I1730: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.3) [Updated]
- INFO: Updated the inclusion standard.
- I1731: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.4) [Updated]
- INFO: Updated the inclusion standard.
- TA5892: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.24) [Updated]
- T2364: Secure network access control (Cloud) (4/4) [Added]
- TA6122: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.5) [Updated]
- INFO: Updated the inclusion standard.
- TA6124: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.6) [Updated]
- INFO: Updated the inclusion standard.
- TA6126: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6128: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.8) [Updated]
- INFO: Updated the inclusion standard.
- TA6130: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.9) [Updated]
- INFO: Updated the inclusion standard.
- TA6132: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.10) [Updated]
- INFO: Updated the inclusion standard.
- TA6150: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.9) [Updated]
- INFO: Updated the inclusion standard.
- TA6206: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.5) [Updated]
- INFO: Updated the inclusion standard.
- TA6214: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.5) [Updated]
- INFO: Updated the inclusion standard.
- TA6216: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.6) [Updated]
- INFO: Updated the inclusion standard.
- I1732: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.5) [Updated]
- INFO: Updated the inclusion standard.
- I1733: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.6) [Updated]
- INFO: Updated the inclusion standard.
- I1734: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.7) [Updated]
- INFO: Updated the inclusion standard.
- I1735: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.8) [Updated]
- INFO: Updated the inclusion standard.
- I1736: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.9) [Updated]
- INFO: Updated the inclusion standard.
- I1737: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.10) [Updated]
- INFO: Updated the inclusion standard.
- I1746: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.9) [Updated]
- INFO: Updated the inclusion standard.
- I1774: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.5) [Updated]
- INFO: Updated the inclusion standard.
- I1778: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.5) [Updated]
- INFO: Updated the inclusion standard.
- I1779: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.6) [Updated]
- INFO: Updated the inclusion standard.
- TA6122: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.5) [Updated]
- T2365: Secure data in transit (Cloud) (2/2) [Added]
- TA5886: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.21) [Updated]
- INFO: Updated the inclusion standard.
- TA6152: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.10) [Updated]
- INFO: Updated the inclusion standard.
- TA6212: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.4) [Updated]
- INFO: Updated the inclusion standard.
- I1640: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.21) [Updated]
- INFO: Updated the inclusion standard.
- I1747: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.10) [Updated]
- INFO: Updated the inclusion standard.
- I1777: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.4) [Updated]
- INFO: Updated the inclusion standard.
- TA5886: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.21) [Updated]
- T2366: Protect data at rest (Cloud) (2/3) [Added]
- TA5736: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.6) [Updated]
- INFO: Updated the inclusion standard.
- TA5744: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.10) [Updated]
- INFO: Updated the inclusion standard.
- TA5756: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.16) [Updated]
- INFO: Updated the inclusion standard.
- TA5840: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.10) [Updated]
- INFO: Updated the inclusion standard.
- TA5842: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.11) [Updated]
- INFO: Updated the inclusion standard.
- TA6146: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6154: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.11) [Updated]
- INFO: Updated the inclusion standard.
- TA6156: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 5.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6158: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 5.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6162: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.2) [Updated]
- INFO: Updated the inclusion standard.
- I1565: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.6) [Updated]
- INFO: Updated the inclusion standard.
- I1569: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.10) [Updated]
- INFO: Updated the inclusion standard.
- I1575: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.16) [Updated]
- INFO: Updated the inclusion standard.
- I1617: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.10) [Updated]
- INFO: Updated the inclusion standard.
- I1618: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.11) [Updated]
- INFO: Updated the inclusion standard.
- I1744: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.7) [Updated]
- INFO: Updated the inclusion standard.
- I1748: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.11) [Updated]
- INFO: Updated the inclusion standard.
- I1749: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 5.1) [Updated]
- INFO: Updated the inclusion standard.
- I1750: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 5.2) [Updated]
- INFO: Updated the inclusion standard.
- I1752: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.2) [Updated]
- INFO: Updated the inclusion standard.
- TA5736: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.6) [Updated]
- T2367: Protect data at rest (Cloud) (3/3) [Added]
- TA6164: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6198: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6200: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6202: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6204: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6208: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.6) [Updated]
- INFO: Updated the inclusion standard.
- TA6210: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6218: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6220: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 7.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6222: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 7.2) [Updated]
- INFO: Updated the inclusion standard.
- I1753: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.3) [Updated]
- INFO: Updated the inclusion standard.
- I1770: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.1) [Updated]
- INFO: Updated the inclusion standard.
- I1771: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.2) [Updated]
- INFO: Updated the inclusion standard.
- I1772: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.3) [Updated]
- INFO: Updated the inclusion standard.
- I1773: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.4) [Updated]
- INFO: Updated the inclusion standard.
- I1775: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.6) [Updated]
- INFO: Updated the inclusion standard.
- I1776: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.7) [Updated]
- INFO: Updated the inclusion standard.
- I1780: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.7) [Updated]
- INFO: Updated the inclusion standard.
- I1781: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 7.1) [Updated]
- INFO: Updated the inclusion standard.
- I1782: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 7.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6164: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.3) [Updated]
- T2368: Enable logging and protect log files in your cloud environment (Cloud) (2/4) [Added]
- TA5810: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.2) [Updated]
- INFO: Updated the inclusion standard.
- TA5816: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.6) [Updated]
- INFO: Updated the inclusion standard.
- TA5818: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.7) [Updated]
- INFO: Updated the inclusion standard.
- TA5822: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.1) [Updated]
- INFO: Updated the inclusion standard.
- TA5824: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.2) [Updated]
- INFO: Updated the inclusion standard.
- I1602: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.2) [Updated]
- INFO: Updated the inclusion standard.
- I1605: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.6) [Updated]
- INFO: Updated the inclusion standard.
- I1606: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.7) [Updated]
- INFO: Updated the inclusion standard.
- I1608: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.1) [Updated]
- INFO: Updated the inclusion standard.
- I1609: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.2) [Updated]
- INFO: Updated the inclusion standard.
- TA5810: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.2) [Updated]
- T2369: Enable logging and protect log files in your cloud environment (Cloud) (3/4) [Added]
- TA5826: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.3) [Updated]
- INFO: Updated the inclusion standard.
- TA5828: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.4) [Updated]
- INFO: Updated the inclusion standard.
- TA5830: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.5) [Updated]
- INFO: Updated the inclusion standard.
- TA5832: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.6) [Updated]
- INFO: Updated the inclusion standard.
- TA5834: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.7) [Updated]
- INFO: Updated the inclusion standard.
- TA5836: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.8) [Updated]
- INFO: Updated the inclusion standard.
- TA5838: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.9) [Updated]
- INFO: Updated the inclusion standard.
- TA6090: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6092: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6094: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6166: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.1) [Updated]
- INFO: Updated the inclusion standard.
- I1610: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.3) [Updated]
- INFO: Updated the inclusion standard.
- I1611: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.4) [Updated]
- INFO: Updated the inclusion standard.
- I1612: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.5) [Updated]
- INFO: Updated the inclusion standard.
- I1613: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.6) [Updated]
- INFO: Updated the inclusion standard.
- I1614: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.7) [Updated]
- INFO: Updated the inclusion standard.
- I1615: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.8) [Updated]
- INFO: Updated the inclusion standard.
- I1616: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.9) [Updated]
- INFO: Updated the inclusion standard.
- I1716: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.1) [Updated]
- INFO: Updated the inclusion standard.
- I1717: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.2) [Updated]
- INFO: Updated the inclusion standard.
- I1718: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.3) [Updated]
- INFO: Updated the inclusion standard.
- I1754: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.1) [Updated]
- INFO: Updated the inclusion standard.
- TA5826: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.3) [Updated]
- T2370: Enable logging and protect log files in your cloud environment (Cloud) (4/4) [Added]
- TA6232: Monitor the audit logs for problems (Terraform) [Added]
- TA6170: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6172: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6174: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.5) [Updated]
- INFO: Updated the inclusion standard.
- TA6176: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.6) [Updated]
- INFO: Updated the inclusion standard.
- TA6178: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6180: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.8) [Updated]
- INFO: Updated the inclusion standard.
- TA6190: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.13) [Updated]
- INFO: Updated the inclusion standard.
- TA6192: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.14) [Updated]
- INFO: Updated the inclusion standard.
- TA6194: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.15) [Updated]
- INFO: Updated the inclusion standard.
- TA6196: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.16) [Updated]
- INFO: Updated the inclusion standard.
- I1756: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.3) [Updated]
- INFO: Updated the inclusion standard.
- I1757: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.4) [Updated]
- INFO: Updated the inclusion standard.
- I1758: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.5) [Updated]
- INFO: Updated the inclusion standard.
- I1759: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.6) [Updated]
- INFO: Updated the inclusion standard.
- I1760: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.7) [Updated]
- INFO: Updated the inclusion standard.
- I1761: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.8) [Updated]
- INFO: Updated the inclusion standard.
- I1766: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.13) [Updated]
- INFO: Updated the inclusion standard.
- I1767: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.14) [Updated]
- INFO: Updated the inclusion standard.
- I1768: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.15) [Updated]
- INFO: Updated the inclusion standard.
- I1769: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.16) [Updated]
- INFO: Updated the inclusion standard.
- T2371: Enable logs and configuration monitoring in your cloud environment (Cloud) (2/4) [Added]
- TA5704: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.9) [Updated]
- INFO: Updated the inclusion standard.
- TA5706: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.10) [Updated]
- INFO: Updated the inclusion standard.
- TA5708: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.11) [Updated]
- INFO: Updated the inclusion standard.
- TA5710: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.12) [Updated]
- INFO: Updated the inclusion standard.
- TA5712: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.13) [Updated]
- INFO: Updated the inclusion standard.
- TA5714: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.14) [Updated]
- INFO: Updated the inclusion standard.
- TA5716: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.15) [Updated]
- INFO: Updated the inclusion standard.
- I1549: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.9) [Updated]
- INFO: Updated the inclusion standard.
- I1550: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.10) [Updated]
- INFO: Updated the inclusion standard.
- I1551: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.11) [Updated]
- INFO: Updated the inclusion standard.
- I1552: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.12) [Updated]
- INFO: Updated the inclusion standard.
- I1553: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.13) [Updated]
- INFO: Updated the inclusion standard.
- I1554: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.14) [Updated]
- INFO: Updated the inclusion standard.
- I1555: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.15) [Updated]
- INFO: Updated the inclusion standard.
- TA5704: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.9) [Updated]
- T2372: Enable logs and configuration monitoring in your cloud environment (Cloud) (3/4) [Added]
- TA5812: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.3) [Updated]
- INFO: Updated the inclusion standard.
- TA5814: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.4) [Updated]
- INFO: Updated the inclusion standard.
- TA5820: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.8) [Updated]
- INFO: Updated the inclusion standard.
- TA6096: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6098: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.5) [Updated]
- INFO: Updated the inclusion standard.
- TA6100: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.6) [Updated]
- INFO: Updated the inclusion standard.
- TA6102: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6104: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.8) [Updated]
- INFO: Updated the inclusion standard.
- I1603: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.3) [Updated]
- INFO: Updated the inclusion standard.
- I1604: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.4) [Updated]
- INFO: Updated the inclusion standard.
- I1607: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.8) [Updated]
- INFO: Updated the inclusion standard.
- I1719: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.4) [Updated]
- INFO: Updated the inclusion standard.
- I1720: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.5) [Updated]
- INFO: Updated the inclusion standard.
- I1721: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.6) [Updated]
- INFO: Updated the inclusion standard.
- I1722: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.7) [Updated]
- INFO: Updated the inclusion standard.
- I1723: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.8) [Updated]
- INFO: Updated the inclusion standard.
- TA5812: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.3) [Updated]
- T2373: Enable logs and configuration monitoring in your cloud environment (Cloud) (4/4) [Added]
- TA6106: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.9) [Updated]
- INFO: Updated the inclusion standard.
- TA6108: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.10) [Updated]
- INFO: Updated the inclusion standard.
- TA6110: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.11) [Updated]
- INFO: Updated the inclusion standard.
- TA6112: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.12) [Updated]
- INFO: Updated the inclusion standard.
- TA6168: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6182: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.9) [Updated]
- INFO: Updated the inclusion standard.
- TA6184: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.10) [Updated]
- INFO: Updated the inclusion standard.
- TA6186: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.11) [Updated]
- INFO: Updated the inclusion standard.
- TA6188: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.12) [Updated]
- INFO: Updated the inclusion standard.
- I1724: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.9) [Updated]
- INFO: Updated the inclusion standard.
- I1725: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.10) [Updated]
- INFO: Updated the inclusion standard.
- I1726: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.11) [Updated]
- INFO: Updated the inclusion standard.
- I1727: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.12) [Updated]
- INFO: Updated the inclusion standard.
- I1755: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.2) [Updated]
- INFO: Updated the inclusion standard.
- I1762: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.9) [Updated]
- INFO: Updated the inclusion standard.
- I1763: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.10) [Updated]
- INFO: Updated the inclusion standard.
- I1764: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.11) [Updated]
- INFO: Updated the inclusion standard.
- I1765: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.12) [Updated]
- INFO: Updated the inclusion standard.
- TA6106: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.9) [Updated]
- T2374: Verify that logging is enabled and log files are protected (Cloud) (2/2) [Added]
- TA6179: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6181: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.8) [Updated]
- INFO: Updated the inclusion standard.
- TA6191: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.13) [Updated]
- INFO: Updated the inclusion standard.
- TA6193: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.14) [Updated]
- INFO: Updated the inclusion standard.
- TA6195: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.15) [Updated]
- INFO: Updated the inclusion standard.
- TA6197: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.16) [Updated]
- INFO: Updated the inclusion standard.
- TA6179: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.7) [Updated]
- T2375: Verify that log monitoring and configuration monitoring are enabled (Cloud) (2/3) [Added]
- TA5711: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.12) [Updated]
- INFO: Updated the inclusion standard.
- TA5713: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.13) [Updated]
- INFO: Updated the inclusion standard.
- TA5715: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.14) [Updated]
- INFO: Updated the inclusion standard.
- TA5711: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.12) [Updated]
- T2376: Verify that log monitoring and configuration monitoring are enabled (Cloud) (3/3) [Added]
- TA5717: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.15) [Updated]
- INFO: Updated the inclusion standard.
- TA5813: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.3) [Updated]
- INFO: Updated the inclusion standard.
- TA5815: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.4) [Updated]
- INFO: Updated the inclusion standard.
- TA5821: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.8) [Updated]
- INFO: Updated the inclusion standard.
- TA6097: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.4) [Updated]
- INFO: Updated the inclusion standard.
- TA6099: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.5) [Updated]
- INFO: Updated the inclusion standard.
- TA6101: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.6) [Updated]
- INFO: Updated the inclusion standard.
- TA6103: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.7) [Updated]
- INFO: Updated the inclusion standard.
- TA6105: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.8) [Updated]
- INFO: Updated the inclusion standard.
- TA6107: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.9) [Updated]
- INFO: Updated the inclusion standard.
- TA6109: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.10) [Updated]
- INFO: Updated the inclusion standard.
- TA6111: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.11) [Updated]
- INFO: Updated the inclusion standard.
- TA6113: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.12) [Updated]
- INFO: Updated the inclusion standard.
- TA6169: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.2) [Updated]
- INFO: Updated the inclusion standard.
- TA6183: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.9) [Updated]
- INFO: Updated the inclusion standard.
- TA6185: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.10) [Updated]
- INFO: Updated the inclusion standard.
- TA6187: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.11) [Updated]
- INFO: Updated the inclusion standard.
- TA6189: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.12) [Updated]
- INFO: Updated the inclusion standard.
- TA5717: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.15) [Updated]
T2377: Implement proper authentication and authorization (Containerization) (2/2) [Added]
- TA6027: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6037: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.6) [Updated]
- INFO: Updated the inclusion standard.
- TA6039: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.9) [Updated]
- INFO: Updated the inclusion standard.
- TA6051: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.3) [Updated]
- INFO: Updated the inclusion standard.
- TA6056: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.5.1) [Updated]
- INFO: Updated the inclusion standard.
- I1682: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.1) [Updated]
- INFO: Updated the inclusion standard.
- I1683: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.6) [Updated]
- INFO: Updated the inclusion standard.
- I1684: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.9) [Updated]
- INFO: Updated the inclusion standard.
- I1685: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.3) [Updated]
- INFO: Updated the inclusion standard.
- I1686: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.5.1) [Updated]
- INFO: Updated the inclusion standard.
- TA6027: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.1) [Updated]
Changes to Project Properties and Profiles
- Q206: Privacy
- Q160: Handles Personal Data
- Q224: Privacy Regulations
- A1255: California Civil Code (CCPA and CPRA) [Updated]
- INFO: Updated the text and description.
- A1255: California Civil Code (CCPA and CPRA) [Updated]
- Q224: Privacy Regulations
- Q160: Handles Personal Data
- Q289: Cloud Computing
- Q290: Cloud Providers
- A1159: Amazon Web Services (AWS) Content (Not Story-driven) [Updated]
- INFO: Updated the text and description.
- A1212: Google Cloud Content (Not Story-driven) [Updated]
- INFO: Updated the text and description.
- A1333: New Amazon Web Services (AWS) Content (Story-driven) [Updated]
- INFO: Updated the text.
- A1336: New Google Cloud Content (Story-driven) [Updated]
- INFO: Updated the text.
- A1159: Amazon Web Services (AWS) Content (Not Story-driven) [Updated]
- Q290: Cloud Providers
- Q299: General
- Q346: IaC Tools [Added]
- A1338: Terraform [Added]
- Q346: IaC Tools [Added]
- Q331: US Federal and NIST
- Q347: In-Scope for NIST SSDF compliance [Added]
- A1339: Yes [Added]
- Q347: In-Scope for NIST SSDF compliance [Added]
- Q206: Privacy
New Just-in-Time Training
- Defending PHP (37)
- Defending JavaScript (24)
- OWASP Top 10 (42)
- OAuth Security Fundamentals (20)
- Defending Angular (27)
- OpSec Fundamentals (25)
5.20
April 2, 2022
New features and enhancements
Integrations
- Jira Authentication
- Introduced a new Authentication type within the Jira Global Connector that allows users to create a uniquely generated Personal Access Token (PAT) as an alternative to a username and password.
- Jira Authentication
Reporting
- The Training Report CSV Export now includes a column for Completed Date.
Verification
- Changed the global verification behavior when setting up scan results to 'Merge'.
- The original treatment was regardless of the behavior selected, it would always update the SD Elements Task completion status based on the last scanning build report that occurred.
- The new treatment will now make a calculated decision based on the scanning reports, depending on the behavior selected (Merge) prior to updating the SD Elements Task status.
- Changed the global verification behavior when setting up scan results to 'Merge'.
Task searching
- Migrated Tasks to a new search architecture, with the following improvements:
- Tasks are now indexed in real time
- Customized content is now indexed more accurately
- All Tasks contained within a project are now included in search results, including those that are deactivated in the Library.
- Deactivated Amendments no longer influence search results
- Migrated Tasks to a new search architecture, with the following improvements:
Other product improvements
Fixed a bug on the Twistlock Integration where it was defaulting unknown severities as medium on SD Elements.
Remote Integration Agent (RIA)
- Deprecated Python 3.6 on RIA Linux. The default download will be now Python 3.8.
Content improvements summary
Privacy Content
- Improved the privacy content and added the controller/processor responsibilities for some tasks.
CIS Google Cloud Platform Foundation v1.2.0
- Added Additional Requirements for Google Cloud content under generic cloud Tasks. These Additional Requirements are based on CIS Benchmarks for Google Cloud Platform Foundations v1.2.0.
- Outdated Google Cloud content will be deprecated in a future release and has been assigned the match condition ("Applicable When" rule) of "Deprecated Google Cloud Content".
Content additions and updates (as of March 1, 2022):
Compliance Regulations and Mappings
- CIS Google Cloud Platform Foundation
T154: Do not store or cache credit card information on client [Updated]
- Updated text to improve the quality of the content.
- T177: Allow users to review and update their personal information [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T178: Obtain consent from users prior to collecting personal information [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T179: Allow access for users to remove their personal information from the system [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T194: Obtain user consent for tracking cookies [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- P732: Insufficient consent for user tracking [Updated]
- Updated the text to cover the GPC header
- T195: Design lawful procedures to obtain consent for processing personal information and to withdraw it when requested [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T244: Securely delete any unprotected sensitive data before a resource is released or shared [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T347: Fail to a known state with predefined outputs [Updated]
- Updated text to improve the quality of the content.
- T509: Protect the integrity of Hypercat catalogues and resources [Updated]
- Updated text to improve the quality of the content.
- T521: Protect the ZigBee network infrastructure with a Network Key [Updated]
- Updated text to improve the quality of the content.
- T544: Anonymize (de-identify) identifying information before using it for a secondary purpose [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T604: Implement a consent withdrawal mechanism [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T607: Develop automated tools/settings for destroying personal information when it is no longer needed [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T738: Determine the legal basis for transferring personal information [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- TA6226: Perform a Transfer Impact Assessment [Added]
- TA6227: Schrems II Requirements [Added]
- T740: Provide personal information and its processing information to users in an appropriate format [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T744: Protect pseudonymized personal information [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T751: Provide users with a notification of personal information processing [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T754: Enable the restriction of processing personal information of an individual for a specific purpose [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T837: Adhere to HTTP DNT header
- P732: Insufficient consent for user tracking [Updated]
- Updated the text to cover the GPC header
- P732: Insufficient consent for user tracking [Updated]
- T838: Test if your application adheres to HTTP DNT header
- P732: Insufficient consent for user tracking [Updated]
- Updated the text to cover the GPC header
- P732: Insufficient consent for user tracking [Updated]
- T959: Verify if TLS/SSL is securely configured for Microsoft IIS (Microsoft IIS) [Updated]
- Updated the text
- T1300: Enable multi-factor authentication for all non-service accounts (Google Cloud)
- TA3342: ASD-STIG requirements [Updated]
- Updated the title.
- TA3342: ASD-STIG requirements [Updated]
- T1310: Include sufficient information in the log files (Google Cloud)
- TA3344: ASD-STIG requirements [Updated]
- Updated the title.
- TA3344: ASD-STIG requirements [Updated]
- T1312: Version and backup logs (Google Cloud)
- TA3346: ASD-STIG requirements [Updated]
- Updated the title.
- TA3346: ASD-STIG requirements [Updated]
- T1314: Create log metric filters and alerts (Google Cloud)
- TA3348: ASD-STIG requirements [Updated]
- Updated the title.
- TA3348: ASD-STIG requirements [Updated]
- T1328: Configure cloud SQL database instance to require all incoming connections to use TLS (Google Cloud)
- TA3350: ASD-STIG requirements [Updated]
- Updated the title.
- TA3350: ASD-STIG requirements [Updated]
- T1356: Ensure VM disks for critical VMs are encrypted with Customer-Supplied Encryption Keys (CSEK) (Google Cloud)
- TA3358: ASD-STIG requirements [Updated]
- Updated the title.
- TA3358: ASD-STIG requirements [Updated]
- T1997: Manage image provenance using image controller configuration parameters (OpenShift) [Updated]
- Updated the title.
- T2128: Develop a process to notify users and regulators of breaches of personal information [Updated]
- Updated text to cover the responsibilities of the controllers and processors
- T2173: Ensure the expected behavior is implemented (Hardware/Firmware) [Updated]
- Updated text to improve the quality of the content.
- T2285: Set up and maintain cloud users and roles (Cloud)
- TA6060: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.1) [Added]
- TA6074: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.8) [Added]
- TA6080: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.11) [Added]
- TA6160: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.1) [Added]
- I1701: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.1) [Added]
- I1708: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.8) [Added]
- I1711: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.11) [Added]
- I1751: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.1) [Added]
- T2286: Configure a secure user authentication (Cloud)
- TA6062: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.2) [Added]
- TA6066: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.4) [Added]
- TA6072: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.7) [Added]
- TA6082: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.12) [Added]
- TA6084: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.13) [Added]
- TA6086: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.14) [Added]
- TA6088: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.15) [Added]
- I1702: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.2) [Added]
- I1704: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.4) [Added]
- I1707: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.7) [Added]
- I1712: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.12) [Added]
- I1713: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.13) [Added]
- I1714: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.14) [Added]
- I1715: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.15) [Added]
- T2287: Configure a secure user authorization (Cloud)
- TA6068: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.5) [Added]
- TA6070: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.6) [Added]
- I1705: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.5) [Added]
- I1706: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.6) [Added]
- T2289: Secure network access control (Cloud)
- TA6114: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.1) [Added]
- TA6116: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.2) [Added]
- TA6118: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.3) [Added]
- TA6120: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.4) [Added]
- TA6122: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.5) [Added]
- TA6124: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.6) [Added]
- TA6126: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.7) [Added]
- TA6128: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.8) [Added]
- TA6130: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.9) [Added]
- TA6132: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.10) [Added]
- TA6150: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.9) [Added]
- TA6206: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.5) [Added]
- TA6214: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.5) [Added]
- TA6216: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.6) [Added]
- I1728: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.1) [Added]
- I1729: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.2) [Added]
- I1730: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.3) [Added]
- I1731: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.4) [Added]
- I1732: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.5) [Added]
- I1733: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.6) [Added]
- I1734: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.7) [Added]
- I1735: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.8) [Added]
- I1736: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.9) [Added]
- I1737: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.10) [Added]
- I1746: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.9) [Added]
- I1774: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.5) [Added]
- I1778: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.5) [Added]
- I1779: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.6) [Added]
- T2290: Secure data in transit (Cloud)
- TA6152: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.10) [Added]
- TA6212: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.4) [Added]
- I1747: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.10) [Added]
- I1777: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.4) [Added]
- T2291: Secure hosts and operating systems (Cloud)
- TA6134: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.1) [Added]
- TA6136: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.2) [Added]
- TA6138: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.3) [Added]
- TA6140: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.4) [Added]
- TA6142: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.5) [Added]
- TA6144: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.6) [Added]
- TA6148: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.8) [Added]
- I1738: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.1) [Added]
- I1739: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.2) [Added]
- I1740: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.3) [Added]
- I1741: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.4) [Added]
- I1742: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.5) [Added]
- I1743: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.6) [Added]
- I1745: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.8) [Added]
- T2292: Protect data at rest (Cloud)
- TA6146: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.7) [Added]
- TA6154: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.11) [Added]
- TA6156: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 5.1) [Added]
- TA6158: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 5.2) [Added]
- TA6162: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.2) [Added]
- TA6164: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.3) [Added]
- TA6198: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.1) [Added]
- TA6200: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.2) [Added]
- TA6202: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.3) [Added]
- TA6204: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.4) [Added]
- TA6208: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.6) [Added]
- TA6210: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.7) [Added]
- TA6218: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.7) [Added]
- TA6220: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 7.1) [Added]
- TA6222: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 7.2) [Added]
- I1744: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.7) [Added]
- I1748: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.11) [Added]
- I1749: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 5.1) [Added]
- I1750: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 5.2) [Added]
- I1752: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.2) [Added]
- I1753: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.3) [Added]
- I1770: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.1) [Added]
- I1771: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.2) [Added]
- I1772: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.3) [Added]
- I1773: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.4) [Added]
- I1775: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.6) [Added]
- I1776: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.7) [Added]
- I1780: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.7) [Added]
- I1781: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 7.1) [Added]
- I1782: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 7.2) [Added]
- T2293: Enable logging and protect log files in your cloud environment (Cloud)
- TA6090: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.1) [Added]
- TA6092: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.2) [Added]
- TA6094: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.3) [Added]
- TA6166: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.1) [Added]
- TA6170: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.3) [Added]
- TA6172: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.4) [Added]
- TA6174: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.5) [Added]
- TA6176: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.6) [Added]
- TA6178: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.7) [Added]
- TA6180: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.8) [Added]
- TA6190: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.13) [Added]
- TA6192: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.14) [Added]
- TA6194: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.15) [Added]
- TA6196: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.16) [Added]
- I1716: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.1) [Added]
- I1717: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.2) [Added]
- I1718: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.3) [Added]
- I1754: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.1) [Added]
- I1756: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.3) [Added]
- I1757: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.4) [Added]
- I1758: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.5) [Added]
- I1759: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.6) [Added]
- I1760: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.7) [Added]
- I1761: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.8) [Added]
- I1766: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.13) [Added]
- I1767: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.14) [Added]
- I1768: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.15) [Added]
- I1769: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.16) [Added]
- T2294: Enable logs and configuration monitoring in your cloud environment (Cloud)
- TA6096: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.4) [Added]
- TA6098: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.5) [Added]
- TA6100: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.6) [Added]
- TA6102: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.7) [Added]
- TA6104: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.8) [Added]
- TA6106: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.9) [Added]
- TA6108: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.10) [Added]
- TA6110: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.11) [Added]
- TA6112: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.12) [Added]
- TA6168: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.2) [Added]
- TA6182: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.9) [Added]
- TA6184: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.10) [Added]
- TA6186: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.11) [Added]
- TA6188: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.12) [Added]
- I1719: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.4) [Added]
- I1720: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.5) [Added]
- I1721: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.6) [Added]
- I1722: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.7) [Added]
- I1723: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.8) [Added]
- I1724: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.9) [Added]
- I1725: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.10) [Added]
- I1726: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.11) [Added]
- I1727: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.12) [Added]
- I1755: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.2) [Added]
- I1762: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.9) [Added]
- I1763: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.10) [Added]
- I1764: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.11) [Added]
- I1765: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.12) [Added]
- T2295: Secure cloud key management system (Cloud)
- TA6064: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.3) [Added]
- TA6076: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.9) [Added]
- TA6078: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.10) [Added]
- TA6224: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 7.3) [Added]
- I1703: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.3) [Added]
- I1709: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.9) [Added]
- I1710: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.10) [Added]
- I1783: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 7.3) [Added]
- T2297: Verify that cloud users and roles are set up and maintained (Cloud)
- TA6061: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.1) [Added]
- TA6075: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.8) [Added]
- TA6081: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.11) [Added]
- TA6161: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.1) [Added]
- T2298: Verify that user authentication is securely configured (Cloud)
- TA6063: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.2) [Added]
- TA6067: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.4) [Added]
- TA6073: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.7) [Added]
- TA6083: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.12) [Added]
- TA6085: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.13) [Added]
- TA6087: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.14) [Added]
- TA6089: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.15) [Added]
- T2299: Verify that user authorization is securely configured (Cloud)
- TA6069: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.5) [Added]
- TA6071: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.6) [Added]
- T2301: Verify that network access control is secured (Cloud)
- TA6115: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.1) [Added]
- TA6117: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.2) [Added]
- TA6119: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.3) [Added]
- TA6121: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.4) [Added]
- TA6123: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.5) [Added]
- TA6125: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.6) [Added]
- TA6127: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.7) [Added]
- TA6129: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.8) [Added]
- TA6131: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 3.9) [Added]
- TA6133: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 3.10) [Added]
- TA6151: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.9) [Added]
- TA6207: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.5) [Added]
- TA6215: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.5) [Added]
- TA6217: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.6) [Added]
- T2302: Verify that data in transit is secured (Cloud)
- TA6153: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.10) [Added]
- TA6213: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.4) [Added]
- T2303: Verify that hosts and operating systems are secure (Cloud)
- TA6135: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.1) [Added]
- TA6137: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.2) [Added]
- TA6139: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.3) [Added]
- TA6141: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.4) [Added]
- TA6143: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.5) [Added]
- TA6145: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 4.6) [Added]
- TA6149: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.8) [Added]
- T2304: Verify that data at rest is protected (Cloud)
- TA6147: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.7) [Added]
- TA6155: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 4.11) [Added]
- TA6157: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 5.1) [Added]
- TA6159: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 5.2) [Added]
- TA6163: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.2) [Added]
- TA6165: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.1.3) [Added]
- TA6199: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.1) [Added]
- TA6201: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.2) [Added]
- TA6203: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.3) [Added]
- TA6205: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.4) [Added]
- TA6209: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.6) [Added]
- TA6211: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.3.7) [Added]
- TA6219: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.7) [Added]
- TA6221: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 7.1) [Added]
- TA6223: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 7.2) [Added]
- T2305: Verify that logging is enabled and log files are protected (Cloud)
- TA6091: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.1) [Added]
- TA6093: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.2) [Added]
- TA6095: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.3) [Added]
- TA6167: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.1) [Added]
- TA6171: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.3) [Added]
- TA6173: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.4) [Added]
- TA6175: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.5) [Added]
- TA6177: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.6) [Added]
- TA6179: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.7) [Added]
- TA6181: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.8) [Added]
- TA6191: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.13) [Added]
- TA6193: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.14) [Added]
- TA6195: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.15) [Added]
- TA6197: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 6.2.16) [Added]
- T2306: Verify that log monitoring and configuration monitoring are enabled (Cloud)
- TA6097: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.4) [Added]
- TA6099: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.5) [Added]
- TA6101: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.6) [Added]
- TA6103: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.7) [Added]
- TA6105: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.8) [Added]
- TA6107: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.9) [Added]
- TA6109: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.10) [Added]
- TA6111: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.11) [Added]
- TA6113: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 2.12) [Added]
- TA6169: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.2) [Added]
- TA6183: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.9) [Added]
- TA6185: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.10) [Added]
- TA6187: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.11) [Added]
- TA6189: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 6.2.12) [Added]
- T2307: Verify that the key management system is secured (Cloud)
- TA6065: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 1.3) [Added]
- TA6077: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.9) [Added]
- TA6079: CIS Google Cloud Platform Foundation v1.2.0 (Level 1, Recommendation 1.10) [Added]
- TA6225: CIS Google Cloud Platform Foundation v1.2.0 (Level 2, Recommendation 7.3) [Added]
- T2312: Ensure proper logging and security monitoring (Containerization) [Updated]
- Updated the text.
- T2332: Adhere to an appropriate Global Privacy Control (GPC) header [Added]
- P732: Insufficient consent for user tracking [Updated]
- Updated the text to cover the GPC header
- P732: Insufficient consent for user tracking [Updated]
T2333: Test if your application adheres to a Global Privacy Control (GPC) header [Added]
- P732: Insufficient consent for user tracking [Updated]
- Updated the text to cover the GPC header
- P732: Insufficient consent for user tracking [Updated]
Changes to Project Properties and Profiles
- Q276: Network Layer
- Q332: Microcontroller Protocols Used [Updated]
- INFO: Changed the title to "Microcontroller Protocols Used" and updated the content pack to "Application Security:Hardware/Embedded"
- A1282: CAN [Updated]
- INFO: Deleted "This is an automotive application" Match Condition and updated the content pack to "Application Security:Hardware/Embedded"
- Q332: Microcontroller Protocols Used [Updated]
- Q289: Cloud Computing
- Q290: Cloud Providers
- Q309: Google Cloud Services
- A1213: Kubernetes Engine [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1236: Cloud IAM [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1237: Compute Engine [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1238: Cloud Key Management Service [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1239: Virtual Private Cloud (VPC) [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1240: Cloud Storage [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1241: Cloud Audit Logs [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1242: Cloud DNS [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1243: Cloud SQL [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1244: Stackdriver [Updated]
- INFO: Updated Match Conditions from "Deprecated Google Cloud Content." to "Deprecated Google Cloud Content. OR New Google Cloud Content"
- A1337: BigQuery [Added]
- A1213: Kubernetes Engine [Updated]
- A1212: Deprecated Google Cloud Content [Updated]
- INFO: Updated the title.
- A1336: New Google Cloud Content [Added]
- Q309: Google Cloud Services
- Q290: Cloud Providers
- Q276: Network Layer
Glossary
- G33: Controller [Updated the text.]
- G34: Processor [Updated the text.]
New Just-in-Time Training
- Defending Cobol (11)
- Defending Ruby on Rails (12)
- DevSecOps for Managers (12)
- DevSecOps Fundamentals (23)
- Supply Chain and Software Acquisition (7)
5.19
February 19, 2022
New features and enhancements
- Integrations
- Remote Integration Agent
- Updated RIA Linux to offer builds with Python 3.8. Reach out to Support for more details.
- Python 3.6 will still be provided for Linux RIA with plans to deprecate in 5.20.
- Remote Integration Agent
Other product improvements
- Fixed a bug where some links in JIRA generated by the JIRA issue tracker integration were not rendering properly.
- Fixed a bug where LDAP syncs were failing.
- Fixed a bug where Project Tasks were not rendering properly.
Content improvements summary
Cloud/Amazon Web Service (AWS) update
- Added new generic story-driven cloud umbrella Tasks.
- Added new AWS Additional Requirements under the generic cloud umbrella Tasks.
- Added two new regulation mappings/reports based on the new generic cloud Tasks:
- CIS Amazon Web Services Foundations Benchmark (v1.4.0)
- CIS Amazon Web Services Three-tier Web Architecture Benchmark (v1.0.0)
- Added one question and two related answers to the Survey.
Privacy content update
- Added new Additional Requirements to cover gaps in SD Elements privacy content.
- Added and updated some test Tasks to cover the evidence for complying with regulatory requirements.
- Improved and updated some of the existing content.
Glossary updates
- Improved the title for "Personally Identifiable Information (PII) or personal information (PI)".
Content additions and updates (as of January 18, 2022):
Compliance Regulations and Mappings
- CIS AWS Foundations Benchmark
- CIS AWS Three-tier Web Architecture Benchmark
- CIS Amazon EKS Benchmark
T161: Treat unique device IDs as personal information [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA280: Unique device IDs in Android [Updated]
- Updated the text.
- TA942: iOS: Device Tracking [Updated]
- Updated the text.
- T171: Follow spam-free guidelines for sending solicitation emails [Updated]
- Updated the text.
- P722: Spam Emails [Updated]
- Updated the text.
- T176: Apply principles of privacy when handling personal information [Updated]
- Updated the text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA696: Inform users of the operation of RFID system and other security/privacy concerns [Updated]
- Updated the text.
- TA699: RFID Privacy Considerations [Updated]
- Updated the text.
- TA1327: FedRAMP / Moderate Baseline [Updated]
- Updated the text.
- TA2010: FedRAMP / Low Baseline [Updated]
- Updated the text.
- TA2325: FedRAMP / High Baseline [Updated]
- Updated the text.
- T177: Allow users to review and update their personal data [Updated]
- Improved the text.
- P815: Lack of features that allow access and modification of personal data [Updated]
- Improved the text.
- TA5927: Individual complaints and requests for data protection [Added]
- T178: Obtain consent from users prior to collecting personal information (where applicable) [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA788: Residents of California, USA [Updated]
- Updated the text.
- TA943: iOS: Purpose String [Updated]
- Updated the text.
- TA2009: FedRAMP / Low Baseline [Updated]
- Updated the text.
- TA2324: FedRAMP / High Baseline [Updated]
- Updated the text.
- TA2876: NIST 800-53 Privacy Controls: Consent [Updated]
- Updated the text.
- TA2883: Protect location information (Connected Cars) [Updated]
- Updated the text.
- T179: Allow access for users to remove their data from the system [Updated]
- Improved the text.
- P815: Lack of features that allow access and modification of personal data [Updated]
- Improved the text.
- T194: Obtain user consent for tracking cookies [Updated]
- Improved the text.
- TA781: GDPR: Profiling techniques [Updated]
- Improved the text.
- I324: Country-specific information [Updated]
- Improved the text.
- T195: Design lawful procedures to obtain consent for processing personal information and to withdraw it when requested (where applicable) [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- I326: Sensitive personal information is context-relative [Updated]
- Improved the title and text.
- T207: Provide special data protection for children's personal information [Updated]
- Updated the text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA814: COPPA [Updated]
- Updated the text.
- TA815: GDPR: Protection of children's personal information [Updated]
- Updated the text.
- TA1330: FedRAMP / Moderate Baseline [Updated]
- Updated the text.
- TA2008: FedRAMP / Low Baseline [Updated]
- Updated the text.
- TA2323: FedRAMP / High Baseline [Updated]
- Updated the text.
- T214: Protect confidential files on operating system or server
- P426: File and directory information exposure [Updated]
- Improved the title and text.
- TA2981: ASD-STIG requirements for T214 [Updated]
- Improved the text.
- P426: File and directory information exposure [Updated]
- T237: Test that solicitation emails follow spam-free guidelines [Updated]
- Updated the title and text.
- P722: Spam Emails [Updated]
- Updated the text.
- T238: Test that users can review and update their personal information [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T239: Test that users provide consent prior to the collection of personal information [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA1331: FedRAMP / Moderate Baseline [Updated]
- Updated the text.
- T240: Test whether users can remove their data from the system [Updated]
- Updated text to include latest guidance
- P815: Lack of features that allow access and modification of personal data [Updated]
- Improved the text.
- T304: Verify that unique device IDs are treated as personal information [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T313: Identify and classify categories of personal information [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA127: MDS2 Notes for T313 [Updated]
- Updated the text.
- TA538: NIST 800-53 / Moderate Baseline [Updated]
- Updated the text.
- TA630: NIST 800-82 / Low Baseline [Updated]
- Updated the text.
- TA777: GDPR: Data classification and labeling feature in database design [Updated]
- Updated the text.
- TA778: GDPR: Special categories of personal information [Updated]
- Updated the title and text.
- T314: Verify that personal and confidential information is identified and classified
- P257: Privacy Violation [Updated]
- Improved the text.
- TA128: MDS2 Notes for T314 [Updated]
- Updated the text.
- P257: Privacy Violation [Updated]
- T376: Fill out the manufacturer disclosure statement for the medical device security (MDS2) form
- TA1389: FedRAMP / Moderate Baseline [Updated]
- Updated the text.
- TA2364: FedRAMP / High Baseline [Updated]
- Updated the text.
- TA1389: FedRAMP / Moderate Baseline [Updated]
- T377: De-identify protected health information before using it for a secondary purpose [Updated]
- Updated the text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA144: MDS2 Notes for T377 [Updated]
- Updated the text.
- T544: Anonymize (de-identify) identifying information before using it for a secondary purpose
- P257: Privacy Violation [Updated]
- Improved the text.
- P257: Privacy Violation [Updated]
- T545: Verify that personal information is anonymized before being reused for secondary purposes [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T604: Implement a consent withdrawal mechanism [Updated]
- Updated the text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T605: Verify if consent is obtained prior to personal information collection (where applicable) [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T607: Develop automated tools/settings for destroying personal information when it is no longer needed [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA776: GDPR conditions for information erasure [Updated]
- Updated the title and text.
- T735: Verify that personal information is removed when it is no longer needed [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA2875: NIST 800-53 Privacy Controls: Data Retention and Disposal [Updated]
- Updated the text.
- T738: Determine the legal basis for transferring personal information [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA779: GDPR: Circumstances of personal information transfer [Updated]
- Updated the title and text.
- TA5923: APEC cross border privacy rules [Added]
- T739: Verify if transferring personal information is legitimate and in compliance with applicable privacy regulations [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T740: Provide personal information and its processing information to users in an appropriate format [Updated]
- Improved text and title.
- P815: Lack of features that allow access and modification of personal data [Updated]
- Improved the text.
- T741: Verify if users are provided with their personal data and its processing information in an appropriate format
- P815: Lack of features that allow access and modification of personal data [Updated]
- Improved the text.
- P815: Lack of features that allow access and modification of personal data [Updated]
- T742: Implement technical measures to ensure the accuracy of personal information [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA2873: NIST 800-53 Privacy Controls: Data Quality [Updated]
- Updated the text.
- T743: Verify accuracy of personal information [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T744: Protect pseudonymized personal information [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T745: Verify if pseudonymized personal information is protected [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T750: Limit personal information collection and processing to the specified purpose [Updated]
- Improved the title
- P859: Collecting more personal information than is required for specified purposes [Updated]
- Improved the title and text.
- TA2864: CCPA: Service Provider Obligations [Updated]
- Improved the text.
- TA2868: NIST 800-53 Privacy Controls: Purpose Specification and Use Limitation [Updated]
- Improved the text.
- T751: Provide users with a notification of personal information processing [Updated]
- Improved the title and text.
- P815: Lack of features that allow access and modification of personal data [Updated]
- Improved the text.
- TA944: iOS: Privacy Notice [Updated]
- Improved the text.
- TA975: GDPR: Data processing notification [Updated]
- Improved the text.
- T752: Verify if users are notified about processing their personal information [Updated]
- Improved the title and text.
- P815: Lack of features that allow access and modification of personal data [Updated]
- Improved the text.
- T753: Verify whether personal information is collected only for specified purposes [Updated]
- Improved the title
- P859: Collecting more personal information than is required for specified purposes [Updated]
- Improved the title and text.
- T754: Enable the restriction of processing personal information of an individual for a specific purpose [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T755: Maintain a Data Processing Register or Record of Business Processing Activities [Updated]
- Improved title and text.
- P861: Inadequate documentation of data processing activities [Updated]
- Improved the title and text.
- TA1435: FedRAMP / Moderate Baseline [Updated]
- Improved the text.
- TA5918: Register databases with regulators [Added]
- TA5919: Data flow [Added]
- TA5921: Binding corporate rules [Added]
- TA5922: Data transfer contracts [Added]
- T756: Verify if personal data processing activities are recorded and maintained [Updated]
- Improved the text.
- P861: Inadequate documentation of data processing activities [Updated]
- Improved the title and text.
- T757: Verify if personal information processing stops when user objects to it [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- T837: Adhere to HTTP DNT header
- TA1858: FedRAMP / Moderate Baseline [Updated]
- Improved the text.
- TA2769: FedRAMP / High Baseline [Updated]
- Improved the text.
- TA1858: FedRAMP / Moderate Baseline [Updated]
- T863: Secure Apache directories and files (Apache HTTP Server)
- P426: File and directory information exposure [Updated]
- Improved the title and text.
- P426: File and directory information exposure [Updated]
- T864: Test that Apache directories and files are secure (Apache HTTP Server)
- P426: File and directory information exposure [Updated]
- Improved the title and text.
- P426: File and directory information exposure [Updated]
- T1366: Identify applicable compliance regulations
- TA6058: Comply with ANSSI's encryption control requirements if needed [Added]
- TA6059: Implement eIDAS requirements for electronic identification and trust services [Added]
- T1386: Regulate the use of electronic messaging [Updated]
- Improved the text.
- T1891: Perform Privacy Impact Assessment (PIA) [Updated]
- Improved the text.
- TA5928: Internal data privacy self-assessment [Added]
- T1892: Perform a Threat and Risk Assessment (TRA)
- T2128: Develop a process to notify users and regulators of breaches of personal information
- P257: Privacy Violation [Updated]
- Improved the text.
- P257: Privacy Violation [Updated]
- T2170: Ensure that personal information processed by the application meets data localization requirements [Updated]
- Updated the title and text.
- P257: Privacy Violation [Updated]
- Improved the text.
- TA3485: China Cybersecurity Law (Article 37) - Data Localization [Updated]
- Updated the text.
- T2285: Set up and maintain cloud users and roles (Cloud) [Added]
- P1658: Improper identity management (Cloud) [Added]
- TA5610: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.1) [Added]
- TA5612: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.2) [Added]
- TA5614: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.3) [Added]
- TA5642: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.17) [Added]
- I1502: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.1) [Added]
- I1503: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.2) [Added]
- I1504: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.3) [Added]
- I1518: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.17) [Added]
- T2286: Configure a secure user authentication (Cloud) [Added]
- P1659: Improper user authentication (Cloud) [Added]
- TA5616: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.4) [Added]
- TA5618: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.5) [Added]
- TA5620: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 1.6) [Added]
- TA5622: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.7) [Added]
- TA5624: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.8) [Added]
- TA5626: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.9) [Added]
- TA5628: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.10) [Added]
- TA5630: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.11) [Added]
- TA5632: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.12) [Added]
- TA5634: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.13) [Added]
- TA5636: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.14) [Added]
- TA5646: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.19) [Added]
- I1505: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.4) [Added]
- I1506: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.5) [Added]
- I1507: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 1.6) [Added]
- I1508: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.7) [Added]
- I1509: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.8) [Added]
- I1510: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.9) [Added]
- I1511: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.10) [Added]
- I1512: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.11) [Added]
- I1513: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.12) [Added]
- I1514: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.13) [Added]
- I1515: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.14) [Added]
- I1520: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.19) [Added]
- T2287: Configure a secure user authorization (Cloud) [Added]
- P1660: Permissive access policies or improper access control (Cloud) [Added]
- TA5638: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.15) [Added]
- TA5640: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.16) [Added]
- TA5644: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 1.18) [Added]
- TA5648: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.20) [Added]
- TA5650: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 1.21) [Added]
- TA5760: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.1) [Added]
- TA5762: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.2) [Added]
- TA5764: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.3) [Added]
- TA5766: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.4) [Added]
- TA5768: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.5) [Added]
- TA5770: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.6) [Added]
- TA5772: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.7) [Added]
- TA5774: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.8) [Added]
- TA5776: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.9) [Added]
- TA5778: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.10) [Added]
- I1516: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.15) [Added]
- I1517: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.16) [Added]
- I1519: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 1.18) [Added]
- I1521: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.20) [Added]
- I1522: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 1.21) [Added]
- I1577: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.1) [Added]
- I1578: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.2) [Added]
- I1579: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.3) [Added]
- I1580: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.4) [Added]
- I1581: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.5) [Added]
- I1582: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.6) [Added]
- I1583: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.7) [Added]
- I1584: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.8) [Added]
- I1585: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.9) [Added]
- I1586: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.10) [Added]
- T2288: Design a secure application architecture for the cloud environment (Cloud) [Added]
- P1661: Design weakness in application security architecture (Cloud) [Added]
- TA5780: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.1) [Added]
- TA5782: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.2) [Added]
- TA5784: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.3) [Added]
- TA5786: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.4) [Added]
- TA5788: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.5) [Added]
- TA5790: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.6) [Added]
- TA5792: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.8) [Added]
- TA5794: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.9) [Added]
- TA5796: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.10) [Added]
- TA5798: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.11) [Added]
- TA5804: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.14) [Added]
- TA5806: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.15) [Added]
- TA5850: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.3) [Added]
- TA5854: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.5) [Added]
- TA5856: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.6) [Added]
- TA5858: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.7) [Added]
- TA5860: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.8) [Added]
- TA5862: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.9) [Added]
- TA5864: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.10) [Added]
- TA5908: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.32) [Added]
- TA5910: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.33) [Added]
- I1587: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.1) [Added]
- I1588: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.2) [Added]
- I1589: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.3) [Added]
- I1590: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.4) [Added]
- I1591: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.5) [Added]
- I1592: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.6) [Added]
- I1593: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.8) [Added]
- I1594: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.9) [Added]
- I1595: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.10) [Added]
- I1596: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.11) [Added]
- I1599: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.14) [Added]
- I1600: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.15) [Added]
- I1622: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.3) [Added]
- I1624: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.5) [Added]
- I1625: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.6) [Added]
- I1626: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.7) [Added]
- I1627: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.8) [Added]
- I1628: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.9) [Added]
- I1629: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.10) [Added]
- I1651: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.32) [Added]
- I1652: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.33) [Added]
- T2289: Secure network access control (Cloud) [Added]
- P1662: Improper network access control (Cloud) [Added]
- TA5718: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 5.1) [Added]
- TA5720: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 5.2) [Added]
- TA5722: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 5.3) [Added]
- TA5724: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 5.4) [Added]
- TA5846: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.1) [Added]
- TA5848: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.2) [Added]
- TA5852: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.4) [Added]
- TA5866: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.11) [Added]
- TA5868: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.12) [Added]
- TA5870: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.13) [Added]
- TA5872: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.14) [Added]
- TA5874: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.15) [Added]
- TA5876: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.16) [Added]
- TA5878: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.17) [Added]
- TA5888: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.22) [Added]
- TA5890: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.23) [Added]
- TA5892: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.24) [Added]
- TA5894: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.25) [Added]
- TA5896: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.26) [Added]
- TA5898: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.27) [Added]
- TA5900: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.28) [Added]
- TA5902: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.29) [Added]
- TA5904: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.30) [Added]
- TA5906: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.31) [Added]
- TA5912: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.34) [Added]
- I1556: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 5.1) [Added]
- I1557: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 5.2) [Added]
- I1558: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 5.3) [Added]
- I1559: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 5.4) [Added]
- I1620: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.1) [Added]
- I1621: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.2) [Added]
- I1623: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.4) [Added]
- I1630: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.11) [Added]
- I1631: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.12) [Added]
- I1632: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.13) [Added]
- I1633: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.14) [Added]
- I1634: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.15) [Added]
- I1635: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.16) [Added]
- I1636: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.17) [Added]
- I1641: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.22) [Added]
- I1642: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.23) [Added]
- I1643: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.24) [Added]
- I1644: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.25) [Added]
- I1645: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.26) [Added]
- I1646: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.27) [Added]
- I1647: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.28) [Added]
- I1648: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.29) [Added]
- I1649: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.30) [Added]
- I1650: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.31) [Added]
- I1653: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.34) [Added]
- T2290: Secure data in transit (Cloud) [Added]
- P1663: Improper protection of data in transit (Cloud) [Added]
- TA5742: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.9) [Added]
- TA5746: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.11) [Added]
- TA5748: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.12) [Added]
- TA5750: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.13) [Added]
- TA5752: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.14) [Added]
- TA5754: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.15) [Added]
- TA5758: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.17) [Added]
- TA5800: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 3.12) [Added]
- TA5802: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 3.13) [Added]
- TA5880: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.18) [Added]
- TA5882: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.19) [Added]
- TA5884: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.20) [Added]
- TA5886: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.21) [Added]
- I1568: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.9) [Added]
- I1570: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.11) [Added]
- I1571: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.12) [Added]
- I1572: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.13) [Added]
- I1573: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.14) [Added]
- I1574: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.15) [Added]
- I1576: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.17) [Added]
- I1597: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 3.12) [Added]
- I1598: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 3.13) [Added]
- I1637: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.18) [Added]
- I1638: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.19) [Added]
- I1639: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.20) [Added]
- I1640: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.21) [Added]
- T2291: Secure hosts and operating systems (Cloud) [Added]
- P1664: Weak host/OS security (Cloud) [Added]
- TA5738: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.7) [Added]
- TA5740: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.8) [Added]
- TA5844: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.12) [Added]
- I1566: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.7) [Added]
- I1567: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.8) [Added]
- I1619: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.12) [Added]
- T2292: Protect data at rest (Cloud) [Added]
- P1665: Improper protection of data at rest (Cloud) [Added]
- TA5652: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 2.1.1) [Added]
- TA5654: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 2.1.2) [Added]
- TA5656: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.1.3) [Added]
- TA5658: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 2.1.4) [Added]
- TA5660: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.1.5) [Added]
- TA5662: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.2.1) [Added]
- TA5664: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.3.1) [Added]
- TA5732: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.4) [Added]
- TA5734: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.5) [Added]
- TA5736: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.6) [Added]
- TA5744: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.10) [Added]
- TA5756: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.16) [Added]
- TA5840: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.10) [Added]
- TA5842: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.11) [Added]
- I1523: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 2.1.1) [Added]
- I1524: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 2.1.2) [Added]
- I1525: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.1.3) [Added]
- I1526: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 2.1.4) [Added]
- I1527: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.1.5) [Added]
- I1528: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.2.1) [Added]
- I1529: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.3.1) [Added]
- I1563: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.4) [Added]
- I1564: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.5) [Added]
- I1565: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.6) [Added]
- I1569: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.10) [Added]
- I1575: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.16) [Added]
- I1617: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.10) [Added]
- I1618: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.11) [Added]
- T2293: Enable logging and protect log files in your cloud environment (Cloud) [Added]
- P1666: Lack of activity tracking and secure logging (Cloud) [Added]
- TA5666: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.1) [Added]
- TA5668: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.2) [Added]
- TA5670: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.3) [Added]
- TA5672: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.4) [Added]
- TA5674: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.5) [Added]
- TA5676: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.6) [Added]
- TA5678: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.7) [Added]
- TA5680: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.8) [Added]
- TA5682: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.9) [Added]
- TA5684: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.10) [Added]
- TA5686: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.11) [Added]
- TA5808: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.1) [Added]
- TA5810: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.2) [Added]
- TA5816: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.6) [Added]
- TA5818: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.7) [Added]
- TA5822: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.1) [Added]
- TA5824: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.2) [Added]
- TA5826: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.3) [Added]
- TA5828: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.4) [Added]
- TA5830: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.5) [Added]
- TA5832: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.6) [Added]
- TA5834: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.7) [Added]
- TA5836: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.8) [Added]
- TA5838: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.9) [Added]
- I1530: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.1) [Added]
- I1531: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.2) [Added]
- I1532: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.3) [Added]
- I1533: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.4) [Added]
- I1534: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.5) [Added]
- I1535: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.6) [Added]
- I1536: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.7) [Added]
- I1537: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.8) [Added]
- I1538: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.9) [Added]
- I1539: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.10) [Added]
- I1540: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.11) [Added]
- I1601: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.1) [Added]
- I1602: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.2) [Added]
- I1605: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.6) [Added]
- I1606: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.7) [Added]
- I1608: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.1) [Added]
- I1609: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.2) [Added]
- I1610: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.3) [Added]
- I1611: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.4) [Added]
- I1612: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.5) [Added]
- I1613: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.6) [Added]
- I1614: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.7) [Added]
- I1615: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.8) [Added]
- I1616: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.9) [Added]
- T2294: Enable logs and configuration monitoring in your cloud environment (Cloud) [Added]
- P1667: Lack of monitoring (Cloud) [Added]
- TA5688: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.1) [Added]
- TA5690: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.2) [Added]
- TA5692: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.3) [Added]
- TA5694: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.4) [Added]
- TA5696: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.5) [Added]
- TA5698: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.6) [Added]
- TA5700: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.7) [Added]
- TA5702: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.8) [Added]
- TA5704: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.9) [Added]
- TA5706: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.10) [Added]
- TA5708: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.11) [Added]
- TA5710: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.12) [Added]
- TA5712: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.13) [Added]
- TA5714: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.14) [Added]
- TA5716: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.15) [Added]
- TA5812: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.3) [Added]
- TA5814: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.4) [Added]
- TA5820: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.8) [Added]
- I1541: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.1) [Added]
- I1542: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.2) [Added]
- I1543: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.3) [Added]
- I1544: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.4) [Added]
- I1545: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.5) [Added]
- I1546: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.6) [Added]
- I1547: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.7) [Added]
- I1548: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.8) [Added]
- I1549: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.9) [Added]
- I1550: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.10) [Added]
- I1551: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.11) [Added]
- I1552: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.12) [Added]
- I1553: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.13) [Added]
- I1554: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.14) [Added]
- I1555: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.15) [Added]
- I1603: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.3) [Added]
- I1604: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.4) [Added]
- I1607: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.8) [Added]
- T2295: Secure cloud key management system (Cloud) [Added]
- P1668: Insecure key management (Cloud) [Added]
- TA5726: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.1) [Added]
- TA5728: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.2) [Added]
- TA5730: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.3) [Added]
- I1560: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.1) [Added]
- I1561: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.2) [Added]
- I1562: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.3) [Added]
- T2297: Verify that cloud users and roles are set up and maintained (Cloud) [Added]
- P1658: Improper identity management (Cloud) [Added]
- TA5611: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.1) [Added]
- TA5613: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.2) [Added]
- TA5615: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.3) [Added]
- TA5643: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.17) [Added]
- T2298: Verify that user authentication is securely configured (Cloud) [Added]
- P1659: Improper user authentication (Cloud) [Added]
- TA5617: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.4) [Added]
- TA5619: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.5) [Added]
- TA5621: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 1.6) [Added]
- TA5623: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.7) [Added]
- TA5625: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.8) [Added]
- TA5627: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.9) [Added]
- TA5629: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.10) [Added]
- TA5631: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.11) [Added]
- TA5633: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.12) [Added]
- TA5635: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.13) [Added]
- TA5637: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.14) [Added]
- TA5647: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.19) [Added]
- T2299: Verify that user authorization is securely configured (Cloud) [Added]
- P1660: Permissive access policies or improper access control (Cloud) [Added]
- TA5639: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.15) [Added]
- TA5641: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.16) [Added]
- TA5645: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 1.18) [Added]
- TA5649: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 1.20) [Added]
- TA5651: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 1.21) [Added]
- TA5761: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.1) [Added]
- TA5763: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.2) [Added]
- TA5765: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.3) [Added]
- TA5767: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.4) [Added]
- TA5769: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.5) [Added]
- TA5771: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.6) [Added]
- TA5773: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.7) [Added]
- TA5775: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.8) [Added]
- TA5777: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.9) [Added]
- TA5779: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 2.10) [Added]
- T2300: Verify that a secure application architecture is designed for the cloud environment (Cloud) [Added]
- P1661: Design weakness in application security architecture (Cloud) [Added]
- TA5781: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.1) [Added]
- TA5783: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.2) [Added]
- TA5785: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.3) [Added]
- TA5787: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.4) [Added]
- TA5789: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.5) [Added]
- TA5791: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.6) [Added]
- TA5793: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.8) [Added]
- TA5795: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.9) [Added]
- TA5797: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.10) [Added]
- TA5799: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.11) [Added]
- TA5805: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.14) [Added]
- TA5807: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 3.15) [Added]
- TA5851: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.3) [Added]
- TA5855: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.5) [Added]
- TA5857: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.6) [Added]
- TA5859: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.7) [Added]
- TA5861: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.8) [Added]
- TA5863: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.9) [Added]
- TA5865: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.10) [Added]
- TA5909: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.32) [Added]
- TA5911: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.33) [Added]
- T2301: Verify that network access control is secured (Cloud) [Added]
- P1662: Improper network access control (Cloud) [Added]
- TA5719: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 5.1) [Added]
- TA5721: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 5.2) [Added]
- TA5723: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 5.3) [Added]
- TA5725: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 5.4) [Added]
- TA5847: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.1) [Added]
- TA5849: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.2) [Added]
- TA5853: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.4) [Added]
- TA5867: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.11) [Added]
- TA5869: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.12) [Added]
- TA5871: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.13) [Added]
- TA5873: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.14) [Added]
- TA5875: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.15) [Added]
- TA5877: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.16) [Added]
- TA5879: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.17) [Added]
- TA5889: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.22) [Added]
- TA5891: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.23) [Added]
- TA5893: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.24) [Added]
- TA5895: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.25) [Added]
- TA5897: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.26) [Added]
- TA5899: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.27) [Added]
- TA5901: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.28) [Added]
- TA5903: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.29) [Added]
- TA5905: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.30) [Added]
- TA5907: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 6.31) [Added]
- TA5913: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.34) [Added]
- T2302: Verify that data in transit is secured (Cloud) [Added]
- P1663: Improper protection of data in transit (Cloud) [Added]
- TA5743: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.9) [Added]
- TA5747: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.11) [Added]
- TA5749: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.12) [Added]
- TA5751: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.13) [Added]
- TA5753: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.14) [Added]
- TA5755: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.15) [Added]
- TA5759: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.17) [Added]
- TA5801: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 3.12) [Added]
- TA5803: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 3.13) [Added]
- TA5881: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.18) [Added]
- TA5883: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.19) [Added]
- TA5885: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.20) [Added]
- TA5887: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 6.21) [Added]
- T2303: Verify that hosts and operating systems are secure (Cloud) [Added]
- P1664: Weak host/OS security (Cloud) [Added]
- TA5739: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.7) [Added]
- TA5741: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.8) [Added]
- TA5845: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.12) [Added]
- T2304: Verify that data at rest is protected (Cloud) [Added]
- P1665: Improper protection of data at rest (Cloud) [Added]
- TA5653: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 2.1.1) [Added]
- TA5655: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 2.1.2) [Added]
- TA5657: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.1.3) [Added]
- TA5659: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 2.1.4) [Added]
- TA5661: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.1.5) [Added]
- TA5663: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.2.1) [Added]
- TA5665: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 2.3.1) [Added]
- TA5733: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.4) [Added]
- TA5735: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.5) [Added]
- TA5737: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.6) [Added]
- TA5745: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.10) [Added]
- TA5757: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 1.16) [Added]
- TA5841: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.10) [Added]
- TA5843: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.11) [Added]
- T2305: Verify that logging is enabled and log files are protected (Cloud) [Added]
- P1666: Lack of activity tracking and secure logging (Cloud) [Added]
- TA5667: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.1) [Added]
- TA5669: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.2) [Added]
- TA5671: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.3) [Added]
- TA5673: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.4) [Added]
- TA5675: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.5) [Added]
- TA5677: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 3.6) [Added]
- TA5679: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.7) [Added]
- TA5681: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.8) [Added]
- TA5683: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.9) [Added]
- TA5685: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.10) [Added]
- TA5687: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 3.11) [Added]
- TA5809: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.1) [Added]
- TA5811: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.2) [Added]
- TA5817: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.6) [Added]
- TA5819: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.7) [Added]
- TA5823: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.1) [Added]
- TA5825: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.2) [Added]
- TA5827: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.3) [Added]
- TA5829: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.4) [Added]
- TA5831: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.5) [Added]
- TA5833: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.6) [Added]
- TA5835: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.7) [Added]
- TA5837: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.8) [Added]
- TA5839: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 5.9) [Added]
- T2306: Verify that log monitoring and configuration monitoring are enabled (Cloud) [Added]
- P1667: Lack of monitoring (Cloud) [Added]
- TA5689: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.1) [Added]
- TA5691: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.2) [Added]
- TA5693: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.3) [Added]
- TA5695: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.4) [Added]
- TA5697: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.5) [Added]
- TA5699: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.6) [Added]
- TA5701: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.7) [Added]
- TA5703: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.8) [Added]
- TA5705: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.9) [Added]
- TA5707: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.10) [Added]
- TA5709: CIS AWS Foundation v1.4.0 (Level 2, Recommendation 4.11) [Added]
- TA5711: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.12) [Added]
- TA5713: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.13) [Added]
- TA5715: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.14) [Added]
- TA5717: CIS AWS Foundation v1.4.0 (Level 1, Recommendation 4.15) [Added]
- TA5813: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.3) [Added]
- TA5815: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.4) [Added]
- TA5821: CIS AWS Three-tier Web Architecture v1.0.0 (Level 1, Recommendation 4.8) [Added]
- T2307: Verify that the key management system is secured (Cloud) [Added]
- P1668: Insecure key management (Cloud) [Added]
- TA5727: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.1) [Added]
- TA5729: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.2) [Added]
- TA5731: CIS AWS Three-tier Web Architecture v1.0.0 (Level 2, Recommendation 1.3) [Added]
- T2309: Securely configure worker nodes (Containerization) [Added]
- P1671: Insecure configuration of worker nodes (Containerization) [Added]
- TA5962: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.1) [Added]
- TA5964: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.2) [Added]
- TA5966: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.3) [Added]
- TA5968: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.4) [Added]
- TA5970: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.1) [Added]
- TA5974: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.3) [Added]
- TA5976: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.4) [Added]
- TA5978: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.5) [Added]
- TA5980: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.6) [Added]
- TA5982: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.7) [Added]
- TA5984: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.8) [Added]
- TA5986: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.11) [Added]
- TA6033: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.9) [Added]
- TA6035: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.10) [Added]
- I1654: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.1) [Added]
- I1655: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.2) [Added]
- I1656: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.3) [Added]
- I1657: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.4) [Added]
- I1658: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.1) [Added]
- I1659: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.3) [Added]
- I1660: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.4) [Added]
- I1661: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.5) [Added]
- I1662: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.6) [Added]
- I1663: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.7) [Added]
- I1664: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.8) [Added]
- I1665: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.11) [Added]
- I1666: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.9) [Added]
- I1667: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.10) [Added]
- T2310: Implement proper authentication and authorization (Containerization) [Added]
- P1672: Lack of proper authentication and authorization (Containerization) [Added]
- TA5972: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.2) [Added]
- TA5988: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.1) [Added]
- TA5992: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.3) [Added]
- TA5994: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.4) [Added]
- TA5996: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.5) [Added]
- TA5998: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.6) [Added]
- TA6000: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.1) [Added]
- TA6002: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.2) [Added]
- TA6004: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.3) [Added]
- TA6006: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.4) [Added]
- TA6008: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.5) [Added]
- TA6010: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.7) [Added]
- TA6012: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.8) [Added]
- TA6020: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.2) [Added]
- TA6027: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.1) [Added]
- TA6037: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.6) [Added]
- TA6039: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.9) [Added]
- TA6051: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.3) [Added]
- TA6056: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.5.1) [Added]
- I1668: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.2) [Added]
- I1669: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.1) [Added]
- I1670: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.3) [Added]
- I1671: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.4) [Added]
- I1672: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.5) [Added]
- I1673: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.6) [Added]
- I1674: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.1) [Added]
- I1675: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.2) [Added]
- I1676: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.3) [Added]
- I1677: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.4) [Added]
- I1678: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.5) [Added]
- I1679: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.7) [Added]
- I1680: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.8) [Added]
- I1681: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.2) [Added]
- I1682: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.1) [Added]
- I1683: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.6) [Added]
- I1684: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.9) [Added]
- I1685: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.3) [Added]
- I1686: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.5.1) [Added]
- T2311: Ensure proper network settings and configuration (Containerization) [Added]
- P1673: Improper network settings and configuration (Containerization) [Added]
- TA6029: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.3) [Added]
- TA6030: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.4) [Added]
- TA6041: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.3.2) [Added]
- TA6054: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.4.2) [Added]
- TA6055: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.4.5) [Added]
- I1687: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.3.2) [Added]
- T2312: Ensure proper logging and security monitoring (Containerization) [Added]
- P1674: Inadequate logging and security monitoring (Containerization) [Added]
- TA5960: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 2.1.1) [Added]
- I1688: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 2.1.1) [Added]
- T2313: Keep data and secrets safe (Containerization) [Added]
- P1675: Lack of data and secrets protection (Containerization) [Added]
- TA5990: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.2) [Added]
- TA6025: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.3.1) [Added]
- TA6043: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.4.1) [Added]
- TA6045: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.4.2) [Added]
- I1689: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.2) [Added]
- I1690: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.3.1) [Added]
- I1691: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.4.1) [Added]
- I1692: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.4.2) [Added]
- T2314: Enforce secure policies (Containerization) [Added]
- P1676: Lack of secure policies (Containerization) [Added]
- TA6014: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.3.1) [Added]
- TA6016: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.6.1) [Added]
- TA6047: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.5.1) [Added]
- TA6049: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.2) [Added]
- I1693: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.3.1) [Added]
- I1694: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.6.1) [Added]
- I1695: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.5.1) [Added]
- I1696: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.2) [Added]
- T2315: Use managed services (Containerization) [Added]
- P1677: Using unmanaged services (Containerization) [Added]
- TA6018: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.1) [Added]
- TA6021: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.3) [Added]
- TA6023: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.2.1) [Added]
- TA6031: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.6.1) [Added]
- TA6053: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.1.4) [Added]
- I1697: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.1) [Added]
- I1698: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.3) [Added]
- I1699: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.2.1) [Added]
- I1700: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.6.1) [Added]
- T2317: Verify worker nodes are configured securely (Containerization) [Added]
- P1671: Insecure configuration of worker nodes (Containerization) [Added]
- TA5963: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.1) [Added]
- TA5965: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.2) [Added]
- TA5967: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.3) [Added]
- TA5969: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.1.4) [Added]
- TA5971: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.1) [Added]
- TA5975: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.3) [Added]
- TA5977: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.4) [Added]
- TA5979: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.5) [Added]
- TA5981: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.6) [Added]
- TA5983: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.7) [Added]
- TA5985: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.8) [Added]
- TA5987: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.11) [Added]
- TA6034: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.9) [Added]
- TA6036: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 3.2.10) [Added]
- T2318: Verify proper authentication and authorization are implemented (Containerization) [Added]
- P1672: Lack of proper authentication and authorization (Containerization) [Added]
- TA5973: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 3.2.2) [Added]
- TA5989: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.1) [Added]
- TA5993: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.3) [Added]
- TA5995: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.4) [Added]
- TA5997: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.5) [Added]
- TA5999: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.6) [Added]
- TA6001: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.1) [Added]
- TA6003: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.2) [Added]
- TA6005: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.3) [Added]
- TA6007: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.4) [Added]
- TA6009: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.5) [Added]
- TA6011: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.7) [Added]
- TA6013: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.2.8) [Added]
- TA6028: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.4.1) [Added]
- TA6038: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.6) [Added]
- TA6040: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.2.9) [Added]
- TA6052: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.3) [Added]
- TA6057: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 5.5.1) [Added]
- T2319: Verify proper network settings and configuration (Containerization) [Added]
- P1673: Improper network settings and configuration (Containerization) [Added]
- TA6042: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.3.2) [Added]
- T2320: Verify proper logging and security monitoring are implemented (Containerization) [Added]
- P1674: Inadequate logging and security monitoring (Containerization) [Added]
- TA5961: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 2.1.1) [Added]
- T2321: Verify data and secrets are kept safe (Containerization) [Added]
- P1675: Lack of data and secrets protection (Containerization) [Added]
- TA5991: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.1.2) [Added]
- TA6026: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.3.1) [Added]
- TA6044: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.4.1) [Added]
- TA6046: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.4.2) [Added]
- T2322: Verify secure policies are enforced (Containerization) [Added]
- P1676: Lack of secure policies (Containerization) [Added]
- TA6015: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.3.1) [Added]
- TA6017: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 4.6.1) [Added]
- TA6048: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.5.1) [Added]
- TA6050: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 2, Recommendation 4.6.2) [Added]
- T2323: Verify managed services are used (Containerization) [Added]
- P1677: Using unmanaged services (Containerization) [Added]
- TA6019: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.1) [Added]
- TA6022: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.1.3) [Added]
- TA6024: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.2.1) [Added]
- TA6032: CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.1 (Level 1, Recommendation 5.6.1) [Added]
- T2324: Verify whether privacy principles are applied for handling personal data [Added]
- P257: Privacy Violation [Updated]
- Improved the text.
- P257: Privacy Violation [Updated]
- T2327: Verify if a Privacy Impact Assessment is performed [Added]
- T2328: Verify if proper policies exist for processing sensitive personal data [Added]
- T2329: Verify if health data is handled securely [Added]
- T2330: Verify if children's personal information is handled securely [Added]
- P257: Privacy Violation [Updated]
- Improved the text.
- P257: Privacy Violation [Updated]
T2331: Verify whether any plan exists for data privacy incident response [Added]
- P257: Privacy Violation [Updated]
- Improved the text.
- P257: Privacy Violation [Updated]
Changes to Project Properties and Profiles
- Q195: Language and Framework
- Q109: Programming Language
- Q110: Technology/Framework
- A47: Java EE [Updated]
- Removed "A74: Apache" and "A204: Apache HTTP Server 2.0" from match conditions
- A47: Java EE [Updated]
- Q110: Technology/Framework
- Q109: Programming Language
- Q205: Geography
- Q159: Organization is Subject to Laws of:
- A1334: France [Added]
- Q159: Organization is Subject to Laws of:
- Q237: Compliance Scope: Other
- Q345: In-Scope for Regulation (EU) 910/2014 (eIDAS Regulation) [Added]
- A1335: Yes [Added]
- Q345: In-Scope for Regulation (EU) 910/2014 (eIDAS Regulation) [Added]
- Q289: Cloud Computing
- Q290: Cloud Providers
- A1159: Deprecated Amazon Web Services (AWS) Content [Updated]
- A1333: New Amazon Web Services (AWS) Content [Added]
- Q343: New Generic Cloud Content [Added]
- A1332: Include new generic story-driven cloud tasks [Added]
- Q290: Cloud Providers
- Q195: Language and Framework
New Just-in-Time Training
- Secure Software Design (22)
- Secure Software Coding (11)
- Defending HTML5 (19)
- Defending Python (14)
- Software Acceptance (2)
5.18
December 18, 2021
New features and enhancements
- Explainable Mappings
- Added an action button for 'Why is this Task included?' on the Tasks List and Task Details pages.
- This button expands a widget containing additional information on how exactly a given Task was brought into the Project (such as through Survey Match Conditions, being carried over across releases, and so on.)
- Added a new column in the All Tasks CSV Report containing information about Task inclusion.
- Added an include parameter in the Tasks API for Task inclusion information in the response.
Other product improvements
- Added API request throttling to GitHub integration to avoid rate limiting.
- Updated the latest version of the Windows RIA to use Python 3.8.
- The Linux RIA will be updated to Python 3.8 in a future release. Clients should start planning to update their virtual environment to Python 3.8.
Content improvements summary
Regulations
- PCI SSS (Payment Card Industry Secure Software Standard v1.0)
- Added a new Regulation with relevant Task Amendments based on the updated standard.
- OWASP Top 10 (2021)
- Added the latest installment of the OWASP Top 10 as a new regulation. This regulation was mapped to related Tasks based on the new categories and those of the 2017 installment that did not see a change in the 2021 update.
- PCI SSS (Payment Card Industry Secure Software Standard v1.0)
Implied answers
- Removed some implied answers for "A48: .NET" and "A707: Python".
- Removed retired answers from the implications of some answers.
- See Changes to Project Properties and Profiles for more information.
Content additions and updates (as of November 22, 2021):
Compliance Regulations and Mappings
- Payment Card Industry Software Security Framework (Secure Software Standard) (PCI-SSF (S3))
- OWASP Top 10 (2021)
New/Updated Content Packs
- PCI SSF
- Hardware-Embedded
- Wireless
- RFID
- Bluetooth
- WiFi
T31: Validate all forms of input [Updated]
- Updated text to include latest guidance.
- T60: Use correct and approved cryptographic algorithms, parameters, and key lengths [Updated]
- Updated text to include latest guidance
- T61: Disable default accounts or change all default passwords [Updated]
- Updated text to include latest guidance
- T151: Use cryptographically secure random numbers [Updated]
- Updated text to include latest guidance.
- T197: Encrypt and sign any remote code/update and then validate the signature to verify its origin and integrity
- TA5587: PCI-SSF (S3) / Signing all terminal software files [Added]
- T244: Securely delete any unprotected sensitive data before a resource is released or shared
- TA5579: PCI-SSF (S3) / Delete transient sensitive data [Added]
- T338: Control access to resources through user authentication and authorization [Updated]
- Updated text to include latest guidance.
- T371: Provide unified and manageable interfaces for security settings and configuration parameters
- TA5578: PCI-SSF (S3) / Functions and security controls [Added]
- T379: Provide sufficient documentation for security-related features
- TA5576: PCI-SSF (S3) / Documentation and evidence [Added]
- T431: Design a response to logging failures and other minor failures
- TA5581: PCI-SSF (S3) / Protect the integrity of existing activity records [Added]
- T432: Test that logging failures and other minor failures are securely handled
- TA5582: PCI-SSF (S3) / More in-depth tests [Added]
- T453: Perform security function verification on a regular basis
- TA5585: PCI-SSF (S3) / Test the terminal software security features [Added]
- T456: Change default security settings to the most stringent ones and disable unnecessary services and modules [Updated]
- Updated title and text for more clarity and better guidance.
- T925: Configure TLS/SSL securely for Microsoft IIS (Microsoft IIS)
- I803: IIS: How to configure TLS/SSL securely [Updated]
- INFO: Updated the text.
- I803: IIS: How to configure TLS/SSL securely [Updated]
- T1075: Use Azure Active Directory for SQL Authentication (Microsoft Azure) [Updated]
- Updated title for more clarity.
- T1079: Disable unapproved VM extensions (Microsoft Azure) [Updated]
- Updated the text for better content accuracy
- T1367: Identify and classify critical assets [Updated]
- Updated text to include latest guidance.
- T1373: Maintain the integrity of all software code
- TA5583: PCI-SSF (S3) / Integrity of prompts [Added]
- T1374: Ensure the integrity of software release and update delivery [Updated]
- Updated text to include latest guidance.
- T1375: Properly collect and protect sensitive data
- TA5577: PCI-SSF (S3) / Sensitive data retention or deletion [Added]
- T1376: Provide and maintain guidance on secure installation, maintenance, and configuration of all software components [Updated]
- Updated text to include further details and clarity.
- TA5589: PCI-SSF (S3) / Detailed guidance [Added]
- TA5590: PCI-SSF (S3) / Detailed guidance for terminal software [Added]
- T1381: Establish secure processes for key management [Updated]
- Updated text to include latest guidance.
- T1385: Institute secure logging and event monitoring
- TA5588: PCI-SSF (S3) / Tracking and recording sensitive activities [Added]
- T1885: Ensure Lambda functions handle input safely (AWS) [Updated]
- Updated Phase from "Deployment" to "Development".
- T1892: Perform a Threat and Risk Assessment (TRA)
- TA5580: PCI-SSF (S3) / Default settings [Added]
- T1895: Protect applications with Intrusion Detection / Protection System (IDS/IPS)
- TA5586: PCI-SSF (S3) / Detection of anomalous behavior [Added]
- T1901: Use IAM policies for managing access to SQS resources (AWS) [Updated]
- Updated title for more clarity.
- T1911: Use IAM policies for managing access to RDS database instances (AWS) [Updated]
- Updated title for more clarity.
- T1920: Conduct security architecture and design reviews before starting code development
- TA5584: PCI-SSF (S3) / Secure terminal software design [Added]
- T2058: Create IAM policies for database access (Amazon Aurora) [Updated]
- Updated the title for more clarity
- T2060: Ensure snapshots are not public (RDS) [Updated]
- Updated the title and text to cover all RDS-supported databases.
- P1507: Ensure snapshots are not public (RDS) [Updated]
- T2062: Use AWS Secrets Manager for connection credentials (RDS) [Updated]
- Updated the title and text to cover all RDS-supported databases.
- P1509: Improper secret or connection string management (RDS) [Updated]
- T2067: Use the latest version of software on App Service (Microsoft Azure) [Updated]
- Changed its phase from deployment to development
T2296: Securely install and configure all software components [Added]
- P1669: Lack of a process for securely installing and configuring all software components [Added]
Updated the following code scanner mappings
- Fortify
- AppScan
Changes to Project Properties and Profiles
- Q195: Language and Framework
- Q109: Programming Language
- Q110: Technology/Framework
- A48: .NET [Updated]
- Removed the following implied answers: "A168: ADO.NET", "A58: ESAPI", "A75: Microsoft IIS", "A158: ODBC", "A13: XML", "A767: ASP.NET Web Application Framework", "A176: Uses ASP.NET ViewState", "A112: Uses ASP.NET Membership provider for authentication"
- A48: .NET [Updated]
- A707: Python [Updated]
- Removed the implied answer for "A697: Django".
- Q110: Technology/Framework
- Q109: Programming Language
- Q197: Java Technologies
- Q147: Third-Party Libraries Used
- A165: Spring [Updated]
- Removed JAVA EE from the applicability criteria.
- A165: Spring [Updated]
- Q147: Third-Party Libraries Used
Q211: Development Tools
- Q210: Test Tools
- Q212: Test Tools Permitted
- A189: Exploit-Me Tools
- Removed this answer from the project survey due Exploit-Me Tools being deprecated.
- A189: Exploit-Me Tools
- Q212: Test Tools Permitted
- Q210: Test Tools
Removed the following retired answers from the implications of other answers:
- Removed “A15: Yes” from “A4: Web Application”
- Removed “A1085: The application connects to a server as a client” from “A1077: Firmware, embedded, or hardware solution”
- Removed “A218: Sun Java Development Kit (JDK)” from “A47: Java EE”
- Removed “A116: Reference Implementation” from “A96:JSF”
- Removed “A99: Apache Tomahawk” from “A117: Apache MyFaces”
- Removed “A187: Yes” from “A1061: Set of default answers for all profiles”
- Removed “A15: Yes” from “A1080: The application is a generic web application.”
- Removed “A743: (Don’t Use) Changes to resource addressing” from “A740: This is a new project”
- Q195: Language and Framework
New Just-in-Time Training
- Defending .NET (27)
- Defending Containers (14)
- Defending Kubernetes (19)
5.17
November 6, 2021
New features and enhancements
Project Survey
- "Application General > Application Type" has been changed to "Application General > Components" and is now multi-choice to help better align with modern development practices.
- "Application General > Components" has been changed to "Application General > Custom Components" to account for any existing user-created subsections.
- For more information, contact your Customer Success Manager or sdesupport@securitycompass.com.
Library
- Added the functionality to customize official Problems via Library export.
Integrations
- Klocwork SAST Integration
- Full functionality now available.
- Klocwork SAST Integration
Other product improvements
- Risk Policies
- The Risk Policy summary widget on the project overview page was previously not being shown immediately after the survey was saved, this has now been fixed.
Content additions and updates (as of October 12, 2021):
Compliance Regulations and Mappings
- PCI-SSLC-v1.1
- ISASecure CSA 311
- ISASecure SSA 311
New Content Packs
- GraphQL
T15: Centralize authorization
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T31: Validate all forms of input
- TA3499: Input validation (GraphQL) [Added]
- T59: Use standard libraries for cryptography
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- INFO: Removed the following match conditions "Changes Since Last Release - Changes to hardware design AND Bluetooth Persona - Manufacturer AND Components in development - Firmware, embedded, or hardware solution" and "Changes Since Last Release - Changes to hardware design AND WiFi Persona - Provider AND Components in development - Firmware, embedded, or hardware solution"
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- T60: Use correct and approved cryptographic algorithms, parameters, and key lengths
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- INFO: Removed the following match conditions "Changes Since Last Release - Changes to hardware design AND Bluetooth Persona - Manufacturer AND Components in development - Firmware, embedded, or hardware solution" and "Changes Since Last Release - Changes to hardware design AND WiFi Persona - Provider AND Components in development - Firmware, embedded, or hardware solution"
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- T136: Do not store sensitive credit card data
- P708: Storage of Confidential Credit Card Fields [Updated]
- INFO: Updated the text.
- P708: Storage of Confidential Credit Card Fields [Updated]
- T154: Do not store or cache credit card information on client
- P708: Storage of Confidential Credit Card Fields [Updated]
- INFO: Updated the text.
- P708: Storage of Confidential Credit Card Fields [Updated]
- T226: Verify that authorization is centralized
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T234: Verify sensitive credit card data is not stored
- P708: Storage of Confidential Credit Card Fields [Updated]
- INFO: Updated the text.
- P708: Storage of Confidential Credit Card Fields [Updated]
- T247: Verify logical access to encrypted volumes are managed independently of native operating system
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T338: Control access to resources through user authentication and authorization
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T340: Use an account and identity management system
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T344: Enforce different rules for access to the system based on the origin, type and medium of request
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T445: Verify that only approved cryptographic algorithms and key lengths are used
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- INFO: Removed the following match conditions "Changes Since Last Release - Changes to hardware design AND Bluetooth Persona - Manufacturer AND Components in development - Firmware, embedded, or hardware solution" and "Changes Since Last Release - Changes to hardware design AND WiFi Persona - Provider AND Components in development - Firmware, embedded, or hardware solution"
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- T446: Verify that only standard libraries are used for cryptography
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- INFO: Removed the following match conditions "Changes Since Last Release - Changes to hardware design AND Bluetooth Persona - Manufacturer AND Components in development - Firmware, embedded, or hardware solution" and "Changes Since Last Release - Changes to hardware design AND WiFi Persona - Provider AND Components in development - Firmware, embedded, or hardware solution"
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- T520: Design secure SOAP web services
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T522: Employ address filtering at the MAC layer
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T530: Test that MAC layer address filtering is enabled
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T552: Verify that SOAP web services are securely designed
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T553: Design secure RESTful web services
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T554: Verify that REST web services are securely designed
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T567: Enable network access control for local area network communications
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T591: Verify that network access control is enabled for local area network communications
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T673: Attach IAM policies only to groups or roles (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T707: Test that IAM policies are attached only to groups or roles (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T892: Configure SELinux to restrict Apache processes (Apache HTTP Server)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T893: Configure AppArmor to restrict Apache processes (Apache HTTP Server)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T894: Verify that SELinux is configured to restrict Apache processes (Apache HTTP Server)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T895: Verify that AppArmor is configured to restrict Apache processes
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T898: Create bastion hosts for administrative access to the resources (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T899: Test that bastion hosts are created for administrative access to the resources (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T906: Set 'global authorization rule' to restrict access (Microsoft IIS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T907: Restrict access to sensitive site features to authenticated principals only (Microsoft IIS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T940: Test that 'global authorization rule' is set to restrict access (Microsoft IIS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T941: Test that access to sensitive site features is restricted to authenticated principals only (Microsoft IIS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1240: Do not allow privileged containers (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- I973: Kubernetes: How to disallow privileged containers [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1241: Verify that privileged containers are not allowed (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1242: Configure authentication securely (Kubernetes) [Updated]
- INFO: Updated the text.
- P1110: Improper authentication configuration (Kubernetes) [Updated]
- INFO: Updated the text.
- I974: Kubernetes: How to configure authentication securely [Updated]
- INFO: Updated the text.
- T1243: Verify that authentication is securely configured (Kubernetes) [Updated]
- INFO: Updated the text.
- P1110: Improper authentication configuration (Kubernetes) [Updated]
- INFO: Updated the text.
- T1244: Do not set insecure bind address and port (Kubernetes) [Updated]
- INFO: Updated the text.
- P1111: Insecure bind address and port (Kubernetes) [Updated]
- INFO: Updated the text.
- I975: Kubernetes: How to securely set bind address and port [Updated]
- INFO: Updated the text.
- T1245: Verify that insecure bind address and port are not set (Kubernetes) [Updated]
- INFO: Updated the text.
- P1111: Insecure bind address and port (Kubernetes) [Updated]
- INFO: Updated the text.
- T1246: Disable profiling (Kubernetes) [Updated]
- INFO: Updated the text.
- I976: Kubernetes: How to disable profiling [Updated]
- INFO: Updated the text.
- T1247: Verify that profiling is disabled (Kubernetes) [Updated]
- INFO: Updated the text.
- T1248: Disable fixing of malformed updates (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- I977: Kubernetes: How to set the --repair-malformed-updates argument to false [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1249: Verify that fixing malformed update is disabled (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1250: Configure admission control policy securely (Kubernetes) [Updated]
- INFO: Updated the text.
- I978: Kubernetes: How to configure admission control policy securely [Updated]
- INFO: Updated the text.
- T1251: Verify that admission control policy is configured securely (Kubernetes) [Updated]
- INFO: Updated the text.
- T1252: Configure logs securely (Kubernetes) [Updated]
- INFO: Updated the text.
- I979: Kubernetes: How to configure logs securely [Updated]
- INFO: Updated the text.
- T1253: Verify that logs are configured securely (Kubernetes) [Updated]
- INFO: Updated the text.
- T1254: Do not always authorize all requests (Kubernetes) [Updated]
- INFO: Updated the text.
- P1116: Always authorizing all requests (Kubernetes) [Updated]
- INFO: Updated the text.
- I980: Kubernetes: How to Do not always authorize all requests [Updated]
- INFO: Updated the text.
- T1255: Verify that all requests are always authorized (Kubernetes) [Updated]
- INFO: Updated the text.
- P1116: Always authorizing all requests (Kubernetes) [Updated]
- INFO: Updated the text.
- T1256: Configure HTTPS securely (Kubernetes) [Updated]
- INFO: Updated the text.
- P1117: Unsecure HTTPS configuration (Kubernetes) [Updated]
- INFO: Updated the text.
- I981: Kubernetes: How to configure HTTPS securely [Updated]
- INFO: Updated the text.
- T1257: Verify that HTTPS is configured securely (Kubernetes) [Updated]
- INFO: Updated the text.
- P1117: Unsecure HTTPS configuration (Kubernetes) [Updated]
- INFO: Updated the text.
- T1258: Configure service account securely (Kubernetes) [Updated]
- INFO: Updated the text.
- I982: Kubernetes: How to configure service account securely [Updated]
- INFO: Updated the text.
- T1259: Verify that service account is securely configured (Kubernetes) [Updated]
- INFO: Updated the text.
- T1264: Ensure that the --insecure-experimental-approve-all-kubelet-csrs-for-group argument is not set (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- I985: Kubernetes: How to remove the --insecure-experimental-approve-all-kubelet-csrs-for-group argument [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1265: Verify that the --insecure-experimental-approve-all-kubelet-csrs-for-group argument is not set (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1266: Set permissions for sensitive files properly (Kubernetes) [Updated]
- INFO: Updated the text.
- I986: Kubernetes: How to set permissions for sensitive files [Updated]
- INFO: Updated the text.
- T1267: Verify that permissions for sensitive files are properly set (Kubernetes) [Updated]
- INFO: Updated the text.
- T1270: Create Pod Security Policies for your cluster (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1271: Verify the Pod Security Policies for your cluster (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1275: Verify if the --read-only-port argument is set to 0 (Kubernetes) [Updated]
- INFO: Updated the text.
- T1280: Configure network securely (Kubernetes) [Updated]
- INFO: Updated the text.
- I993: Kubernetes: How to configure network securely [Updated]
- INFO: Updated the text.
- I997: Kubernetes: How to configure network securely - more in-depth controls [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1282: Set the --keep-terminated-pod-volumes argument to false (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- I994: Kubernetes: How to set the --keep-terminated-pod-volumes argument to false [Deactivated]
- T1283: Verify if the --keep-terminated-pod-volumes argument is set to false (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1284: Ensure that the --cadvisor-port argument is set to 0 (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- I995: Kubernetes: How to set the --cadvisor-port argument to 0 [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1285: Verify if the --cadvisor-port argument is set to 0 (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T1288: Ensure that the seccomp profile is set to docker/default in your pod definitions (Kubernetes)
- I999: Kubernetes: How to ensure that the seccomp profile is set to docker/default in your pod definitions [Updated]
- INFO: Updated the text.
- I999: Kubernetes: How to ensure that the seccomp profile is set to docker/default in your pod definitions [Updated]
- T1373: Maintain the integrity of all software code [Updated]
- INFO: Updated the text.
- T1465: Decide how to handle sessions/authorization state in your Angular application (Angular)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1466: Restrict sending of authorization state to approved origins in Angular (Angular)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1467: Verify that the Angular application does not leak the authorization state (Angular)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1878: Grant minimal IAM permissions (especially to Lambda functions) (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1886: Do not allow anonymous invocation of Lambda functions (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1887: Decide on the right OAuth 2.0 flow for your application
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1888: Decide on the right OpenID Connect flow for your application
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1889: Secure the configuration of the authorization server
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1890: Implement OAuth 2.0 securely on the resource server
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1899: Do not allow unauthorized access to SQS queues (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1900: Verify that SQS queues are only accessible from trusted AWS accounts (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1901: Attach IAM policies to SQS resources (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1902: Verify that SQS queues have IAM Policies attached (AWS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T1922: Use secure OAuth 2.0 and OpenID Connect integration (where applicable)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T2041: Attach IAM roles for ECS container instances (Amazon ECS)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T2047: Attach IAM policies to DynamoDB resources (Amazon DynamoDB)
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T2077: Use strong cryptographic ciphers (Kubernetes)
- I1370: Kubernetes: How to only use strong cryptographic ciphers [Updated]
- INFO: Updated the text.
- I1370: Kubernetes: How to only use strong cryptographic ciphers [Updated]
- T2081: Encrypt data at rest properly (Kubernetes) [Updated]
- INFO: Updated the text.
- I1372: Kubernetes: How to encrypt data at rest properly [Updated]
- INFO: Updated the text.
- T2082: Verify that data at rest is encrypted properly (Kubernetes) [Updated]
- INFO: Updated the text.
- T2084: Verify that the admission control plugin 'EventRateLimit' is set (Kubernetes) [Updated]
- INFO: Updated the text.
- T2091: Do not bind the scheduler and the controller manager services to non-loopback insecure addresses (Kubernetes) [Updated]
- INFO: Updated the text.
- T2092: Verify that the scheduler and controller manager services are not bound to non-loopback insecure addresses (Kubernetes) [Updated]
- INFO: Updated the text.
- T2097: Minimize containers with excessive privileges (Kubernetes) [Updated]
- INFO: Updated the text and title.
- TA2857: Kubernetes: Minimize the admission of containers with excessive privileges - More in-depth controls [Updated]
- INFO: Updated the text and title.
- T2098: Verify that containers with excessive privileges are minimized (Kubernetes) [Updated]
- INFO: Updated the title.
- TA2858: Kubernetes: Verify that containers with excessive privileges are minimized - More in-depth controls [Updated]
- INFO: Updated the text and title.
- T2101: Place compensating controls in the form of PSP and RBAC for privileged containers usage (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- I1382: Kubernetes: How to Place compensating controls in the form of PSP and RBAC for privileged containers usage [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T2102: Verify that Place compensating controls in the form of PSP and RBAC for privileged containers usage (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T2103: Configure Network policies as appropriate (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- I1383: Kubernetes: How to Configure Network policies as appropriate [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T2104: Verify that Configure Network policies as appropriate (Kubernetes) [Deactivated]
- INFO: Deactivated to align with latest CIS Benchmarks.
- T2117: Secure microservices APIs that access sensitive data
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T2128: Develop a process to notify users and regulators of breaches of personal information [Updated]
- INFO: Updated the title.
- T2185: Prevent unauthorized access to sensitive data through debug or test interfaces (Hardware/Firmware) [Updated]
- INFO: Updated CVSS.
- T2240: Designate an immutable Root of Trust for storage (Hardware/Firmware) [Updated]
- INFO: Updated CVSS.
- T2246: Use correct and approved cryptographic parameters and key lengths (Bluetooth) [Updated]
- INFO: Updated match conditions. Changed "Bluetooth Persona - Manufacturer AND Components in development - Firmware, embedded, or hardware solution" to "Changes Since Last Release - Changes to hardware design AND Bluetooth Persona - Manufacturer AND Components In Development - Firmware, embedded, or hardware solution"
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- INFO: Removed the following match conditions "Changes Since Last Release - Changes to hardware design AND Bluetooth Persona - Manufacturer AND Components in development - Firmware, embedded, or hardware solution" and "Changes Since Last Release - Changes to hardware design AND WiFi Persona - Provider AND Components in development - Firmware, embedded, or hardware solution"
- T2253: Use AES encryption in CCMP mode when WPA is applied (WiFi) [Updated]
- INFO: Updated match conditions. "Changes Since Last Release - Changes to hardware design AND WiFi Persona - Provider AND Components In Development - Firmware, embedded, or hardware solution"
- P224: Use of weak cryptographic algorithms or unsecure algorithm practices [Updated]
- INFO: Removed the following match conditions "Changes Since Last Release - Changes to hardware design AND Bluetooth Persona - Manufacturer AND Components in development - Firmware, embedded, or hardware solution" and "Changes Since Last Release - Changes to hardware design AND WiFi Persona - Provider AND Components in development - Firmware, embedded, or hardware solution"
- T2259: Minimize access rights assigned to RBAC roles and Service Accounts (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1653: Inappropriate access settings for RBAC roles and Service Accounts (Kubernetes) [Added]
- I1496: Kubernetes: How to ensure assigned access rights to RBAC roles and Service Accounts are appropriate [Added]
- T2260: Verify access rights assigned to RBAC roles and Service Accounts are minimal (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1653: Inappropriate access settings for RBAC roles and Service Accounts (Kubernetes) [Added]
- T2261: Do not use client certificate authentication for users (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1654: Lack of support for certificate revocation (Kubernetes) [Added]
- T2262: Verify client certificate authentication is not used for users (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1654: Lack of support for certificate revocation (Kubernetes) [Added]
- T2263: Ensure network policies and CNI selection are appropriate (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1528: Inappropriate Network policies and CNI configurations (Kubernetes) [Updated]
- INFO: Updated the text and title.
- I1497: Kubernetes: How to ensure network policies and CNI selection are appropriate [Added]
- T2264: Verify network policies and CNI selection are appropriate (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1528: Inappropriate Network policies and CNI configurations (Kubernetes) [Updated]
- INFO: Updated the text and title.
- T2265: Ensure proper Secrets Management (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1655: Improper secrets management (Kubernetes) [Added]
- I1498: Kubernetes: How to ensure proper secrets management [Added]
- T2266: Verify proper Secrets Management (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1655: Improper secrets management (Kubernetes) [Added]
- T2267: Do not use default namespaces (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1656: Using default namespaces (Kubernetes) [Added]
- I1499: Kubernetes: How to use non-default namespaces [Added]
- T2268: Verify default namespace is not used (Kubernetes) [Added]
- INFO: Align with latest CIS Benchmark.
- P1656: Using default namespaces (Kubernetes) [Added]
- T2269: Prevent batching attacks (GraphQL) [Added]
- T2270: Test to confirm that password policies are configurable [Added]
- T2271: Test to confirm that unauthorized access to sensitive data through debug or test interfaces is properly restricted (Hardware/Firmware) [Added]
- T2272: Test immutability of Root of Trust for storage (Hardware/Firmware) [Added]
- T2273: Verify that unified and manageable interfaces are available for security settings and configuration parameters [Added]
- T2274: Test to confirm that the principle of least privilege is strongly implemented [Added]
- T2275: Test to confirm that the most robust Security Operation Mode is applied (WiFi) [Added]
- T2276: Test to confirm that authorization and authentication controls are in place for access to resources [Added]
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T2277: Test to confirm the use of an account and identity management system [Added]
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T2278: Test to confirm that different rules for access to the system are enforced based on the origin, type, and medium of the request [Added]
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T2279: Verify that the application adopts a zoning model [Added]
- T2280: Verify that a priority scheme for application services and operations is designed [Added]
- T2281: Secure access control (GraphQL) [Added]
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- P182: Improper Access Control (Authorization) [Updated]
- T2282: Test to confirm that unauthenticated parts of the application are accessible [Added]
- T2283: Configure GraphQL correctly [Added]
- P182: Improper Access Control (Authorization) [Updated]
- INFO: Added a match condition for GraphQL.
- I1500: Disable Introspection in PHP [Added]
- I1501: Disable Introspection and GraphiQL in NodeJS [Added]
- P182: Improper Access Control (Authorization) [Updated]
T2284: Prevent DoS attacks (GraphQL) [Added]
Deactivated Problems
- P1109: Running privileged containers (Kubernetes) [INFO: Align with latest CIS Benchmark.]
- P1113: Malformed requests (Kubernetes) [INFO: Align with latest CIS Benchmark.]
- P1121: Active --insecure-experimental-approve-all-kubelet-csrs-for-group argument (Kubernetes) [INFO: Align with latest CIS Benchmark.]
- P1124: Lack of Pod Security Policies (Kubernetes) [INFO: Align with latest CIS Benchmark.]
- P1130: Set the --keep-terminated-pod-volumes argument to false (Kubernetes) [INFO: Align with latest CIS Benchmark.]
- P1131: The --cadvisor-port argument is not set to 0 (Kubernetes) [INFO: Align with latest CIS Benchmark.]
- P1527: Problem for Place compensating controls in the form of PSP and RBAC for privileged containers usage (Kubernetes) [INFO: Align with latest CIS Benchmark.]
Updated the following code scanner mappings
- Checkmarx
Changes to Project Properties and Profiles
- Q193: Components [Updated]
- INFO: Updated title to "Q193: Components"
- Q101: Components In Development [Updated]
- INFO: Updated title to "Q101: Components In Development"
- A5: Generic server [Updated]
- INFO: Updated title to "A5: Generic server"
- A8: Stand-alone [Updated]
- INFO: Updated title to "A8: Stand-alone"
- A194: Generic client [Updated]
- INFO: Updated title to "A194: Generic client"
- A713: Mobile app [Updated]
- INFO: Updated title to "A713: Mobile app"
- A1264: Microservice backend [Updated]
- INFO: Updated title to "A1264: Microservice backend"
- A1289: Frontend [Updated]
- INFO: Updated children answers. Removed "Microservices - Code" and added "HTML5", "jQuery", "Uses iFrames", and "CORS"
- Q253: Components In Use [Updated]
- INFO: Updated title to "Q253: Components In Use"
- Q194: Custom Components [Updated]
- INFO: Updated title to "Q194: Custom Components"
- Q196: Web Technologies
- Q191: Web Client Technologies Used
- A721: jQuery [Updated]
- INFO: Added "Frontend" to match conditions
- A721: jQuery [Updated]
- Q191: Web Client Technologies Used
- Q205: Geography
- Q159: Organization is Subject to Laws of:
- A1326: United Kingdom [Added]
- Q159: Organization is Subject to Laws of:
- Q243: Internal Hidden Properties
- Q189: Internal Properties (Use this, for all hidden answers)
- A761: Expand the scope to include a server side in the application (not recommended) [Updated]
- INFO: Moved it under "Q189: Internal Properties (Use this, for all hidden answers)"
- A1079: Includes a web application component [Updated]
- INFO: Moved it under "Q189: Internal Properties (Use this, for all hidden answers)"
- A1100: ANSI/ISA 62443-3-3 [Updated]
- INFO: Moved it under "Q189: Internal Properties (Use this, for all hidden answers)"
- A1101: ANSI/ISA 62443-4-2 [Updated]
- INFO: Moved it under "Q189: Internal Properties (Use this, for all hidden answers)"
- A1263: This is an overarching project for designing and implementing security measures in the Microservices Ecosystem. (Select this if you are modeling the deployment of, or setting up the infrastructure for, microservices.) [Updated]
- INFO: Moved it under "Q189: Internal Properties (Use this, for all hidden answers)"
- A761: Expand the scope to include a server side in the application (not recommended) [Updated]
- Q189: Internal Properties (Use this, for all hidden answers)
- Q249: Industrial Control Systems
- Q250: In-Scope for ANSI/ISA 62443 or CSA/SSA-311 [Updated]
- INFO: Updated title to "Q250: In-Scope for ANSI/ISA 62443 or CSA/SSA-311"
- Q341: Component Type [Added]
- A1321: Software Application [Added]
- A1322: Embedded Device [Added]
- A1323: Host Device [Added]
- A1324: Network Device [Added]
- A1319: ANSI/ISA 62443-4-2 or CSA 311 [Added]
- A1320: ANSI/ISA 62443-3-3 or SSA 311 [Added]
- Q250: In-Scope for ANSI/ISA 62443 or CSA/SSA-311 [Updated]
- Q330: Cloud
- Q326: In-Scope for Cloud Controls Matrix (CCM) [Updated]
- INFO: Updated title to "In-Scope for Cloud Controls Matrix (CCM)"
- Q326: In-Scope for Cloud Controls Matrix (CCM) [Updated]
- Q193: Components [Updated]
New Just-in-Time Training
- Defending .NET 5 (11)
- Defending AWS (16)
- GDPR for Developers (16)
5.16
September 25, 2021
New features and enhancements
Read Only Projects
- Introduced a new audit-friendly view of projects, where changes cannot be made to a project once it's locked. Projects return to an editable format when they are unlocked.
- Added a project permission option to lock or unlock a project.
- Added a menu option on the project list and project overview pages to lock or unlock a project.
- Added an indicator on project pages to unlock locked projects.
- Updated the project API to facilitate locking and unlocking a project.
- Updated activity log entries to indicate who locked or unlocked a project and when.
- Read-only projects can be carried over releases, archived, and deleted by a user with the appropriate permissions.
- It is possible to view but not change read only project Task descriptions, Task tags, assigned users, last updated statuses, notes, and associated JITTs from the Task View page.
- It is possible to view but not change read only project Problem descriptions, related Tasks, related Tasks statuses, and assigned users from the Problems View Page.
- It is possible to view but not change read only project Survey answers submitted and history from the Project Survey page. It is also possible to add and view Survey comments for locked projects.
Integrations
- Klocwork SAST Integration
- Introduced Klocwork integration in SD Elements v5.16 with full functionality available in v5.17.
- SonarQube integration now makes more efficient queries to SonarQube.
- Integrations and Sync history can be viewed in a locked project but new syncs or integrations cannot be initiated when a project is locked into a read-only view.
- Klocwork SAST Integration
Other product improvements
- System
- Fixed a bug where the "Automation" menu header was not visible on older System pages.
- LDAP Synchronization
- Fixed a bug where users were not synchronized due to a character casing mismatch between the group names in the SD Elements mapping and the LDAP instance.
Content additions and updates (as of August 31, 2021):
Compliance Regulations and Mappings
- GDPR [INFO: Updated regulation description to include UK-GDPR.]
- NIST 800-190
New Content Packs
- Bluetooth/WiFi
T35: Fine-tune HTTP server settings [Updated]
- INFO: Updated the text.
- T36: Escape untrusted data in HTML, HTML attributes, CSS, and JavaScript
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T37: Avoid DOM-based Cross-Site Scripting (XSS)
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T48: HTML entity encode validation error messages
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T53: Prevent the upload of malicious files and malware [Updated]
- INFO: Updated text to include latest guidance related to CSA-SSA 311.
- T89: Test that site is not vulnerable to XSS
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T169: Test that the site is not vulnerable to DOM-based XSS
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T194: Obtain user consent for tracking cookies [Updated]
- INFO: Added details on Global Privacy Control.
- T258: Secure web (cross domain) messaging in HTML5
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T267: Minimize your exposure to common web-based attacks
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T319: Verify that web messaging is securely used
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T331: Enforce policies through content security policy (CSP) or XSS protection headers
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T332: Test that content security policy (CSP) headers are added
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T417: Avoid passing dynamic data to trustAs or bypassSecurityTrust functions
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T418: Use Angular's built-in sanitization for user output with limited code or markup
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T419: Make sure strict contextual escaping (SCE) is enabled in AngularJS
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T420: Prevent Client-Side Template Injection (CSTI)
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T421: Verify if web page template is vulnerable to client side template injection (CSTI)
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T422: Verify that built-in sanitization is used in Angular with limited code or markup
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T449: Manage the visibility of information and actions in iOS 3D touch preview window [Updated]
- INFO: The previous solution was deprecated. Modified the solution regarding the latest iOS update.
- T560: Sanitize any HTML input passed to dangerouslySetInnerHTML attribute
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T561: Verify that any HTML input passed to dangerouslySetInnerHTML attribute is sanitized
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T1380: Enforce secure user registration and access control [Updated]
- INFO: Updated text to include latest guidance related to CSA-SSA 311.
- T1463: Enable ahead-of-time (AOT) compilation for Angular applications (Angular)
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T1464: Verify application compatibility with AOT compilation in Angular applications (Angular)
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T1538: Avoid DOM-based Cross-Site Scripting (XSS) in Angular applications (Angular)
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- INFO: Revised text for language.
- P632: Improper Neutralization of Input During Web Page Generation (Cross-Site Scripting) [Updated]
- T2240: Designate an immutable Root of Trust for storage (Hardware/Firmware) [Updated]
- INFO: Updated the text.
- T2256: Authenticate and log all access to registries containing sensitive or proprietary images [Added]
- P1650: Insufficient authentication for container registries [Added]
- T2257: Keep host OS components up-to-date [Added]
- P1651: Insufficient updates of host OS components [Added]
T2258: Minimize host OS attack surface [Added]
- P1652: Large host OS attack surface [Added]
Changes to Project Properties and Profiles
- Q206: Privacy
- Q160: Handles Personal Data
- Q224: Privacy Regulations
- A1148: GDPR [Updated]
- INFO: Updated tooltip.
- A1148: GDPR [Updated]
- Q224: Privacy Regulations
- Q160: Handles Personal Data
- Q206: Privacy
New Just-in-Time Training
- Azure (28)
- React (13)
- HIPAA (10)
5.15
July 31, 2021
New features and enhancements
Library
- Problems
- Added the ability to customize rules for built-in library Problems.
- Added the ability to revert all customizations on a built-in library Problem.
- Content Pack Selector
- Updated the Content Pack Selector page to be hidden by default.
- All content pack selection functionality remains available through the API.
- Contact sdesupport@securitycompass.com to activate the Content Pack Selector page UI.
- Updated the Content Pack Selector page to be hidden by default.
- Problems
Risk Policy Widget redesign
- Updated to show the percentage of Tasks in a project that are risk-compliant.
Other product improvements
- Risk Policy
- Fixed a bug where clicking the "Continue To Tasks" button on the Project Risk Policy page would navigate slowly to the Project Tasks page.
Content additions and updates (as of July 5, 2021):
Compliance Regulations and Mappings
- CSA Cloud Controls Matrix (CCM) v4.0.1
T1880: Encrypt data at rest for Lambda functions (AWS)
- I1287: How to encrypt data at rest for Lambda functions (AWS) [Updated]
- INFO: Updated the text and language without changing the security content.
- I1287: How to encrypt data at rest for Lambda functions (AWS) [Updated]
Changes to Project Properties and Profiles
- Q204: Financial Systems
- Q161: Payment Components
- A132: In-scope for PCI-DSS [Updated]
- INFO: Updated tooltip.
- A784: In-scope for PA-DSS [Updated]
- INFO: Updated tooltip.
- A132: In-scope for PCI-DSS [Updated]
- Q229: Financial Regulations
- A1246: In-scope for NYDFS Cybersecurity Regulation [Updated]
- INFO: Updated tooltip.
- A1254: In-scope for MAS-TRMG Guidelines [Updated]
- INFO: Updated tooltip.
- A1246: In-scope for NYDFS Cybersecurity Regulation [Updated]
- Q161: Payment Components
- Q206: Privacy
- Q160: Handles Personal Data
- A130: Yes [Updated]
- INFO: Updated tooltip.
- Q224: Privacy Regulations
- A746: PIPEDA [Updated]
- INFO: Updated tooltip.
- A747: GAPP [Updated]
- INFO: Updated tooltip.
- A750: ECPA [Updated]
- INFO: Updated tooltip.
- A1148: GDPR [Updated]
- INFO: Updated tooltip.
- A1255: CCPA [Updated]
- INFO: Updated tooltip.
- A746: PIPEDA [Updated]
- A130: Yes [Updated]
- Q236: In-Scope with Children's Privacy Compliance
- Q238: In-Scope for COPPA Compliance
- A780: Yes [Updated]
- INFO: Updated tooltip.
- A780: Yes [Updated]
- A779: Yes [Updated]
- INFO: Updated tooltip.
- Q238: In-Scope for COPPA Compliance
- Q160: Handles Personal Data
- Q237: Compliance Scope: Other
- Q225: Types of Emails Sent by the Application
- A752: Advertisement or other solicitation emails [Updated]
- INFO: Updated tooltip.
- A752: Advertisement or other solicitation emails [Updated]
- Q325: In-Scope for ISO 27001 Compliance
- A1267: Yes [Updated]
- INFO: Updated tooltip.
- A1267: Yes [Updated]
- Q334: MASVS Level
- A1296: Level 2 [Updated]
- INFO: Updated tooltip.
- A1297: R [Updated]
- INFO: Updated tooltip.
- A1296: Level 2 [Updated]
- Q336: In-Scope for China Cybersecurity Law
- A1308: Yes [Updated]
- INFO: Updated tooltip.
- A1308: Yes [Updated]
- Q225: Types of Emails Sent by the Application
- Q254: Health Care Systems
- Q223: Health Regulations
- A145: In-scope for HIPAA compliance [Updated]
- INFO: Updated tooltip.
- A145: In-scope for HIPAA compliance [Updated]
- Q223: Health Regulations
- Q330: Cloud
- Q319: In-Scope for FedRAMP Compliance
- A1247: Yes [Updated]
- INFO: Updated tooltip.
- A1247: Yes [Updated]
- Q326: In-Scope for Cloud Security Matrix (CCM)
- A1268: Yes [Updated]
- INFO: Updated tooltip.
- A1268: Yes [Updated]
- Q319: In-Scope for FedRAMP Compliance
- Q331: US Federal and NIST
- Q265: In-Scope for NIST 800-53 Compliance
- A1107: Yes [Updated]
- INFO: Updated tooltip.
- A1107: Yes [Updated]
- Q328: In-Scope for CMMC
- A1275: Yes [Updated]
- INFO: Updated tooltip.
- A1275: Yes [Updated]
- Q333: In-Scope for NIST Cybersecurity Framework
- A1290: Yes [Updated]
- INFO: Updated tooltip.
- A1290: Yes [Updated]
- Q337: In-Scope for CNSSI Controls [Updated]
- INFO: Updated tooltip.
- A1309: Baseline [Updated]
- INFO: Updated tooltip.
- A1310: Overlays [Updated]
- INFO: Updated tooltip.
- Q265: In-Scope for NIST 800-53 Compliance
- Q204: Financial Systems
New Just-in-Time Training
- Defending iOS (32 JITTs)
- Mobile Security Fundamentals (12 JITTs)
5.14
June 19, 2021
New features and improvements
Library
- Added the ability for Problems to be customized in the UI.
- Import / Export
- Added the ability to import and export Compliance Regulations and their Sections.
- Only available to a few SaaS customers as a beta release.
- Updated JSON and YAML exported field orders to match CSV and XLSX.
- Added the ability to import and export Compliance Regulations and their Sections.
- Project Overview
- Added the ability for the Task completion widget to be filtered by Risk Policy.
Project Tasks
- Added labels for Task status in the list view, accordion expansion view, and Task detailed view.
- Added the ability to select individual Tasks via the API when accepting new content updates. This was formerly restricted to accepting all changes or none in the UI.
Dashboard
- Added the ability for the Activities Widget to track creating and modifying Business Units and applications, and archiving and unarchiving applications.
- Added a new search filter for project and application tags.
Other product improvements
Account settings
- Fixed a bug related to password recovery questions.
Project Problems
- Fixed a bug where a related manually added library Problem was not added to a project when a manually added library Task was added.
Reporting
- Fixed an issue with Risk Policy Reports not showing the correct percentage of completed Tasks when filtering by regulation.
- Updated Risk Policy Reports to show zero tasks for incomplete surveys.
Content additions and updates (as of May 25, 2021):
Compliance Regulations and Mappings
- Secure Controls Framework (SCF)
New Content Packs
- SCF
T29: Use anti-Cross-Site Request Forgery (CSRF) tokens [Updated]
- INFO: Updated links to the OWASP cheat sheet and community web site.
- T186: Use recommended settings and the latest patches for third party libraries and software
- I296: Rails [Deactivated]
- INFO: Removed T186 HowTo's.
- I297: Django [Deactivated]
- INFO: Removed T186 HowTo's.
- I298: Spring Framework [Deactivated]
- INFO: Removed T186 HowTo's.
- I299: Struts [Deactivated]
- INFO: Removed T186 HowTo's.
- I300: Apache Tomcat [Deactivated]
- INFO: Removed T186 HowTo's.
- I361: GnuTLS [Deactivated]
- INFO: Removed T186 HowTo's.
- I362: OpenSSL [Deactivated]
- INFO: Removed T186 HowTo's.
- I363: Apache HTTP Server [Deactivated]
- INFO: Removed T186 HowTo's.
- I364: Apache Wicket [Deactivated]
- INFO: Removed T186 HowTo's.
- I365: Apache MyFaces [Deactivated]
- INFO: Removed T186 HowTo's.
- I366: Java [Deactivated]
- INFO: Removed T186 HowTo's.
- I381: Bouncy Castle [Deactivated]
- INFO: Removed T186 HowTo's.
- I432: Unix/Linux Bash [Deactivated]
- INFO: Removed T186 HowTo's.
- I481: AFNetworking Library [Deactivated]
- INFO: Removed T186 HowTo's.
- I503: Node.js [Deactivated]
- INFO: Removed T186 HowTo's.
- I504: AngularJS/Angular [Deactivated]
- INFO: Removed T186 HowTo's.
- I972: Docker [Deactivated]
- INFO: Removed T186 HowTo's.
- I1040: jQuery [Deactivated]
- INFO: Removed T186 HowTo's.
- I1495: Using SCA tools to keep third-party libraries up-to-date [Added]
- I296: Rails [Deactivated]
- T270: Follow best practices for storing application data on Android devices
- I402: Android storage options and considerations [Updated]
- INFO: Updated the text to include the latest guidance.
- I402: Android storage options and considerations [Updated]
- T271: Prevent access to Android components if they do not need external communication [Updated]
- INFO: Updated text to include the latest guidance.
- I404: Disabling external access to Android components [Updated]
- INFO: Updated the text.
- T289: Verify that access to Android components is properly restricted [Updated]
- INFO: Updated text to include the latest guidance.
- T440: Follow best practices when managing Android permissions [Updated]
- INFO: Updated text to include the latest guidance.
- T2250: Implement secure authentication for connections (Bluetooth)
- P1646: Poor authentication in wireless technologies [Updated]
- INFO: Updated the text to include the latest guidance on wireless technologies.
- P1646: Poor authentication in wireless technologies [Updated]
- T2251: Implement secure authentication for connections (WiFi) [Added]
- P1646: Poor authentication in wireless technologies [Updated]
- INFO: Updated the text to include the latest guidance on wireless technologies.
- P1646: Poor authentication in wireless technologies [Updated]
- T2253: Use AES encryption in CCMP mode when WPA is applied (WiFi) [Added]
- T2254: Use the most robust Security Operation Mode (WiFi) [Added]
- P1648: Weak authentication in PSK Mode [Added]
T2255: Protect personally identifiable information in wireless devices [Added]
- P1649: Lack of privacy protection in wireless technologies [Added]
Changes to Project Properties and Profiles
- Q197: Java Technologies
- Q147: Third-Party Libraries Used
- A165: Spring [Updated]
- INFO: Removed Java EE / A97 from Match Conditions.
- A165: Spring [Updated]
- Q147: Third-Party Libraries Used
- Q276: Network Layer
- Q339: Wireless Protocols Used
- Q340: WiFi Persona [Added]
- A1317: Client [Added]
- A1318: Provider [Added]
- A1316: WiFi [Added]
- Q340: WiFi Persona [Added]
- Q339: Wireless Protocols Used
- Q197: Java Technologies
New Just-in-Time Training
- Defending Android
- Cloud Security Fundamentals
5.13
May 8, 2021
New features and improvement
Reporting
- Project Compliance Report
- Added a checkbox for “Include Out of Scope Tasks” to filter or include out of scope tasks from the report.
- Project Compliance Report
Dashboard (new)
- Added the ability for Widgets to be filtered by application with a dropdown under the date range filter.
- Library Import/Export
- Added a Rules field to the import and export of Answers.
Other product improvements
- Library Answers
- Fixed an issue where editing Answers from the Library Question page caused the Answer field to change size.
Content additions and updates (as of April 12, 2021):
- T194: Obtain user consent for tracking cookies
- TA3498: CNIL Cookie Guidelines (French Data Protection Authority) [Added]
- T217: Use compiler settings to mitigate buffer overflows [Updated]
- Updated the text.
- T2211: Include firmware update mechanism/feature (Hardware/Firmware)
- TA3497: Patch and upgrade software and firmware regularly (Bluetooth) [Added]
- T2246: Use correct and approved cryptographic parameters and key lengths (Bluetooth) [Added]
- T2247: Use the strongest Security Mode and Level in devices (Bluetooth) [Added]
- P1644: Improper implementation of Bluetooth security features [Added]
- T2248: Provide appropriate range and power controls for secure communication (Bluetooth) [Added]
- P1645: Using a fixed frequency or high power levels for Bluetooth communication [Added]
- T2249: Enforce strongest association model in Secure Simple Pairing (SSP) (Bluetooth) [Added]
- P1644: Improper implementation of Bluetooth security features [Added]
T2250: Implement secure authentication for connections (Bluetooth) [Added]
- P1646: Poor authentication in wireless technologies [Added]
Updated T186 with the latest security patch levels for third-party libraries
- Rails
- Django
- Spring Framework
- Apache Tomcat
- GnuTLS
- Apache Wicket
- Apache MyFaces
- Java
- Unix/Linux Bash
- Node.js
- AngularJS/Angular
- Docker
Updated the following code scanner mappings
- Checkmarx
- WhiteHat
Changes to Project Properties and Profiles
- Q276: Network Layer
- Q339: Wireless Protocols Used [Added]
- Q338: Bluetooth Persona [Added]
- A1312: Developer [Added]
- A1313: Manufacturer [Added]
- A1314: Bluetooth [Added]
- Q338: Bluetooth Persona [Added]
- Q339: Wireless Protocols Used [Added]
- Q276: Network Layer
New Just-in-Time Training
- Privacy Fundamentals
- Defending Docker
5.12
New features and improvements
Project Survey Comments
- Added a new icon to each individual question on the project survey. Clicking on the icon opens up a new survey comments popover that displays all comments added to that question.
- The popover also contains an input field that users can use to create new comments. Each comment can be edited until the survey is saved or locked.
- A comment can be pinned to a question by clicking on the pin icon located on each comment. Pinning a comment displays that particular comment directly on the survey below the question.
- Known issues:
- When editing or creating a comment, clicking on the edit icon again will cause all changes to be lost without warning.
- Excessively long comments with no whitespace are pushed out and not displayed properly.
- A double scroll bar is shown when a comment being created or edited is longer than 8 lines of text.
- Clicking ‘Cancel’ while creating or editing a comment cancels without a warning.
Dashboard
- The CSV exports of Dashboard widgets now display a drilldown report of the data in the widget instead of aggregate counts.
- The ‘Active Entities’ widget has been renamed to ‘Activities’.
- The Activities and Active Projects widgets now show data from the last 12 months by default (changed from last 3 months).
- Widgets with no data show an empty state:
- The CSV export button is disabled.
- Widgets show a message indicating there is no data.
- Date Filtering
- Added a date filter to the Dashboard.
- Click on the Filter button on the Dashboard to open a panel with date range options for the filter. The filter is applied to all widgets on the dashboard.
Note: Dashboard is available only to SaaS and OSD customers on a container deployment.
Problems View
- Added a filter for filtering out problems with no related Tasks.
- Added a release carry over option for Project Specific Problems on the release carry over dialog.
- Added an option to carry over the Task status of related Tasks for Project Specific Problems.
- Added implicit release carry over behavior for Problems:
- When a user selects retaining phases, all the status and notes of Tasks in that phase and their related Problems are carried over in the release project.
- When a user selects Project specific Tasks retention, then the Project Specific Problems related to those Tasks are carried over in the release project.
- Added BU level behavior changes for Problems carry over.
- Added front-end messaging changes to indicate the release carry over for Problems.
Library Improvements
- Changed the default export file type to .csv format.
- Added copy improvements on import and export pages.
- Content item uuid uniqueness is now enforced.
- Rules field added to the import and export of the following content items:
- Section
- Subsection
- Question
- Django multi import now supports multiple passes of saving. This allows for importing content items with bi-directional relationships.
Permissions and Roles
- Added the following global permissions:
- View_all_business_unit: allows the user to view all business units.
- sync_with_all_issue_tracker: allows the user to sync with an issue tracker to any project they have access to.
- write_all_task_note: allows the user to write Task notes to any project they have access to.
- verify_all_task: allows the user to verify Tasks to any project they have access to.
- mark_all_task: allows the user to mark a Task status to any project they have access to.
- Added the following global permissions:
A new global role was added:
- Sync Service: a user with this role can perform an issue tracker or verification tool sync with any project in the organization. This does not include LDAP sync.
Problem Summary Report (Project Reports)
- Added a risk policy filter checkbox to filter the report by risk relevant Tasks only.
Integrations
- JIRA Issue Tracker Plugin
- Added support for using account IDs for JIRA user fields. JIRA has deprecated the usage of email addresses in user fields like ‘Assignee’. Integrations using email addresses need to switch to using the user’s account ID.
- Fortify Verification Tool Plugin
- Added support for API Tokens to support Fortify v20 and later.
- Added support for Twistlock Infrastructure Scanner.
- JIRA Issue Tracker Plugin
Content additions and updates (as of February 23, 2021):
- T181: Validate models explicitly for fields the user is allowed to update
- I323: Rails (v3.0 and later) [Updated]
- INFO: Updated title and text to reflect the changes in the new version.
- I1487: Rails (v3.0 and later) [Deactivated]
- INFO: Removed as the content is covered and updated in I323.
- I323: Rails (v3.0 and later) [Updated]
- T371: Provide unified and manageable interfaces for security settings and configuration parameters
- INFO: Updated text to fix a typo.
T2170: Ensure personal data processed by the application meets data localization requirements
- TA3485: China Cybersecurity Law (Article 37) – Data Localization [Updated]
- INFO: Added new Match Condition "Yes - cce:/Operational Context:Compliance:China Cyber Law required, none excluded."
- TA3485: China Cybersecurity Law (Article 37) – Data Localization [Updated]
Updated T186 with the latest security patch levels for third-party libraries
- Rails
- Django
- Spring Framework
- Apache Tomcat
- OpenSSL
- Apache Wicket
- Apache MyFaces
- Java
- Bouncy Castle
- Node.js
- AngularJS/Angular
- Docker
- jQuery
Changes to Project Properties and Profiles
- Q331: US Federal and NIST
- Q337: In-Scope for CNSSI Controls [Added]
- A1309: Baseline [Added]
- A1310: Overlays [Added]
- Q337: In-Scope for CNSSI Controls [Added]
- Q331: US Federal and NIST
5.11
New features and improvements
New Dashboard
- For administrators and users with the new View Analytics permission, a new Dashboard experience is accessible in the Reporting menu.
Project Relationship page
- Added a new table that can be toggled via the new Relationships Icon on the Applications page.
- The new table indicates a project's parent project, base project in the Application, and whether it is a release project.
Project Overview page
- The page now shows two new fields:
- Base Project: The base project of a release project
- release: A flag indicating if the current project is a release project
- The page now shows two new fields:
Library Import and Export
- Added support for importing and exporting survey sections, questions, and answers.
- This does not include the import and export of rules.
- Task import is no longer possible with a Project Specific Problem's ID.
- Added support for importing and exporting survey sections, questions, and answers.
Third party attributions page
- Added a page that lists third-party sources for the SD Elements Content Library.
Other product improvements
Accessibility
- Improved the contrast of user avatars.
- Fixed a scrolling issue on tooltips where the survey page would scroll instead of the tooltip text.
- Fixed an issue where the notes for a Task in a project did not display until another tab was selected.
- Improved the contrast of user avatars.
API Changes
- Added support for upcoming improvements to reporting on Business Unit, Application, Project, Task, and Problem metrics.
- Projects model and 'api/v2/projects/' have new boolean flag field 'release_project'.
Domain Length
- Increased Domain Length from 50 characters to 100.
How-Tos Import/Export
- Fixed a slug error preventing users from importing custom How-Tos.
- Fixed a slug error where the field displayed longer exported/imported values for How-Tos.
Integrations
- Fixed an issue with syncing SAST findings in Whitehat.
- Fixed an issue where the global integration connection form became uneditable.
- Fixed an issue where certain AppScan findings were not being synced.
- Fixed an issue where some JIRA instances with next-gen projects encountered 400 errors when syncing.
- Fixed an issue where Checkmarx syncs would error if the scan's timestamp was in an unexpected format.
- Note: Remote Integration Agent users must redeploy with the latest version to apply all fixes.
Project Specific Problems (PSPs) in different projects
- Fixed an issue where PSPs in different projects could not have the same title.
- Fixed an issue where if a Task were imported with a Problem Specific Problem as its Problem, the application would not correctly provide a warning.
Library Tasks detail page
- Fixed an issue where the full text of a Problem's description was not visible within the view of an associated Task.
Training Modules
- Fixed a 404 issue found on newer training modules.
Training Report
- Fixed a 504 timeout issue when generating the report on an instance with large amounts of training data.
Content additions and updates (as of January 18, 2021):
Compliance Regulations and Mappings
- China Cybersecurity Law
- NIST 800-53 Rev. 5
- NIST 800-53B [New "High", "Moderate", "Low" and "Privacy" baselines.]
- ISO 27001:2013 [Updated the mapping.]
New Content Packs
- China Cyber Law
T7: Salt and hash stored passwords [Updated]
- Updated the recommendations about the salt storage.
- T21: Ensure all data in transit is encrypted using a secure TLS channel [Updated]
- Deleted Match Conditions "Changes Since Last Release - Changes to inbound/outbound interfaces (OR) Changes Since Last Release - Changes to servers/frameworks and/or configuration".
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T59: Use standard libraries for cryptography
- TA3490: Follow cryptography best practices (Hardware/Firmware) [Added]
- T87: Verify that all data in transit is encrypted using a secure TLS channel [Updated]
- Deleted Match Conditions "Changes Since Last Release - Changes to inbound/outbound interfaces (OR) Changes Since Last Release - Changes to servers/frameworks and/or configuration".
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T146: Use encryption for network communications in mobile environments [Updated]
- Updated Match Conditions from "Type of Application - Mobile client AND Changes Since Last Release - Changes to inbound/outbound interfaces" to "Type of Application - Mobile client".
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T151: Use cryptographically secure random numbers
- TA3491: Ensure a true random number generator is specified and implemented (Hardware/Firmware) [Added]
- T173: Test that user data is transmitted over secure channel in mobile environment [Updated]
- Updated Match Conditions from "Type of Application - Mobile client AND Changes Since Last Release - Changes to inbound/outbound interfaces" to "Type of Application - Mobile client".
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T205: Avoid inter-process race conditions
- TA3494: Follow best practices to avoid Race Conditions (Hardware/Firmware) [Added]
- T210: Encrypt sensitive data during transmission for rich clients [Updated]
- Updated Match Conditions from "Changes Since Last Release - Changes to inbound/outbound interfaces AND Type of Application - Rich client" to "Type of Application - Rich client".
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T244: Securely delete any unprotected sensitive data before a resource is released or shared
- TA3487: Remove sensitive information before releasing resources (Hardware/Firmware) [Added]
- TA3492: Prevent improper scrubbing of sensitive data from decommissioned devices (Hardware/Firmware) [Added]
- TA3493: Prevent sensitive data exposure due to Debug/Power State Transition (Hardware/Firmware) [Added]
- TA3496: Safeguard against confidentiality breach of sensitive remanent data [Added]
- T302: Test that sensitive data is transmitted over secure channel for rich clients [Updated]
- Updated Match Conditions from "Changes Since Last Release - Changes to inbound/outbound interfaces AND Type of Application - Rich client" to "Type of Application - Rich client".
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T327: Review security of Node.js modules before installation [Updated]
- Updated the hyperlinks and added a note about the usage of the npm-audit tool instead of Node Security Platform.
- T379: Provide sufficient documentation for security-related features
- TA3495: Restrict undocumented and non-transparent resource sharing of microarchitectural resources (Hardware/Firmware) [Added]
- T394: Secure one-time passwords (OTP) [Updated]
- Updated the recommendations about the salt storage.
- T521: Protect the ZigBee network infrastructure with a Network Key [Updated]
- Updated Match Conditions from "Low-Power Protocols Used - ZigBee AND Changes Since Last Release - Changes to servers/frameworks and/or configuration" to "Low-Power Protocols Used - ZigBee".
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T529: Verify that a Network Key is utilized in the ZigBee network [Updated]
- Updated Match Conditions from "Low-Power Protocols Used - ZigBee AND Changes Since Last Release - Changes to servers/frameworks and/or configuration" to "Low-Power Protocols Used - ZigBee".
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T538: Disable or protect JTAG interfaces in production
- TA3489: Ensure that password checking logic is resistant to timing attacks (Hardware/Firmware) [Added]
- T540: Restrict direct memory access
- TA3488: Use IOMMU to orchestrate IO access (Hardware/Firmware) [Added]
- T566: Enable network layer encryption for local area network communications [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T590: Verify that network layer encryption is enabled for local area network communications [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- T620: Use SSL/TLS offloading, encryption and certificates with NGINX
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T875: Secure Apache SSL/TLS (Apache HTTP Server)
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T876: Verify Apache SSL/TLS configuration (Apache HTTP Server)
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T908: Require SSL/TLS for 'forms authentication' (Microsoft IIS)
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T910: Configure transport layer security for 'basic authentication' (Microsoft IIS)
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T942: Test that 'forms authentication' require SSL/TLS (Microsoft IIS)
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T944: Test that transport layer security for 'basic authentication' is configured (Microsoft IIS)
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- Updated Match Conditions. See Match Conditions footnotes for more details.
- P216: Clear Text and Unencrypted Transmission of Information [Updated]
- T1915: Perform network vulnerability assessment
- TA3486: China Cybersecurity Law (Article 21) – Multi-Level Protection Scheme (MLPS) [Added]
- T1925: Maintain the default behavior for anonymous access (OpenShift) [Updated]
- Updated text and title.
- P1440: Changing default behavior for anonymous access (OpenShift) [Updated]
- Updated text and title.
- T1926: Verify that the default behavior for anonymous access is maintained (OpenShift) [Updated]
- Updated text and title.
- P1440: Changing default behavior for anonymous access (OpenShift) [Updated]
- Updated text and title.
- T1927: Disable basic-auth-file method (OpenShift) [Updated]
- Updated text and title.
- P1441: Using static passwords (OpenShift) [Updated]
- Updated text and title.
- T1928: Verify that the basic-auth-file option has not been configured (OpenShift) [Updated]
- Updated text and title.
- P1441: Using static passwords (OpenShift) [Updated]
- Updated text and title.
- T1929: Secure communication between API server and master nodes (OpenShift) [Updated]
- Updated text and title.
- P1442: Unsecure connection between API server and node/kubelet (OpenShift) [Updated]
- Updated text and title.
- I1308: OpenShift: How to see the cert and key used by the API server to sign service account tokens: [Updated]
- T1930: Verify that the connection between API server and master node is secure (OpenShift) [Updated]
- Updated text and title.
- P1442: Unsecure connection between API server and node/kubelet (OpenShift) [Updated]
- Updated text and title.
- T1931: Prevent insecure bindings and insecure port access (OpenShift) [Updated]
- Updated text and title.
- P1443: Insecure binding or port access for API server (OpenShift) [Updated]
- Updated text and title.
- T1932: Verify that insecure-bind-address and insecure-port are disabled (OpenShift) [Updated]
- Updated text and title.
- P1443: Insecure binding or port access for API server (OpenShift) [Updated]
- Updated text and title.
- T1933: Do not disable secure-port for API server traffic (OpenShift) [Updated]
- Updated text and title.
- P1444: Disabled secure-port flag (OpenShift) [Updated]
- Updated text and title.
- I1310: OpenShift: How to make sure 'secure-port' is not disabled [Updated]
- T1934: Verify that 'secure-port' is not disabled (OpenShift)
- P1444: Disabled secure-port flag (OpenShift) [Updated]
- Updated text and title.
- P1444: Disabled secure-port flag (OpenShift) [Updated]
- T1939: Disable AlwaysAdmit admission controller (OpenShift) [Updated]
- Updated text and title.
- P1447: Active AlwaysAdmit admission controller (OpenShift) [Updated]
- Updated text and title.
- I1313: OpenShift: How to disable 'AlwaysAdmit' admission controller [Updated]
- T1940: Verify that AlwaysAdmit admission controller is disabled (OpenShift) [Updated]
- Updated text and title.
- P1447: Active AlwaysAdmit admission controller (OpenShift) [Updated]
- Updated text and title.
- T1941: Disable the AlwaysPullImages admission control plugin (OpenShift) [Updated]
- Updated text and title.
- P1448: Active AlwaysPullImages admission controller (OpenShift) [Updated]
- Updated text and title.
- T1942: Verify that the admission control plugin AlwaysPullImages is not set (OpenShift) [Updated]
- Updated text and title.
- P1448: Active AlwaysPullImages admission controller (OpenShift) [Updated]
- Updated text and title.
- T1943: Use Security Context Constraints instead of SecurityContextDeny admission controllers (OpenShift) [Updated]
- Updated text and title.
- P1449: Using DenyEscalatingExec or SecurityContextDeny admission controllers (OpenShift) [Updated]
- Updated text and title.
- T1944: Verify that the list of admission controllers does not include SecurityContextDeny (OpenShift) [Updated]
- Updated text and title.
- P1449: Using DenyEscalatingExec or SecurityContextDeny admission controllers (OpenShift) [Updated]
- Updated text and title.
- T1945: Do not disable NamespaceLifecycle admission controller (OpenShift) [Updated]
- Updated text and title.
- P1450: Disabled NamespaceLifecycle admission controller (OpenShift) [Updated]
- Updated text and title.
- I1316: OpenShift: How to make sure 'NamespaceLifecycle' plugin is not disabled [Updated]
- T1946: Verify that the NamespaceLifecycle plugin is not disabled (OpenShift) [Updated]
- Updated text and title.
- P1450: Disabled NamespaceLifecycle admission controller (OpenShift) [Updated]
- Updated text and title.
- T1947: Configure auditing properly on the API server (OpenShift) [Updated]
- Updated text and title.
- P1451: Lack of proper auditing or retention of audit logs for API server (OpenShift) [Updated]
- Updated text and title.
- T1948: Verify that API server auditing is configured properly (OpenShift) [Updated]
- Updated text and title.
- P1451: Lack of proper auditing or retention of audit logs for API server (OpenShift) [Updated]
- Updated text and title.
- T1949: Do not set authorization-mode flag (OpenShift) [Updated]
- Updated text and title.
- P1452: Using authorization-mode flag (OpenShift) [Updated]
- Updated text and title.
- I1317: OpenShift: How to make sure 'authorization-mode' is not set [Updated]
- T1950: Verify that the authorization-mode argument is not set to AlwaysAllow and Node authorizer is enabled (OpenShift) [Updated]
- Updated text and title.
- P1452: Using authorization-mode flag (OpenShift) [Updated]
- Updated text and title.
- T1951: Do not use static token files for authentication (OpenShift) [Updated]
- Updated text and title.
- P1453: Using static token files (OpenShift) [Updated]
- Updated text and title.
- I1318: OpenShift: How to make sure static token files are not used [Updated]
- T1952: Verify that static token files are not used (OpenShift) [Updated]
- Updated text and title.
- P1453: Using static token files (OpenShift) [Updated]
- Updated text and title.
- T1953: Ensure that the service-account-lookup and service-account-key-file arguments are properly set (OpenShift) [Updated]
- Updated text and title.
- P1454: Using service-account-lookup or service-account-key-file arguments (OpenShift) [Updated]
- Updated text and title.
- I1319: OpenShift: How to see public/private keys used by the API server to sign service account tokens [Updated]
- T1954: Verify that the service-account-lookup and service-account-key-file arguments are properly set (OpenShift) [Updated]
- Updated text and title.
- P1454: Using service-account-lookup or service-account-key-file arguments (OpenShift) [Updated]
- Updated text and title.
- T1955: Do not enable PodSecurityPolicy admission control plugin (OpenShift) [Updated]
- Updated text and title.
- P1455: Enabling PodSecurityPolicy and SecurityContextConstraints at the same time (OpenShift) [Updated]
- Updated text and title.
- T1956: Verify that the admission control plugin SecurityContextConstraint is set (OpenShift)
- P1455: Enabling PodSecurityPolicy and SecurityContextConstraints at the same time (OpenShift) [Updated]
- Updated text and title.
- P1455: Enabling PodSecurityPolicy and SecurityContextConstraints at the same time (OpenShift) [Updated]
- T1957: Ensure that etcd arguments are properly set (OpenShift) [Updated]
- Updated text and title.
- P1456: Unsecure communication to etcd (OpenShift) [Updated]
- Updated text and title.
- I1321: OpenShift: How to see the cert and key used by the API server for etcd communication [Updated]
- T1958: Verify that etcd arguments are properly set (OpenShift) [Updated]
- Updated text and title.
- P1456: Unsecure communication to etcd (OpenShift) [Updated]
- Updated text and title.
- T1959: Do not disable ServiceAccount admission controller (OpenShift) [Updated]
- Updated text and title.
- P1457: Inactive ServiceAccount admission controller (OpenShift) [Updated]
- Updated text and title.
- T1960: Verify that the admission control plugin ServiceAccount is set (OpenShift) [Updated]
- Updated text and title.
- P1457: Inactive ServiceAccount admission controller (OpenShift) [Updated]
- Updated text and title.
- T1961: Ensure that the admission control plugin NodeRestriction is enabled (OpenShift) [Updated]
- Updated text and title.
- P1458: Disabled NodeRestriction admission plugin (OpenShift) [Updated]
- Updated text and title.
- T1962: Verify that the admission control plugin NodeRestriction is set (OpenShift) [Updated]
- Updated text and title.
- P1458: Disabled NodeRestriction admission plugin (OpenShift) [Updated]
- Updated text and title.
- T1963: Encrypt data at rest in etcd datastore with aescbc encryption (OpenShift) [Updated]
- Updated text and title.
- P1459: Unencrypted data on etcd (OpenShift) [Updated]
- Updated text and title.
- T1964: Verify data at rest on etcd datastore is encrypted with aescbc encryption provider (OpenShift) [Updated]
- Updated text and title.
- P1459: Unencrypted data on etcd (OpenShift) [Updated]
- Updated text and title.
- T1965: Enable the APIPriorityAndFairness feature gate (OpenShift) [Updated]
- Updated text and title.
- P1460: No rate limit for requests to API server (OpenShift) [Updated]
- Updated text and title.
- T1966: Verify that the APIPriorityAndFairness feature gate is enabled (OpenShift) [Updated]
- Updated text and title.
- P1460: No rate limit for requests to API server (OpenShift) [Updated]
- Updated text and title.
- T1967: Adjust the request timeout value (OpenShift) [Updated]
- Updated text and title.
- P1461: Inappropriate request timeout value (OpenShift) [Updated]
- Updated text and title.
- I1323: OpenShift: How to change the 'request-timeout' value [Updated]
- T1968: Verify that request timeout is set to an appropriate value (OpenShift) [Updated]
- Updated text and title.
- P1461: Inappropriate request timeout value (OpenShift) [Updated]
- Updated text and title.
- T1971: Adjust the terminated-pod-gc-threshold argument as needed (OpenShift) [Updated]
- Updated text and title.
- P1463: Inappropriate terminated-pod-gc-threshold value (OpenShift) [Updated]
- Updated text and title.
- T1972: Verify that the terminated-pod-gc-threshold and eviction arguments are set as appropriate (OpenShift) [Updated]
- Updated text and title.
- P1463: Inappropriate terminated-pod-gc-threshold value (OpenShift) [Updated]
- Updated text and title.
- T1973: Do not disable use-service-account-credentials argument (OpenShift) [Updated]
- Updated text and title.
- P1464: Disabling use-service-account-credentials argument (OpenShift) [Updated]
- Updated text and title.
- I1325: OpenShift: How to make sure 'use-service-account-credentials' is not disabled [Updated]
- T1974: Verify that use-service-account-credentials is not disabled (OpenShift) [Updated]
- Updated text and title.
- P1464: Disabling use-service-account-credentials argument (OpenShift) [Updated]
- Updated text and title.
- T1975: Do not change the default setting for service-account-private-key-file (OpenShift) [Updated]
- Updated text and title.
- P1465: Changing the default service-account-private-key-file (OpenShift) [Updated]
- Updated text and title.
- I1326: OpenShift: How to make sure the 'service-account-private-key-file' argument is not set [Updated]
- T1976: Verify that the service-account-private-key-file argument is properly set (OpenShift) [Updated]
- Updated text and title.
- P1465: Changing the default service-account-private-key-file (OpenShift) [Updated]
- Updated text and title.
- T1977: Ensure that root-ca-file is properly set (OpenShift) [Updated]
- Updated text and title.
- P1466: Changing the default root-ca-file (OpenShift) [Updated]
- Updated text and title.
- I1327: OpenShift: How to make sure 'root-ca-file' argument is not set [Updated]
- T1978: Verify that the root-ca-file argument is not set (OpenShift) [Updated]
- Updated text and title.
- P1466: Changing the default root-ca-file (OpenShift) [Updated]
- Updated text and title.
- T1979: Never give pods more privileges than required (OpenShift) [Updated]
- Updated text and title.
- P1467: Giving unnecessary privileges to the pods (OpenShift) [Updated]
- Updated text and title.
- T1980: Verify that Security Context Constraints get applied (OpenShift) [Updated]
- Updated text and title.
- P1467: Giving unnecessary privileges to the pods (OpenShift) [Updated]
- Updated text and title.
- T1981: Enable the RotateKubeletServerCertificate feature gate (OpenShift) [Updated]
- Updated text and title.
- P1468: Lack of certificate rotation (OpenShift) [Updated]
- Updated text and title.
- I1328: OpenShift: How to rotate certificates [Updated]
- T1982: Verify that RotateKubeletServerCertificate is set to true (OpenShift) [Updated]
- Updated text and title.
- P1468: Lack of certificate rotation (OpenShift) [Updated]
- Updated text and title.
- T1983: Set permissions for sensitive files properly (OpenShift) [Updated]
- Updated text and title.
- P1469: Improper permissions for sensitive files (OpenShift) [Updated]
- Updated text and title.
- I1329: OpenShift: How to set the permissions for the configuration files [Updated]
- T1984: Verify the permissions for the configuration files (OpenShift) [Updated]
- Updated text and title.
- P1469: Improper permissions for sensitive files (OpenShift) [Updated]
- Updated text and title.
- T1985: Secure etcd communication (OpenShift) [Updated]
- Updated text and title.
- P1470: Unsecure etcd communication (OpenShift) [Updated]
- Updated text and title.
- T1986: Verify that etcd communication is secure (OpenShift) [Updated]
- Updated text and title.
- P1470: Unsecure etcd communication (OpenShift) [Updated]
- Updated text and title.
- T1987: Follow the principle of least privilege (OpenShift) [Updated]
- Updated text and title.
- P1471: Granting excessive permissions (OpenShift) [Updated]
- Updated text and title.
- I1493: OpenShift: How to remove 'cluster-admin' role from 'clusterrolebindings' [Added]
- T1988: Verify that the cluster-admin role is only used where required (OpenShift) [Updated]
- Updated text and title.
- P1471: Granting excessive permissions (OpenShift) [Updated]
- Updated text and title.
- T1989: Run pods with the most restrictive Security Context Constraints possible (OpenShift) [Updated]
- Updated text and title.
- P1472: Loose access constraints for pods (OpenShift) [Updated]
- Updated text and title.
- T1990: Verify Security Context Constraints as in use (OpenShift) [Updated]
- Updated text and title.
- P1472: Loose access constraints for pods (OpenShift) [Updated]
- Updated text and title.
- T1991: Restrict access to projects only to the required users (OpenShift) [Updated]
- Updated text and title.
- P1473: Excessive access to projects (OpenShift) [Updated]
- Updated text and title.
- T1992: Verify that only required users are assigned to projects (OpenShift) [Updated]
- Updated text and title.
- P1473: Excessive access to projects (OpenShift) [Updated]
- Updated text and title.
- T1995: Enable and configure seccomp (OpenShift) [Updated]
- Updated text and title.
- P1475: Running containers with unconfined seccomp settings (OpenShift) [Updated]
- Updated text and title.
- T1996: Verify that Security Context Constraints have been configured with seccomp (OpenShift)
- P1475: Running containers with unconfined seccomp settings (OpenShift) [Updated]
- Updated text and title.
- P1475: Running containers with unconfined seccomp settings (OpenShift) [Updated]
- T1997: Manage image provenance using ImagePolicy plugin (OpenShift) [Updated]
- Updated text and title.
- P1476: Lack of control on images run in a cluster (OpenShift) [Updated]
- Updated text and title.
- I1330: OpenShift: How to edit the 'image.config.openshift.io/cluster' to configure Image Provenance [Updated]
- T1998: Verify image policy configuration (OpenShift) [Updated]
- Updated text and title.
- P1476: Lack of control on images run in a cluster (OpenShift) [Updated]
- Updated text and title.
- T1999: Implement strong network policies (OpenShift) [Updated]
- Updated text and title.
- P1477: Lack of network access control (OpenShift) [Updated]
- Updated text and title.
- I1492: OpenShift: How to create a network policy and and add proper NetworkPolicy objects [Added]
- T2000: Verify network policies (OpenShift) [Updated]
- Updated text and title.
- P1477: Lack of network access control (OpenShift) [Updated]
- Updated text and title.
- T2001: Limit the use of privileged containers (OpenShift) [Updated]
- Updated text and title.
- P1478: Using privileged containers (OpenShift) [Updated]
- Updated text and title.
- T2002: Verify the usage of privileged containers (OpenShift) [Updated]
- Updated text and title.
- P1478: Using privileged containers (OpenShift) [Updated]
- Updated text and title.
- T2005: Do not enable the anonymous-auth flag (OpenShift) [Updated]
- Updated text and title.
- P1480: Setting the anonymous-auth flag to true (OpenShift) [Updated]
- Updated text and title.
- T2006: Verify that the anonymous-auth argument is set to false (OpenShift) [Updated]
- Updated text and title.
- P1480: Setting the anonymous-auth flag to true (OpenShift) [Updated]
- Updated text and title.
- T2007: Do not set the authorization-mode argument (OpenShift) [Updated]
- Updated text and title.
- P1481: Setting the authorization-mode argument (OpenShift) [Updated]
- Updated text and title.
- T2008: Verify that the authorization-mode argument is not set (OpenShift) [Updated]
- Updated text and title.
- P1481: Setting the authorization-mode argument (OpenShift) [Updated]
- Updated text and title.
- T2009: Do not change the default value of the client-ca-file argument (OpenShift) [Updated]
- Updated text and title.
- P1482: Improper configuration of the client-ca-file argument (OpenShift) [Updated]
- Updated text and title.
- T2010: Verify that the clientCAFile exists and is not changed (OpenShift) [Updated]
- Updated text and title.
- P1482: Improper configuration of the client-ca-file argument (OpenShift) [Updated]
- Updated text and title.
- T2011: Do not set the read-only-port argument (OpenShift) [Updated]
- Updated text and title.
- P1483: Enabling read-only port (OpenShift) [Updated]
- Updated text and title.
- T2012: Verify that the read-only port is not enabled (OpenShift) [Updated]
- Updated text and title.
- P1483: Enabling read-only port (OpenShift) [Updated]
- Updated text and title.
- T2013: Adjust the value of streaming-connection-idle-timeout argument (OpenShift) [Updated]
- Updated text and title.
- P1484: Improper value for the streaming-connection-idle-timeout argument (OpenShift) [Updated]
- Updated text and title.
- I1332: OpenShift: How to set the 'streaming-connection-timeout' value [Updated]
- T2014: Verify the value of streaming-connection-idle-timeout argument (OpenShift) [Updated]
- Updated text and title.
- P1484: Improper value for the streaming-connection-idle-timeout argument (OpenShift) [Updated]
- Updated text and title.
- T2015: Make sure that protect-kernel-defaults is not set (OpenShift) [Updated]
- Updated text and title.
- P1485: Setting the protect-kernel-defaults argument (OpenShift) [Updated]
- Updated text and title.
- T2016: Verify that protectKernelDefaults is not set (OpenShift) [Updated]
- Updated text and title.
- P1485: Setting the protect-kernel-defaults argument (OpenShift) [Updated]
- Updated text and title.
- T2017: Ensure that the make-iptables-util-chains is set to true (OpenShift) [Updated]
- Updated text and title.
- P1486: Disabling the make-iptables-util-chains flag (OpenShift) [Updated]
- Updated text and title.
- T2018: Verify that make-iptables-util-chains is set to true for each machinepool (OpenShift) [Updated]
- Updated text and title.
- P1486: Disabling the make-iptables-util-chains flag (OpenShift) [Updated]
- Updated text and title.
- T2021: Ensure that the hostname-override is not set (OpenShift) [Updated]
- Updated text and title.
- P1488: Disabling the hostname-override flag (OpenShift) [Updated]
- Updated text and title.
- T2022: Verify that hostname-override does not exist (OpenShift) [Updated]
- Updated text and title.
- P1488: Disabling the hostname-override flag (OpenShift) [Updated]
- Updated text and title.
- T2023: Set the kubeAPIQPS event-qps argument to 0 (OpenShift) [Updated]
- Updated text and title.
- P1489: Non-zero value for the event-qps argument (OpenShift) [Updated]
- Updated text and title.
- I1491: OpenShift: How to edit 'kubeAPIQPS' parameters [Added]
- T2024: Verify that the value of event-qps is set to 0 (OpenShift) [Updated]
- Updated text and title.
- P1489: Non-zero value for the event-qps argument (OpenShift) [Updated]
- Updated text and title.
- T2025: Ensure that tls-cert-file and tls-private-key-file are properly set (OpenShift) [Updated]
- Updated text and title.
- P1490: Improper value for the cert-dir argument (OpenShift) [Updated]
- Updated text and title.
- T2026: Verify that the kubelet-client-certificate and kubelet-client-key are properly set (OpenShift) [Updated]
- Updated text and title.
- P1490: Improper value for the cert-dir argument (OpenShift) [Updated]
- Updated text and title.
- T2029: Do not disable rotate-certificates (OpenShift) [Updated]
- Updated text and title.
- P1492: Disabling the RotateKubeletClientCertificate and RotateKubeletServerCertificate flags (OpenShift) [Updated]
- Updated text and title.
- T2030: Verify that rotate-certificates settings are not disabled (OpenShift) [Updated]
- Updated text and title.
- P1492: Disabling the RotateKubeletClientCertificate and RotateKubeletServerCertificate flags (OpenShift) [Updated]
- Updated text and title.
- T2170: Ensure personal data processed by the application meets data localization requirements [Added]
- TA3485: China Cybersecurity Law (Article 37) – Data Localization [Added]
- T2171: Avoid observable discrepancy and side channel attacks (Hardware/Firmware) [Added]
- P1569: Observable discrepancy (Hardware/Firmware) [Added]
- T2172: Enforce the principle of least privilege (Hardware/Firmware) [Added]
- P1570: Incorrect default permissions (Hardware/Firmware) [Added]
- T2173: Ensure the expected behavior is implemented (Hardware/Firmware) [Added]
- P1571: Expected behavior violation (Hardware/Firmware) [Added]
- T2174: Avoid unintended proxy or intermediary (Confused Deputy) (Hardware/Firmware) [Added]
- P1572: Unintended proxy or intermediary (Confused Deputy) (Hardware/Firmware) [Added]
- T2175: Provide documentation for design (Hardware/Firmware) [Added]
- P1573: Missing documentation for design (Hardware/Firmware) [Added]
- T2176: Avoid mixing agents of varying trust levels (Hardware/Firmware) [Added]
- P1574: Improper isolation of shared resources on SoC (Hardware/Firmware) [Added]
- T2177: Generate unique and immutable identifiers in SoC (Hardware/Firmware) [Added]
- P1575: SoC using components without unique and immutable identifiers (Hardware/Firmware) [Added]
- T2178: Ensure fabric access controls enablement before 3rd party hardware IPs (Hardware/Firmware) [Added]
- P1576: Power-on of untrusted execution core before enabling fabric access control (Hardware/Firmware) [Added]
- T2179: Block write operations to reserve bits (Hardware/Firmware) [Added]
- P1577: Failure to disable reserved bits (Hardware/Firmware) [Added]
- T2180: Review Access Control Policy (Hardware/Firmware) [Added]
- P1578: Insufficient granularity of access control (Hardware/Firmware) [Added]
- T2181: Evaluate write-once registers for proper configuration (Hardware/Firmware) [Added]
- P1579: Race condition for write-once attributes (Hardware/Firmware) [Added]
- T2182: Check lock bit protections for design consistency (Hardware/Firmware) [Added]
- P1580: Improper implementation of lock protection registers (Hardware/Firmware) [Added]
- T2183: Avoid using chicken bits (Hardware/Firmware) [Added]
- P1581: Inclusion of undocumented features or chicken bits (Hardware/Firmware) [Added]
- T2184: Disable access to security-sensitive information stored in fuses (Hardware/Firmware) [Added]
- P1582: Sensitive non-volatile information not protected during debug (Hardware/Firmware) [Added]
- T2185: Prevent unauthorized access to sensitive data through debug or test interfaces (Hardware/Firmware) [Added]
- P1583: Improper access to sensitive information using debug and test interfaces (Hardware/Firmware) [Added]
- T2186: Enforce valid Finite State Machines (FSMs) in hardware logic (Hardware/Firmware) [Added]
- P1584: Improper finite state machines (FSMs) in hardware logic (Hardware/Firmware) [Added]
- T2187: Enforce proper implementation of wear leveling operations (Hardware/Firmware) [Added]
- P1585: Improper write handling in limited-write non-volatile memories (Hardware/Firmware) [Added]
- T2188: Enforce proper protection against voltage and clock glitches (Hardware/Firmware) [Added]
- P1586: Missing or improperly implemented protection against voltage and clock glitches (Hardware/Firmware) [Added]
- T2189: Prevent Semiconductor Defects in Hardware Logic with Security-Sensitive Implications (Hardware/Firmware) [Added]
- P1587: Semiconductor defects in hardware logic with security-sensitive implications (Hardware/Firmware) [Added]
- T2190: Prevent mirroring regions with different values (Hardware/Firmware) [Added]
- P1588: Mirrored regions with different values (Hardware/Firmware) [Added]
- T2191: Ensure using configured CPU hardware to support exclusivity of write and execute operations (Hardware/Firmware) [Added]
- P1589: CPU hardware not configured to support exclusivity of write and execute operations (Hardware/Firmware) [Added]
- T2192: Prevent incorrect selection of fuse values (Hardware/Firmware) [Added]
- P1590: Incorrect selection of fuse values (Hardware/Firmware) [Added]
- T2193: Prevent incorrect comparison logic granularity (Hardware/Firmware) [Added]
- P1591: Incorrect comparison logic granularity (Hardware/Firmware) [Added]
- T2194: Prevent hardware features to enable physical attacks from Software (Hardware/Firmware) [Added]
- P1592: Hardware features enable physical attacks from software (Hardware/Firmware) [Added]
- T2195: Ensure access control applied properly to Mirrored or Aliased Memory Regions (Hardware/Firmware) [Added]
- P1593: Improper access control applied to mirrored or aliased memory regions (Hardware/Firmware) [Added]
- T2196: Prevent exposure of sensitive system information due to uncleared debug information (Hardware/Firmware) [Added]
- P1594: Exposure of sensitive system information due to uncleared debug information (Hardware/Firmware) [Added]
- T2197: Prevent Improper Restriction of Security Token Assignment (Hardware/Firmware) [Added]
- P1595: Improper restriction of security token assignment (Hardware/Firmware) [Added]
- T2198: Prevent improper handling of overlap between protected memory ranges (Hardware/Firmware) [Added]
- P1596: Improper handling of overlap between protected memory ranges (Hardware/Firmware) [Added]
- T2199: Prevent improper handling of single-event upsets (Hardware/Firmware) [Added]
- P1597: Improper handling of single event upsets (Hardware/Firmware) [Added]
- T2200: Ensure register interface does not allow software access to sensitive data (Hardware/Firmware) [Added]
- P1598: Register interface allows software access to sensitive data or security settings (Hardware/Firmware) [Added]
- T2201: Enforce Physical access control (Hardware/Firmware) [Added]
- P1599: Improper physical access control (Hardware/Firmware) [Added]
- T2202: Prevent hardware logic with insecure De-Synchronization between control and data channels (Hardware/Firmware) [Added]
- P1600: Hardware logic with insecure desynchronization between control and data channels (Hardware/Firmware) [Added]
- T2203: Prevent policy to use obsolete encoding (Hardware/Firmware) [Added]
- P1601: Policy uses obsolete encoding (Hardware/Firmware) [Added]
- T2204: Enforce policy privilege assignments consistently between control and data agents (Hardware/Firmware) [Added]
- P1602: Policy privileges are not assigned consistently between control and data agents (Hardware/Firmware) [Added]
- T2205: Prevent product released in none-release configuration (Hardware/Firmware) [Added]
- P1603: Product released in non-release configuration (Hardware/Firmware) [Added]
- T2206: Prevent generation of incorrect security tokens (Hardware/Firmware) [Added]
- P1604: Generation of incorrect security tokens (Hardware/Firmware) [Added]
- T2207: Prevent uninitialized value on reset for registers holding security settings (Hardware/Firmware) [Added]
- P1605: Uninitialized value on reset for registers holding security settings (Hardware/Firmware) [Added]
- T2208: Restrict sharing device unlocking credentials across multiple parties (Hardware/Firmware) [Added]
- P1606: Device unlock credential sharing (Hardware/Firmware) [Added]
- T2209: Prevent boot code tampering in the non-volatile memory (Hardware/Firmware) [Added]
- P1607: Insufficient protections on the volatile memory containing boot code (Hardware/Firmware) [Added]
- T2210: Prevent signals conflict between a hardware IP and the parent system (Hardware/Firmware) [Added]
- P1608: Hardware child block incorrectly connected to parent system (Hardware/Firmware) [Added]
- T2211: Include firmware update mechanism/feature (Hardware/Firmware) [Added]
- P1609: Firmware not capable of being updated (Hardware/Firmware) [Added]
- T2212: Use Integrated Circuit (IC) Imaging Techniques to protect against hardware reverse engineering (Hardware/Firmware) [Added]
- P1610: Missing protection against reverse engineering using IC imaging techniques (Hardware/Firmware) [Added]
- T2213: Implement access control checks before accessing the assets (Hardware/Firmware) [Added]
- P1611: Access control check implemented after asset is accessed (Hardware/Firmware) [Added]
- T2214: Protect unexpected behavior of system due to sequence of processor instructions (Halt and Catch Fire) (Hardware/Firmware) [Added]
- P1612: Sequence of processor instructions leads to unexpected behavior (halt and catch fire) (Hardware/Firmware) [Added]
- T2215: Prevent modification of immutable data (Hardware/Firmware) [Added]
- P1613: Assumed-immutable data is stored in writable memory (Hardware/Firmware) [Added]
- T2216: Prevent modification of measurement reporting data by an untrusted agent (Hardware/Firmware) [Added]
- P1614: Mutable attestation or measurement reporting data (Hardware/Firmware) [Added]
- T2217: Prevent security identifiers from unauthorized access while decoding (Hardware/Firmware) [Added]
- P1615: Incorrect decoding of security identifiers (Hardware/Firmware) [Added]
- T2218: Prevent same Public Key usage for different environments (Debug and Production) (Hardware/Firmware) [Added]
- P1616: Public key re-use for signing both debug and production code (Hardware/Firmware) [Added]
- T2219: Implement secure conversion of Security Identifiers (Hardware/Firmware) [Added]
- P1617: Incorrect conversion of security identifiers (Hardware/Firmware) [Added]
- T2220: Implement secure mechanism to generate Security Identifiers (Hardware/Firmware) [Added]
- P1618: Insecure security identifier mechanism (Hardware/Firmware) [Added]
- T2221: Prevent debugging messages revealing sensitive Information (Hardware/Firmware) [Added]
- P1619: Debug messages revealing unnecessary information (Hardware/Firmware) [Added]
- T2222: Prevent incorrect Chaining or Granularity of Debug Components (Hardware/Firmware) [Added]
- P1620: Incorrect chaining or granularity of debug components (Hardware/Firmware) [Added]
- T2223: Restrict access to confidential information on device by OSAT vendors (Hardware/Firmware) [Added]
- P1621: Unprotected confidential information on device is accessible by OSAT vendors (Hardware/Firmware) [Added]
- T2224: Implement protections to alternate access paths and interfaces inside the SoC (Hardware/Firmware) [Added]
- P1622: Missing protection mechanism for alternate hardware interface (Hardware/Firmware) [Added]
- T2225: Data remanence within the hardware component (Hardware/Firmware) [Added]
- P1623: Insufficient or incomplete data removal within hardware component (Hardware/Firmware) [Added]
- T2226: Transaction without a security identifier (Hardware/Firmware) [Added]
- P1624: Missing security identifier (Hardware/Firmware) [Added]
- T2227: Preserve the integrity of hardware configuration state (Hardware/Firmware) [Added]
- P1625: Improperly preserved integrity of hardware configuration state during a power save/restore operation (Hardware/Firmware) [Added]
- T2228: Include functionality to patch Read-only-Memory (ROM) Code (Hardware/Firmware) [Added]
- P1626: Missing ability to patch ROM code (Hardware/Firmware) [Added]
- T2229: Prevent improper translation of security attributes by Fabric Bridge (Hardware/Firmware) [Added]
- P1627: Improper translation of security attributes by fabric bridge (Hardware/Firmware) [Added]
- T2230: Protect mirrored regions in On-Chip Fabric Firewall (Hardware/Firmware) [Added]
- P1628: Missing protection for mirrored regions in on-chip fabric firewall (Hardware/Firmware) [Added]
- T2231: Protect debug logic (feature) runtime alterations and sensitive data exposure (Hardware/Firmware) [Added]
- P1629: Hardware allows activation of test or debug logic at runtime (Hardware/Firmware) [Added]
- T2232: Use write protection for Parametric Data values (Hardware/Firmware) [Added]
- P1630: Missing write protection for parametric data values (Hardware/Firmware) [Added]
- T2233: Set proper setting of Bus Controlling Capability in Fabric end-point (Hardware/Firmware) [Added]
- P1631: Improper setting of bus controlling capability in fabric end-point (Hardware/Firmware) [Added]
- T2234: Restrict mapping of unwarranted programming overlaps of protected and unprotected ranges by Fabric-Address (Hardware/Firmware) [Added]
- P1632: Fabric-address map allows programming of unwarranted overlaps of protected and unprotected ranges (Hardware/Firmware) [Added]
- T2235: Put security checks in Fabric Bridge (Hardware/Firmware) [Added]
- P1633: Missing security checks in fabric bridge (Hardware/Firmware) [Added]
- T2236: Put security controls in On-chip Fabrics or Buses (Hardware/Firmware) [Added]
- P1634: Missing support for security features in on-chip fabrics or buses (Hardware/Firmware) [Added]
- T2237: Protect against Electromagnetic Fault Injection (EM-FI) (Hardware/Firmware) [Added]
- P1635: Improper protection against Electromagnetic Fault Injection (EM-FI) (Hardware/Firmware) [Added]
- T2238: Protect alert signals against untrusted agents (Hardware/Firmware) [Added]
- P1636: Improper protection for out of bounds signal level alerts (Hardware/Firmware) [Added]
- T2239: Tag traces to indicate owner and debugging privilege level (Hardware/Firmware) [Added]
- P1637: Improper management of sensitive trace data (Hardware/Firmware) [Added]
- T2240: Designate an immutable Root of Trust for storage (Hardware/Firmware) [Added]
- P1638: Missing immutable root of trust in hardware (Hardware/Firmware) [Added]
- T2241: Ensure security version data is protected from tampering (Hardware/Firmware) [Added]
- P1639: Security version number mutable to older versions (Hardware/Firmware) [Added]
- T2242: Implement priority-based arbitration inside the Network on Chips (Hardware/Firmware) [Added]
- P1640: Improper isolation of shared resources in network on chip (Hardware/Firmware) [Added]
- T2243: Protect against fault injection attacks (Hardware/Firmware) [Added]
- P1641: Insufficient protection against instruction skipping via fault injection (Hardware/Firmware) [Added]
- T2244: Protect against error injection errors in redundant blocks (Hardware/Firmware) [Added]
- P1642: Unauthorized error injection can degrade hardware redundancy (Hardware/Firmware) [Added]
T2245: Protect against abnormal thermal range (Hardware/Firmware) [Added]
- P1643: Improper protections against hardware overheating (Hardware/Firmware) [Added]
Updated T186 with the latest security patch levels for third-party libraries
- Rails
- Django
- Spring Framework
- Struts
- Apache Tomcat
- GnuTLS
- Java
- Bouncy Castle
- Unix/Linux Bash
- Node.js
Changes to Project Properties and Profiles
- Q205: Geography [Updated]
- Updated title from "Organization" to "Geography".
- Q237: Compliance Scope: Other
- Q336: In-Scope for China Cybersecurity Law [Added]
- A1308: Yes [Added]
- Q336: In-Scope for China Cybersecurity Law [Added]
- Q278: Hardware Features
- A1300: Hardware design and manufacturing is in scope [Added]
- A1301: Firmware and software development for hardware is in scope [Added]
- A1302: Implements cryptographic algorithms [Added]
- A1304: Has Access Control settings [Added]
- A1305: Hardware/firmware update is in scope [Added]
- A1306: Hardware configuration is in scope [Added]
- Q220: Changes Since Last Release
- A1307: Changes to hardware design [Added]
- Q205: Geography [Updated]
New Just-in-Time Training
- Cloud Security (3 JITTs)
Footnotes for Match Conditions
T566: Enable network layer encryption for local area network communications [Updated]
Updated Match Conditions from:
- IoT Architecture - Has a local area network between IoT devices in scope AND IoT Architecture - This is the core component of a multi-component IoT system AND Changes Since Last Release - Changes to servers/frameworks and/or configuration
- (OR) IoT Architecture - Has a local area network between IoT devices in scope AND IoT Architecture - This is the core component of a multi-component IoT system AND Changes Since Last Release - Changes to inbound/outbound interfaces
To:
- IoT Architecture - Has a local area network between IoT devices in scope AND IoT Architecture - This is the core component of a multi-component IoT system
T590: Verify that network layer encryption is enabled for local area network communications [Updated]
Updated Match Conditions from:
- IoT Architecture - Has a local area network between IoT devices in scope AND IoT Architecture - This is the core component of a multi-component IoT system AND Changes Since Last Release - Changes to servers/frameworks and/or configuration
- (OR) IoT Architecture - Has a local area network between IoT devices in scope AND IoT Architecture - This is the core component of a multi-component IoT system AND Changes Since Last Release - Changes to inbound/outbound interfaces
To:
- IoT Architecture - Has a local area network between IoT devices in scope AND IoT Architecture - This is the core component of a multi-component IoT system
P216: Clear Text and Unencrypted Transmission of Information [Updated]
Updated Match Conditions from:
- Internal Properties (Use this, for all hidden answers) - The application is a generic client application AND Changes Since Last Release - Changes to servers/frameworks and/or configuration
- (OR) Internal Properties (Use this, for all hidden answers) - The application is a generic server application AND Changes Since Last Release - Changes to servers/frameworks and/or configuration
- (OR) Internal Properties (Use this, for all hidden answers) - The application is a generic client application AND Changes Since Last Release - New transactions / use cases
- (OR) Internal Properties (Use this, for all hidden answers) - Microservices - Code AND Changes Since Last Release - New transactions / use cases
To:
- Internal Properties (Use this, for all hidden answers) - The application is a generic client application AND Changes Since Last Release - Changes to servers/frameworks and/or configuration
- (OR) Internal Properties (Use this, for all hidden answers) - The application is a generic server application AND Changes Since Last Release - Changes to servers/frameworks and/or configuration
- (OR) Internal Properties (Use this, for all hidden answers) - The application is a generic client application AND Changes Since Last Release - New transactions / use cases
- (OR) Internal Properties (Use this, for all hidden answers) - Microservices - Code AND Changes Since Last Release - New transactions / use cases
- (OR) Internal Properties (Use this, for all hidden answers) - The application is a generic client application AND Changes Since Last Release - Changes to inbound/outbound interfaces
- (OR) Internal Properties (Use this, for all hidden answers) - The application is a generic server application AND Changes Since Last Release - Changes to inbound/outbound interfaces
- (OR) Internal Properties (Use this, for all hidden answers) - The application is a generic server application AND Changes Since Last Release - New transactions / use cases
- (OR) Internal Properties (Use this, for all hidden answers) - Microservices - Code AND Changes Since Last Release - Changes to inbound/outbound interfaces
- (OR) Internal Properties (Use this, for all hidden answers) - Microservices - Code AND Changes Since Last Release - Changes to servers/frameworks and/or configuration
5.10
New features and improvements
Completion Status Report (Project Reports)
- Added a priority checkbox filter to filter reports by High, Medium, and Low priority Tasks.
- Added a Regulation Dropdown to filter report by Tasks that are relevant to a given regulation.
Project Risk Policy Report
- Added a Regulation Dropdown to filter reports by Tasks that are associated with a given regulation.
All Tasks Report CSV changes
- Added new columns to the All Tasks CSV Report.
- Problem ID, Problem Title, Risk Rating, Business Unit, Application, Project, Issue Tracker Tickets (JIRA, Rally, and so on), Custom Project Attributes.
License Usage Report
- Restructured data presentation and updated nomenclature to improve usability and ease of understanding.
- Note: These changes are to the report only and not to the software license itself.
Library Import and Export
- Added support for JSON and YAML formats.
- Added human readable foreign keys to supplement UUIDs in the exported files.
- Replaced the ‘copied_from’ column with a ‘Custom’ column that can be used to differentiate built-in and custom objects.
- Added support for importing and exporting match conditions for library content.
Project Survey
- Fixed an issue where empty survey sections still appeared even after disabling all answers in those sections via content packs.
- Fixed a frontend issue where custom implied answers were not being deselected automatically when deselecting their parent answers.
Activity Logs
- Added logging for Project Problem-related operations, such as Adding and Removing Manually Added Library Problems or Creating, Updating, and Deleting Project Specific Problems from a project under the Project and Global Activity logs.
Other product improvements
- Minor UI improvements:
- Implemented new toasts/notifications that utilize an icon to better convey the type of notification.
- Changed "View Latest History" link on survey questions to an icon button.
- Added UI functionality for "No Role" users to view their account information (email, first name, last name), view their password reset questions, and view and edit their password.
- Fixed an issue with Azure DevOps integration using Closed Issue Status incorrectly.
- Fixed an issue with Checkmarx scan imports.
- Restricted access to internal network resources for issue tracker and verification tool connections.
- OSD customers that are currently syncing with internal integration services can disable this functionality via the settings file. See the user guide for more details.
Content additions and updates (as of November 24, 2020):
Compliance Regulations and Mappings
- Updated PCI-DSS v3.2.1 compliance report
- Updated PA-DSS v3.2 compliance report
- Disabled PCI-DSS v2.0 compliance report [INFO: Outdated]
- Disabled PA-DSS v2.0 compliance report [INFO: Outdated]
- Added MASVS compliance reports and mappings
- Updated ASD-STIG compliance to Version 5
- Added CNSSI 1253 - Baseline compliance report
- Added CNSSI 1253 - Classified Information Overlay compliance report
- Added CNSSI 1253 - Privacy Overlay compliance report
- Added CNSSI 1253 - Space Platform Overlay compliance report
New Content Packs
- Compliance:CNSSI
- Compliance:MASVS
T1: Use multi-factor authentication for remote access to high risk systems or administrative access to services
- TA2892: Mobile ASVS (section:4.8) Requirements [Added]
- T6: Implement account lockout or authentication throttling
- TA2891: Mobile ASVS (section:2.15) Requirements [Added]
- T46: Do not log confidential data
- I1489: Disable Logging Sensitive Information in Rails [Added]
- T53: Prevent the upload of malicious files and malware
- P325: Unrestricted Upload of Unsafe File Types [Updated]
- INFO: Updated text to include malicious file names.
- P325: Unrestricted Upload of Unsafe File Types [Updated]
- T60: Use correct and approved cryptographic algorithms, parameters, and key lengths [Updated]
- INFO: Updated text to include avoid reusing same key for multiple purposes, and updated recommendation for using FIPS 140-2 to FIPS 140-3.
- T61: Disable default accounts or change all default passwords
- TA840: ASD-STIG requirements for T61 [Updated]
- INFO: Not an inclusive range. 68 Additional Requirements updated.
- TA840: ASD-STIG requirements for T61 [Updated]
- T107: Test that application forbids uploading or transferring malware
- P325: Unrestricted Upload of Unsafe File Types [Updated]
- INFO: Updated text to include malicious file names.
- P325: Unrestricted Upload of Unsafe File Types [Updated]
- T181: Validate models explicitly for fields the user is allowed to update
- I323: Rails (v3.0 and earlier) [Updated]
- INFO: Changed title to specify the version.
- I1487: Rails (v3.0 and later) [Added]
- I323: Rails (v3.0 and earlier) [Updated]
- T189: Minimize the use of unmanaged (native) code [Updated]
- INFO: Updated text to include securely allocate/free/use memory for unmanaged code.
- T278: Follow best security practices when using WebView (Android) [Updated]
- INFO: Updated text to include MASVS requirements.
- T324: Follow best security practices when using WKWebView (iOS) [Updated]
- INFO: Updated text to include MASVS requirements.
- T331: Enforce policies through content security policy (CSP) or XSS protection headers [Updated]
- INFO: Updated title, added XSS protection as the task text explained it as a replacement.
- T335: Sanitize user input before passing to NoSQL operators
- I1490: Secure Query Generation in Rails [Added]
- T340: Use an account and identity management system [Updated]
- INFO: Updated text to include deny all access by default.
- T445: Verify that only approved cryptographic algorithms and key lengths are used [Updated]
- INFO: Updated recommendation for using FIPS 140-2 to FIPS 140-3.
- T542: Protect hardware modules against tampering and probing [Updated]
- INFO: Updated recommendation for using FIPS 140-2 to FIPS 140-3.
- T543: Verify that hardware modules are protected against tampering and probing [Updated]
- INFO: Updated recommendation for using FIPS 140-2 to FIPS 140-3.
- T1541: Decide on the best CSRF defense for your application [Updated]
- INFO: Updated text to add a CSRF defense flowchart.
- T2167: Secure file storage [Added]
- P325: Unrestricted Upload of Unsafe File Types [Updated]
- INFO: Updated text to include malicious file names.
- I1488: Deep File Name Sanitization in Ruby [Added]
- P325: Unrestricted Upload of Unsafe File Types [Updated]
- TA2893 to TA3484: ASD-STIG requirements [INFO: Not an inclusive range. 302 Additional Requirements added.]
TA840 to TA909: ASD-STIG requirements [INFO: Not an inclusive range. 68 Additional Requirements updated.]
Updated T186 with the latest security patch levels for third-party libraries
- Django
- Spring Framework
- Apache Tomcat
- GnuTLS
- Apache Wicket
- Bouncy Castle
- Node.js
Updated the following code scanner mappings
- Checkmarx Static Code Analysis (CxSAST)
- WhiteHat Sentinel
Changes to Project Properties and Profiles
- Q202: More Features
- Q214: Miscellaneous
- A1288: Sends electronic messages and/or emails [Updated]
- INFO: Changed the title from "Sends solicitation emails" to "Sends electronic messages and/or emails".
- A1288: Sends electronic messages and/or emails [Updated]
- Q214: Miscellaneous
- Q237: Compliance Scope: Other
- Q334: MASVS Level
- A1295: Level 1 [Added]
- A1296: Level 2 [Added]
- A1297: R [Added]
- Q334: MASVS Level
- Q202: More Features
New Just-in-Time Training
- BC/DR plan for cloud services
5.9
New features and improvements
Problems view
- Added a feature to create project-specific Problems through the New Problem form. Tasks can be added to the Problem by creating or editing project-specific Tasks.
- Added a Problem Source filter to narrow down Problems shown in the table (default content, custom content, manually added, project specific).
Tasks view
- Added a field to the New Task form for selecting the Problem the Task will belong to. Only available to project-specific tasks. Any Problem accepted into the project can be selected.
Project Survey
- Fixed an issue where disabling all content packs and deselecting an answer in the survey caused the survey to become unresponsive.
- Fixed an issue where disabling/enabling content packs failed to change the survey state accordingly (cache invalidation failed).
- Fixed an issue where disabling an answer that implied another answer that is selected in a project’s survey caused the survey to return a 500 error.
Integrations
- JIRA
- Custom field mappings can now map to date type fields.
- Implemented SmartSync for Pivotal Tracker, reducing the number of API requests sent to Pivotal Tracker during a sync.
- Added the ability to replace strings of text in a Task description with custom values when the Task is synced to an issue tracker.
- Updated the user interface for custom field mapping to support multiline field values.
- Fixed SmartSync issue where statuses in the non-authoritative source are not synchronized if the authoritative source has not been updated.
- Deprecated APIs are no longer used when connecting to Archer.
- Fixed an issue with LDAP sync where character encoding was raising an exception when syncing users and groups.
- JIRA
System Settings
- Fixed a bug in the "Build Pipeline" page under the System Settings where the documentation links were not displaying.
- Fixed a security issue where LDAP credentials for superusers were exposed in the "Authentication" page under the System Settings.
Reports
- The OWASP Top 10 (2017) report title has been renamed to OWASP Top 10 (Latest).
- CSV export
- Updated training list export so that only users with permission to Manage Users may download the CSV export.
- Updated user list export so that only users with permission to Manage Users may download the CSV export.
- All Tasks Report
- The CSV export now includes the following additional fields associated with the Task and Custom Project attributes: Problem ID, Problem Title, Risk rating, Application, Business Unit, Project, Issue Tracker Ticket.
- Problem Summary Report
- Fixed a bug where duplicate rows showed for the same problem.
Manage Groups
- Fixed a bug where the page was not loading if there were a large number of LDAP groups.
Content additions and updates (as of September 18, 2020):
Compliance Regulations and Mappings
- OWASP Top 10 (2017) renamed to OWASP Top 10 (Latest)
- 2020 CWE Top 25 Most Dangerous Software Weaknesses
- NIST 800-53 Mandates compliance reports
- Added to specify more granular sub-control mappings (Mandates) to our NIST 800-53 SDE content. The compliance reports are mapped to the NIST 800-53 impact levels:
- NIST 800-53 Mandates (High) compliance report
- NIST 800-53 Mandates (Moderate) compliance report
- NIST 800-53 Mandates (Low) compliance report
- Added to specify more granular sub-control mappings (Mandates) to our NIST 800-53 SDE content. The compliance reports are mapped to the NIST 800-53 impact levels:
T202: Prevent buffer overflow/underflow
- P21: Buffer Copy without Checking the Bounds [Updated]
- Updated Match Conditions to include Changes Since Last Release, from “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration” to “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration (OR) Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes to User Input/Output Since Last Release - New/modified user input OR changes to how user input is used”
- P21: Buffer Copy without Checking the Bounds [Updated]
- T217: Use compiler settings to mitigate buffer overflows
- P21: Buffer Copy without Checking the Bounds [Updated]
- Updated Match Conditions to include Changes Since Last Release, from “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration” to “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration (OR) Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes to User Input/Output Since Last Release - New/modified user input OR changes to how user input is used”
- P21: Buffer Copy without Checking the Bounds [Updated]
- T256: Test that compiler settings are set to mitigate buffer overflows
- P21: Buffer Copy without Checking the Bounds [Updated]
- Updated Match Conditions to include Changes Since Last Release, from “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration” to “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration (OR) Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes to User Input/Output Since Last Release - New/modified user input OR changes to how user input is used”
- P21: Buffer Copy without Checking the Bounds [Updated]
- T1146: Enable DEP and ASLR on your server
- P21: Buffer Copy without Checking the Bounds [Updated]
- Updated Match Conditions to include Changes Since Last Release, from “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration” to “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration (OR) Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes to User Input/Output Since Last Release - New/modified user input OR changes to how user input is used”
- P21: Buffer Copy without Checking the Bounds [Updated]
- T1147: Verify that DEP and ASLR are enabled on your server
- P21: Buffer Copy without Checking the Bounds [Updated]
- Updated Match Conditions to include Changes Since Last Release, from “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration” to “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration (OR) Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes to User Input/Output Since Last Release - New/modified user input OR changes to how user input is used”
- P21: Buffer Copy without Checking the Bounds [Updated]
- T1366: Identify applicable compliance regulations
- TA2889: Identify compliance regulations of the cloud infrastructure (Cloud) [Added]
- T2134: Compile iOS applications with PIE and ARC flags
- P21: Buffer Copy without Checking the Bounds [Updated]
- Updated Match Conditions to include Changes Since Last Release, from “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration” to “Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes Since Last Release - Changes to servers/frameworks and/or configuration (OR) Internal Properties (Use this, for all hidden answers) - Uses an unmanaged programming language AND Changes to User Input/Output Since Last Release - New/modified user input OR changes to how user input is used”
- P21: Buffer Copy without Checking the Bounds [Updated]
- T2158: Ensure that data is deleted securely and efficiently from storage (Cloud) [Added]
- P1558: Insecure or ineffective erasure of data [Added]
- T2159: Ensure security of virtualized environments (Cloud) [Added]
- P1559: Insecure virtualization [Added]
- T2160: Avoid vendor lock-in as a customer when migrating into or out of solutions (Cloud) [Added]
- P1560: Insufficient data portability in the cloud and insecure migration to the cloud (in and out) [Added]
- T2161: Ensure the cloud management interface is secured properly (Cloud) [Added]
- P1561: Insecure cloud management interface [Added]
- T2162: Prevent malicious insider risks and privileged user abuse in cloud providers (Cloud) [Added]
- P1562: Malicious insiders and abuse of high privilege roles [Added]
- T2163: Ensure the security of hypervisors (Cloud) [Added]
- P1563: Lack of hypervisor security [Added]
- T2164: N/A - Not Applicable [Added]
- Used to identify not applicable sections in the NIST Mandates compliance reports
- P1564: N/A - Not Applicable [Added]
- Used to identify not applicable sections in the NIST Mandates compliance reports
- T2165: Ensure security governance when outsourcing to cloud providers (Cloud) [Added]
- P1565: Loss of control over security of supply chain [Added]
- TA2890: Supplier security assessment (Cloud) [Added]
T2166: Ensure business continuity over cloud services (Cloud) [Added]
- P1566: Lack of business continuity and disaster recovery processes [Added]
Updated T186 with the latest security patch levels for third-party libraries
- Rails
- Django
- Spring Framework
- Apache Tomcat
- GnuTLS
- Apache HTTP Server
- Java
- Bouncy Castle
- Node.js
Updated the following code scanner mappings
- Checkmarx
- AppScan
- WebInspect
- WhiteHat
Changes to Project Properties and Profiles
- Q196: Web Technologies
- Q191: Web Client Technologies Used
- A94: Uses iFrames [Updated]
- Updated Match Conditions from "The application is a generic web application." to "The application is a generic web application. OR Frontend"
- A792: HTML5 [Updated]
- Updated Match Conditions from "The application is a generic web application. OR Rich client" to "The application is a generic web application. OR Rich client OR Frontend"
- A1192: CORS [Updated]
- Updated Match Conditions from "The application is a generic web application." to "The application is a generic web application. OR Frontend"
- A94: Uses iFrames [Updated]
- Q191: Web Client Technologies Used
- Q219: General Changes
- Q220: Changes Since Last Release
- A1294: Changes to processes/activities [Added]
- Q220: Changes Since Last Release
- Q243: Internal Hidden Properties
- Q189: Internal Properties (Use this, for all hidden answers)
- A1293: Cloud [Added]
- Q189: Internal Properties (Use this, for all hidden answers)
- Q258: Architecture/Environment
- Q322: Architecture
- A1142: Contains multiple components that communicate through a network [Updated]
- Added tooltip clarifying use case
- A1142: Contains multiple components that communicate through a network [Updated]
- Q322: Architecture
- Q262: External Dependencies
- Q259: External Code/Data
- A1157: Uses remote procedure calls (RPC) or object serialization/deserialization [Updated]
- Added tooltip clarifying use case
- A1157: Uses remote procedure calls (RPC) or object serialization/deserialization [Updated]
- Q259: External Code/Data
- Q284: Context and Characteristics
- Q252: Application's Context and Characteristics
- A744: The application handles health data [Updated]
- Added tooltip describing Personal Health Information
- A1291: Consumes cloud services [Added]
- A1292: Provides cloud services [Added]
- A744: The application handles health data [Updated]
- Q252: Application's Context and Characteristics
- Q196: Web Technologies
New Just-in-Time Training
- Defending Databases (7 JITTs)
- OWASP Top 10 (40 JITTs)
5.8
New features and improvements
Manually added Library Problems
- Added the ability to manually add Library Problems directly to a Project from the Problems View using the New Problem (+) button.
- Added the ability to delete a manually added Library Problem from the Problems View.
- Problems View
- Added the ability to filter Tasks and Problems by Task Status, Assigned Users, and Task Priority.
User Interface
- Increased maximum character lengths for Compliance Regulation fields:
- Compliance Regulation and Compliance Regulation Section name field increased to 500 characters.
- Compliance Regulation Section description field increased to 5000 characters.
- Increased maximum character lengths for Compliance Regulation fields:
Activity Logs
- Added the ability to export a project’s survey history from Activity Logs:
- Added an export button on the project survey and project activity log to download the project survey history as a CSV file.
- Added an export button on global activity log to download the survey history of all projects as a CSV file.
- Updated Activity Log entries for project survey changes to display the number of changes instead of all individual changes.
- Added the ability to export a project’s survey history from Activity Logs:
Status mapping
- Custom status mapping fields in their supported issue tracker connections are now pre-populated with the required SD Elements status mappings on the creation form:
- Made minor UI additions and description updates to improve user experience.
- Changed ordering of the custom status mappings to align with updated descriptions.
- Custom status mapping fields in their supported issue tracker connections are now pre-populated with the required SD Elements status mappings on the creation form:
Other product improvements
- Fixed an issue synchronizing with Checkmarx version 8.6 and later.
- Updated confirmation messages for deleting risk policy configurations.
- Survey history now displays actions taken, actor, and time for each answer.
- Modifying the email address or accessing the password reset link of a Super User now requires Super User permissions.
- Significantly improved the load time of the Project Survey by 30-50%.
Content additions and updates (as of July 24, 2020):
Compliance Regulations and Mappings
- Added NIST Cybersecurity Framework (CSF) compliance report
- Removed the regulation for OWASP Top 10 (2013)
New Content Packs
- NIST CSF
T4: Use configurable password policies [Updated]
- Updated text
- T5: Use minimum standards for passwords [Updated]
- Updated text
- T20: Generate unique session IDs and reset old IDs after authentication [Updated]
- Updated text
- T1144: Prevent Server-Side Template Injection (SSTI) [Updated]
- Updated text
- T1145: Verify if web page template is vulnerable to SSTI [Updated]
- Updated text
T2157: Secure email and messaging in web applications [Added]
Updated T186 with the latest security patch levels for third-party libraries
- Django
- Spring Framework
- Struts
- Apache Tomcat
- Apache Wicket
- Apache MyFaces
- Java
- Bouncy Castle
- Node.js
Changes to Project Properties and Profiles
- Q193: Application Type
- Q101: Type of Application
- A1289: Frontend [Added]
- Q101: Type of Application
- Q202: More Features
- Q214: Miscellaneous
- A1288: Sends solicitation emails [Added]
- Q214: Miscellaneous
- Q237: Compliance Scope: Other
- Q225: Type of Emails Sent by the Application
- A752: Advertisement or other solicitation emails [Updated]
- Updated tooltip description
- A752: Advertisement or other solicitation emails [Updated]
- Q225: Type of Emails Sent by the Application
- Q331: US Federal and NIST
- Q333: In-Scope for NIST Cybersecurity Framework [Added]
- A1290: Yes [Added]
- Q333: In-Scope for NIST Cybersecurity Framework [Added]
- Q193: Application Type
New Just-in-Time Training
- Microservices (5 modules)
- OpSec Fundamentals (10 modules)
- Defending Android (26 modules)
5.7
New features and improvements
Advanced Project Classification mode
- Replaced the checkbox for toggling Project Classification on and off.
- Added a toggle to switch to Advanced mode in the UI.
- Added a “Factors” tab on the Project Classifications page where you can add, edit, and delete Factors.
- Added a form to create Factors in the UI.
- Updated the Project Classification documentation: https://docs.sdelements.com/release/latest/guide/docs/projects/project_classification.html
User Interface
- Project Survey
- Changed “No Profile” to “Blank” in Profile selection and updated the description to be more informative.
- Added a tab for the Project Survey to make it easier to locate.
- Problems View
- Added a checkbox to filter Problem Tasks by Risk Policy relevance.
- Verification
- The Whitesource reference field in verification notes are now clickable links.
- “Problems” string customization
- Admins can now customize the “Problems” string from System > UI Customization.
- Forms
- Introduced secondary buttons to forms with more than primary and Cancel actions.
- Project Survey
API
- The Project Problems API GET endpoint calls now require {project_id}-{problem_id} instead of {problem_id}.
- Removed ‘related_tasks’. Users should now use Problem Tasks API endpoints to return related tasks for a Problem.
Other product improvements
- Fixed an issue in Library Import/Export where re-importing certain content items with non-standard encodings caused a crash.
- Improved error messages in Library Import/Export.
- Fixed an issue where a user removed from an LDAP group was not removed from its corresponding SD Elements group following a sync.
- Removed the reordering disclaimer in Project Survey subsections as the action was not possible.
- Fixed a tooltip bug on the Phases page.
- Fixed a bug where Project Problems were not accepting related task changes made in the library.
- Fixed a bug on the Problem view caused by rapidly expanding Problems in quick succession.
- Fixed long business unit name column overflow in PDF License Usage reports.
- Fixed an error that caused a crash if content had empty backticks (``).
- Fixed a bug that prevented Reports windows to close when transitioning between Profile and Survey Questions pages in the Project Survey.
- Improved the sorting performance on Global Reports page when sorting by Task Completion %.
Content additions and updates (as of June 12, 2020):
New Content Packs
- Connected Cars
- YAML
T2: Secure the password reset mechanism
- I1455: ASP.NET Core / VB: Generic forget password request messages [Added]
- T4: Use configurable password policies
- I1477: ASP.NET Core / VB: Password Requirements Configuration [Added]
- T6: Implement account lockout or authentication throttling
- I1481: ASP.NET / VB account lockout [Added]
- I1483: ASP.NET Core / VB: Account lockout [Added]
- T7: Salt and hash stored passwords
- I1475: ASP.NET Core / VB: String Hashing [Added]
- T8: Use Consistent Error Handling for All Authentication Failures
- I1468: ASP.NET Core / VB: Generic login failure messages [Added]
- I1471: ASP.NET / VB consistent error handling [Added]
- T15: Centralize authorization
- I1435: ASP.NET / VB centralized authorization [Added]
- T16: Authorize every non-public page
- I1428: ASP.NET / VB non-public page authorization [Added]
- I1429: ASP.NET Core / VB: Authorize non-public pages [Added]
- T21: Ensure all data in transit is encrypted using a secure TLS channel [Updated]
- Updated text
- TA241: WCF - Use X509 Certificates Instead of NTLM [Updated]
- Updated text
- TA751: Use strong encryption algorithms if credit card information is transmitted [Updated]
- Updated text
- TA965: Choice of cipher [Updated]
- Updated text
- I479: Apache HTTP Server [Updated]
- Updated text
- T22: Set secure flags on session cookies
- I1433: ASP.NET Core / VB: Sending cookies over HTTPS [Added]
- T23: Set HttpOnly flag on session cookies
- I1459: ASP.NET Core / VB: Setting HttpOnly Flag [Added]
- T25: Enforce absolute session timeouts
- I1474: ASP.NET Core / VB: Absolute session timeout [Added]
- T26: Expire sessions on logout
- I1458: ASP.NET / VB clear sessions on logout [Added]
- T28: Avoid 'Remember Me' features
- I1470: ASP.NET / VB: Disable 'Remember Me' functionality [Added]
- I1472: ASP.NET Core / VB: Disable 'Remember Me' functionality [Added]
- T29: Use anti-Cross-Site Request Forgery (CSRF) tokens
- I1427: ASP.NET / VB Anti-CSRF tokens [Added]
- T31: Validate all forms of input
- I1437: ASP.NET / VB: Request Form Validation [Added]
- I1438: ASP.NET Core / VB: Validation Attributes [Added]
- T33: Verify integrity of client-supplied read-only data
- I1431: ASP.NET / VB - Using Session State [Added]
- T36: Escape untrusted data in HTML, HTML attributes, CSS, and JavaScript
- I1440: ASP.NET / VB untrusted data escape [Added]
- I1441: ASP.NET / VB: Error message encoding with Microsoft Anti-XSS [Added]
- I1442: ASP.NET Core / VB: Character encoding [Added]
- T38: Bind variables in SQL statements
- I1443: VB with Linq [Added]
- I1444: VB with SqlClient [Added]
- I1445: VB with Enterprise Library [Added]
- I1446: VB SQL variable binding with OleDB [Added]
- I1447: VB variable binding with ODBC [Added]
- I1448: ASP.NET Core / VB: Parameterize SQL Queries [Added]
- I1449: VB with Entity [Added]
- T43: Avoid unsafe operating system interaction
- I1450: VB.NET safe operating system interaction [Added]
- T50: Use indirect object reference maps if accessing files
- I1426: ASP.NET / VB indirect object reference map [Added]
- T54: Validate file contents
- I1480: ASP.NET / VB file content validation [Added]
- T55: Validate all XML input
- P12: Missing or Incorrect XML Validation [Updated]
- Updated text
- P12: Missing or Incorrect XML Validation [Updated]
- T59: Use standard libraries for cryptography
- I1456: ASP.NET Core / VB: Revoking Keys and Refreshing the Keyring [Added]
- I1462: ASP.NET Core / VB: Protecting Ephemeral Data [Added]
- I1463: ASP.NET Core / VB: Data Encryption [Added]
- I1464: ASP.NET / VB encryption libraries [Added]
- T60: Use correct and approved cryptographic algorithms, parameters, and key lengths
- I1460: ASP.NET Core / VB: Setting Key Lifetime [Added]
- I1461: ASP.NET Core / VB: Choosing cryptographic algorithms [Added]
- T62: Protect passwords in property and configuration files
- I1476: ASP.NET Core / VB: Accessing Application Secrets from Secret Manager [Added]
- T64: Set no-cache for confidential web pages
- I1453: ASP.NET / VB Cache-Control [Added]
- I1454: ASP.NET Core / VB: Limiting Response Caching [Added]
- T65: Restrict accepted HTTP verbs
- I1434: ASP.NET / VB HTTP verbs restriction [Added]
- T66: Prevent web pages from being loaded inside iFrame
- I1482: ASP.NET / VB: Frame busting through JavaScript and use of headers [Added]
- T67: Protect page navigation flow
- I1469: ASP.NET / VB page navigation enforcement [Added]
- T68: Encrypt credit card PANs in storage
- I1478: VB.NET credit card PAN encryption [Added]
- T72: Use safe arithmetic to avoid integer overflow
- I1473: VB.NET [Added]
- T74: Avoid HTTP parameter pollution
- I1432: ASP.NET / VB HTTP parameters protection [Added]
- T87: Verify that all data in transit is encrypted using a secure TLS channel [Updated]
- Updated text
- TA809: Verify use of security protocols wherever credit card information is transmitted or received [Updated]
- Updated text
- T137: Encrypt protected health information in storage
- I1479: ASP.Net / VB [Added]
- T151: Use cryptographically secure random numbers
- I321: C# .NET cryptographically secure random number generation [Updated]
- Updated title and text
- I1465: VB.NET cryptographically secure random number generation [Added]
- I321: C# .NET cryptographically secure random number generation [Updated]
- T159: Follow best practices for secure error and exception handling
- I1452: ASP.NET / VB - Global error handling using HTTPModule [Added]
- T162: Validate pathname before retrieving local resources
- I1439: ASP.NET Core / VB: Directory Traversal [Added]
- T164: Clear session information from client upon logout
- I1457: ASP.NET Core / VB: Session expiration on logout [Added]
- T178: Obtain consent from users prior to collecting Personal Data (where applicable)
- TA2883: Protect location information (Connected Cars) [Added]
- T189: Minimize the use of unmanaged (native) code
- I1430: VB.NET unmanaged code avoidance [Added]
- T191: Follow best practices when handling primitive data types
- I1451: VB.NET [Added]
- T200: Test for validation on all untrusted XML input
- P12: Missing or Incorrect XML Validation [Updated]
- Updated text
- P12: Missing or Incorrect XML Validation [Updated]
- T256: Test that compiler settings are set to mitigate buffer overflows
- I1466: ASP.NET Core / VB: Storing session information on the server [Added]
- T322: Include HTTP Strict-Transport-Security headers in HTTPS responses
- I1467: ASP.NET Core / VB: Enabling HSTS [Added]
- T338: Control access to resources through user authentication and authorization
- TA2884: Enforce access control if you output sensitive data to a port (Connected Cars) [Added]
- T456: Select stringent security settings and disable unnecessary services and modules
- TA2885: Properly harden the infotainment operating system (Connected Cars) [Added]
- T795: Configure CloudFront correctly (AWS) [Updated]
- Updated text
- I658: How to configure CloudFront correctly (AWS) [Updated]
- Updated text
- T828: Test that CloudFront is configured correctly (AWS) [Updated]
- Updated text
- T875: Secure Apache SSL/TLS (Apache HTTP Server)
- TA920: More in-depth controls [Updated]
- Updated text
- I729: Apache HTTP Server: How to secure Apache SSL/TLS [Updated]
- Updated text
- I734: Apache HTTP Server: How to for in-depth controls [Updated]
- Updated text
- TA920: More in-depth controls [Updated]
- T876: Verify Apache SSL/TLS configuration (Apache HTTP Server)
- TA921: Test in-depth controls [Updated]
- Updated text
- TA921: Test in-depth controls [Updated]
- T925: Configure TLS/SSL securely for Microsoft IIS (Microsoft IIS) [Updated]
- Updated text
- T959: Verify if TLS/SSL is securely configured for Microsoft IIS (Microsoft IIS) [Updated]
- Updated text
- T1118: Restrict access to local files (MySQL) [Updated]
- Updated text
- P1051: Unrestricted access to local files (MySQL) [Updated]
- Updated text
- I893: MySQL: How to restrict access to local files [Updated]
- Updated text
- T1119: Verify that access to local files is restricted (MySQL)
- P1051: Unrestricted access to local files (MySQL) [Updated]
- Updated text
- P1051: Unrestricted access to local files (MySQL) [Updated]
- T2143: Enhance the security of OBD ports (Connected Cars) [Added]
- P1547: Lack of security measures in OBD port (Connected Cars) [Added]
- T2144: Implement CAN bus protocol properly (Connected Cars) [Added]
- P1548: Poor implementation of CAN bus protocol (Connected Cars) [Added]
- T2145: gRPC Server-Client Certificate Authentication (.NET Core 3) [Added]
- P1549: Unauthenticated gRPC client-server communication [Added]
- I1484: gRPC server-client certificate authentication (.NET Core 3-C#) [Added]
- I1485: gRPC server-client certificate authentication (.NET Core 3-VB) [Added]
- T2148: Perform security checks before infotainment OS update (Connected Cars) [Added]
- P1550: Insecure software updates (Connected Cars) [Added]
- T2149: Perform security checks before external infotainment communication (Connected Cars) [Added]
- P1551: Insufficient security checks between infotainment system and external devices (Connected Cars) [Added]
- T2150: Verify that external infotainment communication is secure (Connected Cars) [Added]
- P1551: Insufficient security checks between infotainment system and external devices (Connected Cars) [Added]
- T2151: Verify that security checks are performed before updating infotainment OS (Connected Cars) [Added]
- P1550: Insecure software updates (Connected Cars) [Added]
- T2152: Protect against Denial of Service attacks (Connected Cars) [Added]
- P1553: Denial of Service in networks (Connected Cars) [Added]
- T2153: Verify the security against Denial of Service attacks (Connected Cars) [Added]
- P1553: Denial of Service in networks (Connected Cars) [Added]
- T2154: Validate all YAML input [Added]
- I1486: Write a schema using RX to validate YAML data [Added]
- T2155: Follow security best practices for YAML parsers [Added]
- P1556: Improper serializing/deserializing of YAML data [Added]
T2156: Validate Scalable Vector Graphics (SVG) [Added]
- P12: Missing or Incorrect XML Validation [Updated]
- Updated text
- P12: Missing or Incorrect XML Validation [Updated]
Deactivated Problems
- P30: Improper Validation of Array Index
- P38: Compiler Removal of Code to Clear Buffers
- P69: Improper Null Termination
- P154: Storing Passwords in a Recoverable Format
- P309: Use After Free
- P402: Spyware
- P518: Null Byte Interaction Error (Poison Null Byte)
- P573: Use of multiple resources with duplicate identifier
- P670: Failure to Control Generation of Code ('Code Injection')
- P691: Padding Oracle Decryption
Updated T186 w/ latest security patch level for third-party libraries
- Rails
- Django
- Spring Framework
- Apache Tomcat
- GnuTLS
- Java
- Node.js
- AngularJS/Angular
- Docker
- jQuery
Changes to Project Properties and Profiles
- Q195: Language and Framework
- Q109: Programming Language
- A1284: VB [Added]
- Q109: Programming Language
- Q208: Data Formats
- Q115: Generates or reads data/files in the following formats:
- A1285: YAML [Added]
- A1286: SVG [Added]
- Q115: Generates or reads data/files in the following formats:
- Q276: Network Layer
- Q332: Automotive Protocols Used [Added]
- A1282: CAN [Added]
- Q332: Automotive Protocols Used [Added]
- Q307: Containerization
- Q308: Containerization Technologies
- A1209: Kubernetes (unmanaged) [Updated]
- Updated title and description
- A1209: Kubernetes (unmanaged) [Updated]
- Q308: Containerization Technologies
- Q195: Language and Framework
New Just-in-Time Training
- CCPA
- Microservices JITT: API Gateway Implementation
5.6
New features and improvements
Problem View
- Gain visibility into the risks your projects face by viewing all of their Problems in one page.
- Added a Problems tab to the Project page with a table listing all Project Problems in rows.
- Each Problem row can be expanded to display the Problem description or its related Tasks. The Related Tasks view allows you to update a Problem’s task statuses and assign users.
- Search by Problem title, Problem description, related Task description, and filter by Risk Rating.
Project Survey
- View Latest History
- Select or change an answer in the survey to see a “View Latest History” link that displays information about the last change, when it was made, and by whom.
- Help text on Questions and Answers now support multi-line markdown and URLs.
- View Latest History
Verification
- Added support for WhiteSource integration. Update the verification status of task T186 using dependency information tracked in a WhiteSource product.
Compliance Reports
- Added support for exporting to CSV.
- HTML, PDF, and CSV reports now have an “[edited on
]” field for updated task notes. The most recently created note appears first in descending order. Each task note ends with a semi-colon for easy parsing.
API changes
- Added endpoints for project problems and related tasks.
- Added an endpoint for retrieving a Project's survey history. The history shows changes to answers in a project survey, along with the time and date, and the user who changed it.
Other product improvements
- Glossary Task tooltips now support URLs.
- Updated the term “ALM” to “Issue Tracker” on the SD Elements UI and in the API. There will be backwards compatibility for the API until a future release.
- Resized the solution column on the import evaluation screen to correctly view all of its contents.
- Fixed export for Questions in the Content exporter.
- Updated warning button styling to make them more user-friendly.
- Updated Jira integration to support deprecated createmeta API calls for Jira Server 8.4 and later.
Content additions and updates (as of May 7, 2020):
Compliance Regulations and Mappings
- Added CMMC (Level 1) compliance report
- Added CMMC (Level 2) compliance report
- Added CMMC (Level 3) compliance report
- Added CMMC (Level 4) compliance report
- Added CMMC (Level 5) compliance report
- Added OWASP API compliance report
New Content Packs
- CMMC
- Flutter
- OWASP API Top 10
T1: Use multi-factor authentication for remote access to high risk systems or administrative access to services
- I1413: Biometric authentication (Flutter) [Added]
- T21: Ensure all data in transit is encrypted using a secure TLS channel
- I1423: Data-in-transit encryption (Flutter) [Added]
- T25: Enforce absolute session timeouts
- I1420: Session Invalidation (Flutter) [Added]
- T45: Log potential critical security events
- TA2881: OWASP API Guidelines for Log Monitoring [Added]
- T49: Disable and remove debug capabilities and code/data, and prepare application for release
- I1417: Prepare the application for release (Flutter) [Added]
- T59: Use standard libraries for cryptography
- I1421: Cryptography (Flutter) [Added]
- T148: Avoid caching confidential data on client
- I1408: Protect against client side caching (iOS) [Added]
- I1416: Securely store temporary camera files (Flutter) [Added]
- T152: Avoid asking for and using excessive permissions
- I1412: Excessive permissions (Flutter) [Added]
- T156: Validate certificate and its chain of trust properly
- I1414: Certificate pinning (Flutter) [Added]
- T157: Temporary files must be cleaned up after the resource is used
- I1425: Clear cached files (Flutter) [Added]
- T160: Avoid relying on jailbreak or root detection as a strong security measure
- I1422: Jailbroken and rooted device detection (Flutter) [Added]
- T168: Prevent auto-snapshot from saving sensitive data (iOS) [Updated]
- Updated text
- I1405: Disable iOS application backgrounding [Added]
- I1406: Mask sensitive data in the iOS app UI (Objective-C) [Added]
- I1409: How to mask sensitive data in iOS app UI (iOS-Swift) [Added]
- T248: Protect secret keys and passwords in the application
- I1418: Secure data storage (Flutter) [Added]
- T261: Manage iOS Pasteboards that are used with sensitive data [Updated]
- Updated text
- T282: Bind variables in SQL statements for client applications
- I1419: SQL injection prevention (Flutter) [Added]
- T295: Avoid storing unencrypted confidential data without access control mechanisms
- I482: iOS data encryption with PBKDF2 (Objective-C) [Updated]
- Updated text.
- I528: iOS data encryption with PBKDF2 (Swift) [Updated]
- Updated text.
- I482: iOS data encryption with PBKDF2 (Objective-C) [Updated]
- T316: Prevent unauthorized access to information through keyboard caches and shared dictionaries
- I1415: Disable autocorrection/keyboard extension (Flutter) [Added]
- T324: Follow best security practices when using WKWebView (iOS)
- I1407: Handle universal links in the application [Added]
- T608: Obfuscate your executables
- I1424: Code obfuscation (Flutter) [Added]
- T1362: Perform message throttling in Web APIs [Updated]
- Updated title and text to better reflect completion conditions.
- TA2882: Web API - throttling types [Added]
- T1363: Verify if message throttling is properly performed in Web APIs [Updated]
- Updated title to better reflect completion conditions.
- T1539: Clear browser data on user logout [Updated]
- Updated text
- T1917: Perform container security assessment [Updated]
- Updated text
- T2133: Protect the security of data in iOS [Added]
- P1544: Unprotected and Unsecure Data in Mobile Applications [Added]
- I1400: Data encryption using CryptoKit framework (iOS-Swift) [Added]
- I1401: Create and validate signatures in CryptoKit framework (iOS-Swift) [Added]
- I1403: Encryption with Apple Secure Enclave (iOS-Objective C) [Added]
- T2134: Compile iOS applications with PIE and ARC flags [Added]
- I1404: Enable PIE and ARC flags in Xcode [Added]
- T2137: Ensure that sensitive data is not recorded (iOS) [Added]
- P1545: Information Disclosure in iOS via ReplayKit Framework [Added]
- I1410 Prevent information disclosure in iOS when mirroring/recording (Objective-C) [Added]
- I1411 Prevent information disclosure in iOS when mirroring/recording (Swift) [Added]
- T2139: Prevent information exposure through APIs [Added]
- T2140: Test that APIs do not expose sensitive information [Added]
- T2141: Perform function level authorization in API [Added]
T2142: Verify that function level authorization is implemented in API [Added]
Updated T186 w/ latest security patch level for third-party libraries
- Rails
- Django
- Spring Framework
- Apache Tomcat
- GnuTLS
- OpenSSL
- Apache HTTP Server
- Apache Wicket
- Bouncy Castle
- jQuery
- AFNetworking Library
- Node.js
Changes to Project Properties and Profiles
- Q195: Language and Framework
- Q109: Programming Language
- A1281: Flutter [Added]
- Q109: Programming Language
- Q331: US Federal and NIST
- Q328: In-Scope for CMMC [Added]
- Q329: CMMC Maturity Level [Added]
- A1276: Level 1 [Added]
- A1277: Level 2 [Added]
- A1278: Level 3 [Added]
- A1279: Level 4 [Added]
- A1280: Level 5 [Added]
- A1275: Yes [Added]
- Q329: CMMC Maturity Level [Added]
- Q328: In-Scope for CMMC [Added]
- Q195: Language and Framework
5.5
New features and improvements
Issue tracker integrations
- Added RSA Archer issue tracker integration: synchronize SD Elements tasks as Archer findings in order to track outstanding controls.
- Requires one Archer user account per connection.
- Supports one-way sync with Archer as the authoritative source, with two-way sync in consideration for a future update.
- See our documentation for more information: https://docs.sdelements.com/release/latest/guide/docs/integrations/alm_integration/supported_tools/
- Added GitLab issue tracker integration: synchronize SD Elements tasks as issues in a GitLab project.
- Added custom priority mapping to Micro Focus ALM integration
- Rally: Added support to allow the issue type “Feature” to serve as the parents of “User Stories”
- Added RSA Archer issue tracker integration: synchronize SD Elements tasks as Archer findings in order to track outstanding controls.
API changes
- Added support for upcoming improvements to project classification.
- Updated the project classification endpoint to save and fetch a classification formula.
- New risk factor endpoint to save and fetch risk factors used by classification formulas.
Other product improvements
- Restyled primary UX buttons to be more user friendly
- Improved performance of the project ALM connection endpoint
- Renamed HP ALM to Micro Focus ALM
- Migrated Remote Integration Agent to Python 3
- If you are using the Linux RIA, you must install the new RIA package in a python 3 environment
- Fixed unclear JIRA error message for invalid username or token
- Fixed JIRA integration issues with On-Prem JIRA instances
- This will be backported to 5.4
- Updated the error message for when implied answers create a conflict
Content additions and updates (as of March 20, 2020):
Compliance Regulations and Mappings
- Added NY SHIELD compliance report
- Added ASVS 4 compliance report
- Updated GDPR compliance report
- Updated NYDFS compliance report
- Updated PIPEDA compliance report
T7: Salt and hash stored passwords [Updated]
- Updated text and recommended hash function.
- T15: Centralize authorization
- I5: Centralize authorization using AccessController interface of ESAPI [Updated]
- Fixed the text’s formatting.
- I5: Centralize authorization using AccessController interface of ESAPI [Updated]
- T146: Use encryption for network communications in mobile environments
- I1392: Using encrypted channels in Android (Kotlin) [Added]
- I1397: Android (Kotlin) - StrictMode for cleartext network traffic detection [Added]
- T157: Temporary files must be cleaned up after the resource is used
- I1391: Android (Kotlin) [Added]
- T162: Validate pathname before retrieving local resources
- I1395: Android (Kotlin) [Added]
- T248: Protect secret keys and passwords in the application
- I1393: Using server-side module to store secret keys and passwords for Android applications (Kotlin) [Added]
- T270: Follow best practices for storing application data on Android devices
- I1394: Android storage options and considerations (Kotlin) [Added]
- T282: Bind variables in SQL statements for client applications
- I1398: Android (Kotlin): Bind parameters to content provider query [Added]
- T394: Secure one-time passwords (OTP) [Updated]
- Updated text.
- T408: Set secure flag on Android Activities with sensitive content [Updated]
- Updated text.
- I1396: Setting FLAG_SECURE for Android Activity (Kotlin) [Added]
- T2122: Update Android Security Provider [Added]
- P1535: Lack of Verification of Up-to-date Android Security Provider [Added]
- I1399: How to update Android Security Provider in the application [Added]
- T2123: Verify that Android Security Provider gets checked to be up-to-date [Added]
- P1535: Lack of Verification of Up-to-date Android Security Provider [Added]
- T2124: Exercise security best practices for inducing new versions of microservices [Added]
- P1536: Insecure induction of new versions for microservices [Added]
- T2125: Exercise security strategies for handling session persistence [Added]
- P1537: Lack of security strategies for handling session persistence [Added]
- T2126: Exercise security strategies for preventing credential abuse and stuffing attacks [Added]
- P1538: Lack of security strategies for preventing credential abuse and stuffing attacks [Added]
- T2127: Exercise security best practices for API gateway implementation [Added]
- P1539: Lack of security best practices for API gateway implementation [Added]
- T2128: Notify users and regulators of breaches of personal information [Added]
- TA2879: NY SHIELD Act / Breach Notification [Updated]
- T2129: Exercise security best practices for access management in microservices
- P1540: Inadequate access management in microservices [Added]
- T2130: Exercise best practices for securing microservices communication
- P1541: Unsecure microservices communication [Added]
- T2131: Exercise security strategies for service mesh implementation
- P1542: Lack of security strategies for service mesh implementation [Added]
T2132: Exercise security best practices for service registry
- P1543: Lack of security best practices for service registry [Added]
Updated T186 w/ latest security patch level for third-party libraries
- Rails
- Django
- Spring Framework
- Apache Tomcat
- GnuTLS
- OpenSSL
- Java
- Docker
- AngularJS/Angular
- Node.js
- Bouncy Castle
Changes to Project Properties and Profiles
- Q206: Privacy
- Q160: Handles Personal Data
- Q224: Privacy Regulations
- A1273: NY SHIELD [Added]
- Q224: Privacy Regulations
- Q160: Handles Personal Data
- Q206: Privacy
5.4
New features and improvements
Survey section and subsection reorder
- Sections and subsections can now be reordered to better fit your organization’s needs.
- Reorder these sections from Library > Project Survey.
- Note: Reordering the survey in the library affects existing and future projects. This action may also affect subsequent completions of a project's survey because the default order of the survey is designed to automatically answer some questions or make new questions available in subsequent sections. By reordering the survey and completing it again, answers and sections may become available out of an expected order and affect your project's settings.
- It is recommended that you reorder the survey with your Customer Success representative.
Performance Improvements
- Significantly improved the load time by up to 70% for the Library Tasks page.
- Improved the generation time by 15% of the All Tasks report for projects with ~800-1000 tasks.
- The Project Survey may show improved performance during answer selection.
Integrations
- Azure DevOps (TFS)
- Added custom status mapping.
- Azure DevOps (TFS)
Automations:
- Automations has moved to System Settings.
- The Automations form now allows users to specify Business Unit, Application, Task, and Task Status from a dropdown list of available options or by performing a keyword search.
- Threshold values can be set for Task Status Change and Verification Tool Ran events.
Other product improvements:
- JIRA Issue Tracker sync
- Resolved an issue with ALM tasks not being recreated when they were removed when the authoritative source was set to SDE or “Last Status Update”.
- Process content used for Automations is no longer disabled by default during SD Elements upgrades. You can enable or disable process content in the Content Pack Selector.
- Clicking on links in the Tasks Overview of a project now takes you to the correct phase.
Added a Name ID format field when configuring SAML for single sign-on.
New Just-in-Time Training
- JSP
- Continuous Compliance
Content additions and updates (as of February 13, 2020):
- T1922: Use secure OAuth 2.0 and OpenID Connect integration (where applicable) [Updated]
- Changed title.
- T2117: Secure microservices APIs that access sensitive data [Added]
- T2118: Exercise security monitoring best practices in Microservices environments [Added]
- T2119: Deploy circuit breakers in Microservices environments [Added]
- T2120: Exercise security best practices for load balancing in Microservices environments [Added]
T2121: Exercise security best practices for service rate limiting in Microservices environments [Added]
Compliance Regulations and Mappings
- Added AICPA Trust Services Criteria 2017 (SOC2) compliance report
- Updated ISO 27001:2013 compliance report
- Removed outdated ISO 27001:2005 mapping and compliance report
- Added CSA Cloud Controls Matrix (CCM) v3.0.1 compliance report
Updated T186, w/ latest security patch level for third-party libraries
- Rails
- Django
- Spring Framework
- Struts
- Apache Tomcat
- GnuTLS
- OpenSSL
- Apache HTTP Server
- Apache Wicket
- Apache MyFaces
- jQuery
- Docker
- AngularJS/Angular
- AFNetworking Library
- Node.js
- Bouncy Castle
Changes to Project Properties and Profiles
- Q193: Application Type
- Q101: Type of Application
- A1264: Microservice [Added]
- Q101: Type of Application
- Q237: Compliance Scope: Other
- Q324: In-Scope for AICPA Trust Services Criteria (SOC2) [Added]
- A1266: Yes [Added]
- Q325: In-Scope for ISO 27001 Compliance [Added]
- A1267: Yes [Added]
- Q326: In-Scope for Cloud Security Matrix (CCM)
- A1268: Yes [Added]
- Q324: In-Scope for AICPA Trust Services Criteria (SOC2) [Added]
- Q243: Internal Hidden Properties
- Q189: Internal Properties (Use this, for all hidden answers)
- A1265: Microservices - Code [Added]
- A1269: Microservices - Non-code [Added]
- Q189: Internal Properties (Use this, for all hidden answers)
- Q258: Architecture/Environment
- Q322: Architecture [Added]
- Q261: IoT Architecture [Updated]
- Changed “Architecture” to new “IoT Architecture” and moved it under "Q322: Architecture".
- Q327: Microservices Architecture [Added]
- A1263: This is an overarching project for designing and implementing security measures in Microservices Ecosystem (select this if you are modelling the deployment of, or setting up the infrastructure for the microservices). [Added]
- A1137: IoT ecosystem [Updated]
- Moved it under "Q322: Architecture".
- A1142: Contains multiple components that communicate through a network [Updated]
- Moved it under "Q322: Architecture".
- A1262: Microservices ecosystem [Added]
- Q261: IoT Architecture [Updated]
- Q322: Architecture [Added]
- Q289: Cloud Computing
- Q290: Cloud Providers
- Q298: AWS Services
- A1270: ECS [Added]
- A1271: DynamoDB [Added]
- Q298: AWS Services
- Q290: Cloud Providers
- Q193: Application Type
5.3
New features and improvements:
Performance Improvements
- SD Elements now runs in Python 3, the modern and slightly faster version of Python.
- Older Library pages should experience improved loading times in Python 3.
- The Dashboard page should experience improved loading times.
- SD Elements now runs in Python 3, the modern and slightly faster version of Python.
Automations (Beta)
- The Automations feature is currently in Beta and accessible via the API and the UI.
- See our API documentation for more details: https://docs.sdelements.com/release/latest/api/
- See our User Guide for details about the UI: https://docs.sdelements.com/release/latest/guide/
- Added ProjectCreated and SurveyLocked automation events.
- These events allow users to include placeholders in email notification actions that provide project- and survey-related information.
- The Automations feature is currently in Beta and accessible via the API and the UI.
Content Pack Selector (Beta)
- The Content Pack Selector is now available from the Library.
- Privileged users can now enable and disable certain subject areas of the base SD Elements content using the application user interface.
- The base SD Elements content is now organized into a set Content Packs. A Content Pack is a collection of related Tasks, How-Tos, Additional Requirements, Profiles, and Survey Answers covering distinct subject areas: Application Security, Compliance, Operational Security, Privacy, and Process.
- Process content used for Automations is disabled by default but may be enabled by content administrators.
- See our documentation for more details: https://docs.sdelements.com/release/latest/guide/
Profiles
- Built-in profiles are now visible from the Profiles page within the Library.
- Deactivated Profiles will not appear in the Profile selection list.
- All Projects must have an active Profile selected.
- The state of a Profile is now indicated on the Project Survey.
- For existing Projects with a deactivated Profile, you can cancel out of the Project Survey to preserve your Project Survey’s Answers.
Issue Trackers
- JIRA SmartSync
- Optimized JIRA ALM sync. Previously, the ALM sync reached out to every JIRA task to check for changes. This change detection is now done in bulk, which results in SD Elements only reaching out to JIRA tasks that have changed since the last successful sync.
- JIRA SmartSync
Project Survey Enhancements
- Buttons now have improved clarity.
- For example, the “Continue” button now says, “Continue To Summary”, and “Close” now says, “Continue To Tasks”.
- Cancel buttons were added to the Survey and Summary pages, which allow you to return to the Tasks page.
- Buttons now have improved clarity.
Remote Integration Agent (RIA)
- The Linux RIA is now available for download in SD Elements from Integrations > Remote Agent.
- A link to RIA installation guidance is now available on the RIA list and the download dialog for both Windows and Linux agents.
Project Specific Tasks
- Individual tasks identified within the blue button “New Content Updates Available” notification can now be manually added to a project using the “Add task” feature.
Risk Policy
- A Risk Policy description has been added to the Summary steps during project creation and the Project Survey page.
System Updates
- Updated the data encryption library in SD Elements.
- SD Elements has upgraded to django cryptography, which uses the Python cryptography library for encryption.
- Previously, SD Elements used the django-extensions library to store encrypted values in the database, which used the keyczar library. This library is now deprecated and does not support Python 3.
- Note: Due to the cryptography library changes in this version, do not remove the system’s keyczar keys from the system until all releases of SD Elements prior to version 5.3 are no longer present on the system. For more information, contact sdesupport@securitycompass.com
- Updated the data encryption library in SD Elements.
Tooltip Improvements
- Accessibility enhancements have been made for tooltips throughout SD Elements. The contrast between font and background colors, and the font and margin sizes have now been increased.
- Library Question and Answer Help Text now support markdown styling for bold and italicized text, ordered and unordered lists, code blocks, and indentations.
Other Product Improvements:
- Group caches now refresh on a regular interval, fixing some cache issues that required a manual cache restart.
- The Remote Integration Agent installer now only allows administrators to install apps.
- Relevant tasks can now be manually added to a project without error messages.
- Fixed an issue with incorrect browser tabs under Accounts.
- Fixed an issue with columns in compliance reports.
- Problems without a relevant CWE no longer show CWE headers.
New Just-in-Time Training
- Defending ASP.NET Core in C#
- Defending HTML5
- Defending Swift for iOS
- Defending Web API
- Defending Web Apps
Content additions and updates (December 11, 2019):
Compliance Regulations and Mappings
- Added California Consumer Privacy Act (CCPA) compliance report
- Updated California Online Privacy Protection Act compliance report
- Added Brazil Data Protection Law (LGPD) compliance report
- Added NIST 800-53 Privacy Controls (Appendix J) compliance report
Updated Tasks
- T17: Do not only rely on client-side authorization [Changed title and updated text to be more distinct from similar tasks.]
- T738: Determine the legal basis for transferring personal data [Changed title and updated text.]
- T739: Verify if transferring personal data is legitimate and in compliance with applicable privacy regulations [Changed title and updated text.]
- T1154: Secure Docker registries (Docker) [Updated the text.]
- T1155: Verify that Docker registries are secure (Docker) [Updated the text.]
- T1172: Secure daemon configuration files (Docker) [Updated the text.]
- T1173: Verify that daemon configuration files are secured (Docker) [Updated the text.]
Added Tasks
- T2105: Enforce the use of client certificate bundles for unprivileged users to access UCP (Docker)
- T2106: Verify that the use of client certificate bundles for unprivileged users is enforced (Docker)
- T2107: Configure applicable cluster role-based access control policies for UCP access (Docker)
- T2108: Verify that a valid RBAC model is configured for UCP access (Docker)
- T2109: Enable signed image enforcement (Docker)
- T2110: Verify that signed image enforcement is enabled (Docker)
- T2111: Set the 'Per-User Session Limit' to a value of '3' or lower (Docker)
- T2112: Verify that the 'Per-User Session Limit' is set to a value of '3' or lower (Docker)
- T2113: Set the 'Lifetime Minutes' and 'Renewal Threshold Minutes' values to '15' or lower and '0' respectively (Docker)
- T2114: Verify that the 'Lifetime Minutes' and 'Renewal Threshold Minutes' values are set to '15' or lower and '0' respectively (Docker)
- T2115: Enable image vulnerability scanning (Docker)
- T2116: Verify that image vulnerability scanning is enabled (Docker)
Deactivated Tasks
- T1216: Perform regular security audits of your host system and containers (Docker)
- T1217: Verify that security audits of your host system and containers are performed regularly (Docker)
- T1218: Monitor the usage, performance, and metering of Docker containers (Docker)
- T1219: Verify that the usage, performance, and metering of Docker containers are monitored (Docker)
- T1220: Back up container data (Docker)
- T1221: Verify that container data is backed up (Docker)
Added Additional Requirements
- TA2859: California Online Privacy Protection Act (CalOPPA): Privacy Policy
- TA2860: CCPA: Privacy Notice
- TA2861: CCPA: Indirect Collection of Personal Information
- TA2862: CCPA: Access Requests and Verification
- TA2863: CCPA: Requests to Delete
- TA2864: CCPA: Service Provider Obligations
- TA2865: CCPA: Requests to Opt-Out of Sale of Personal Information
- TA2866: CCPA: Record Keeping
- TA2867: CCPA: Opt-In Consent for Sale of Children's Personal Information
- TA2868: NIST 800-53 Privacy Controls: Purpose Specification and Use Limitation
- TA2869: NIST 800-53 Privacy Controls: Privacy Notice
- TA2870: NIST 800-53 Privacy Controls: Privacy Impact Assessment
- TA2872: NIST 800-53 Privacy Controls: Personal Data Inventory
- TA2873: NIST 800-53 Privacy Controls: Data Quality
- TA2874: NIST 800-53 Privacy Controls: Data Anonymization
- TA2875: NIST 800-53 Privacy Controls: Data Retention and Disposal
- TA2876: NIST 800-53 Privacy Controls: Consent
- TA2877: NIST 800-53 Privacy Controls: Individual Access
Deactivated Additional Requirements
- TA935: HTTP Public Key Pinning (HPKP) [Removed since HPKP is not supported by many browsers any more.]
Updated Problems
- P834: Lack of Certificate/Public Key Pinning [Included “A1260: Requires certificate or public key pinning” in the applicability rules.]
- P1066: Insecure Docker registries (Docker) [Updated the text.]
- P1075: Unprotected daemon configuration files (Docker) [Updated the text.]
Added Problems
- P1529: Providing direct access to UCP manager nodes by giving administrative permissions to users (Docker)
- P1530: Using the default RBAC roles provided by UCP (Docker)
- P1531: Running untrusted containers (Docker)
- P1532: Using an improper value for limiting the number of per user concurrent sessions (Docker)
- P1533: Using an improper value for limiting the duration of active sessions (Docker)
- P1534: Running Docker containers based on images with known vulnerabilities (Docker)
Deactivated Problems
- P1097: Failing to perform security audits of your host system and containers (Docker)
- P1098: Unmonitored Docker containers usage, performance, and metering (Docker)
- P1099: Failing to back up container data (Docker)
Updated HowTo's
- I922: Docker: How to secure Docker registries [Updated the text.]
- I931: Docker: How to secure daemon configuration files [Updated the text.]
Added HowTo's
- I1385: Docker: How to create client certificate bundles
- I1386: Docker: How to configure UCP RBAC components
- I1387: Docker: How to enable signed image enforcement
- I1388: Docker: How to set the 'Per-User Session Limit'
- I1389: Docker: How to set the 'Lifetime Minutes' and 'Renewal Threshold Minutes'
- I1390: Docker: How to enable image vulnerability scanning
Deactivated HowTo’s
- I908: Apache: Enabling HPKP [HPKP is not supported by many browsers.]
- I909: NGINX: Enabling HPKP [HPKP is not supported by many browsers.]
- I910: IIS: Enabling HPKP [HPKP is not supported by many browsers.]
- I954: Docker: How to monitor Docker container usage, performance, and metering
- I955: Docker: How to back up container data
Updates to T186 with the latest security patch level for third-party libraries:
- Rails
- Django
- Spring
- Struts
- Apache Tomcat
- GnuTLS
- Apache MyFaces
- Java
- Node.js
- AngularJS/Angular
- Docker
Changes to Project Properties and Profiles
- Added “Q160: Handles Personal Data” under "Q206: Privacy"
- Added “Q265: In-Scope for NIST 800-53 Compliance” under "Q237: Compliance Scope: Other"
- Added "Q321: NIST 800-53 Privacy Controls” under “Q265: In-Scope for NIST 800-53 Compliance”
- Added "A1255: CCPA” under “Q224: Handles Personal Data”
- Added "A1256: CalOPPA” under “Q224: Handles Personal Data”
- Added "A1257: Latin America” under “Q159: Organization is Subject to the Laws of:”
- Added "A1258: Brazil LGPD” under “Q224: Handles Personal Data”
- Added “A1260: Requires certificate or public key pinning” under “Q214: Miscellaneous”
- Deactivated “A1177: VPC” from the ‘Applicable When’ criteria of “P866: Relational Database Service Misconfigured (AWS)”
- Deactivated “A1171: EC2” from the ‘Applicable When’ criteria of “P866: Relational Database Service Misconfigured (AWS)”
5.2
New features and improvements
Automations (formerly Process Task Automation)
- Automations is currently in Beta and does not have any features that are visible to users. It does, however, run in the background and may affect some of your tasks. As more features become available in SD Elements, more information will follow.
Project Classification
- The classification list page has been improved. Classifications that have no policies or active answers are now greyed out, and classifications that have inactive answers now show a warning.
Existing integrations:
- HCL AppScan:
- IBM AppScan has changed to HCL AppScan.
- HP ALM:
- Added support for the “Not Covered” status.
- HCL AppScan:
New Integrations:
- Added support for ServiceNow integration.
- Added support for Coverity verification integration:
- We are aware of the following behavior with Coverity integration with SD Elements:
- Only flaws with the action “Ignore” are marked as pass/partial pass and removed from flaws total counts.
- Custom Severities in Coverity are mapped to “unknown” severity in SD Elements and are counted as fails.
- At this time, there is no method to add custom severity mappings.
- We are aware of the following behavior with Coverity integration with SD Elements:
Project Reports
- The All Task Report PDF export now has a limit of 1000 tasks.
Project Survey Answers
- Deactivating Answers in the Project Survey will now also set them to be hidden in the Project Survey (similarly reactivating answers result in them reappearing in the survey).
Deprecations
- Thoughtworks Mingle has been deprecated and is no longer supported in SD Elements.
- Trac has been deprecated and is no longer supported in SD Elements.
Bug fixes:
- Fortify reports with a count of 0 now correctly trigger Process Task Automation events.
- Fixed dropdown fields in the frontend from becoming deselected when escaped or clicked away from.
- Reports no longer display a unicode error when non-ASCII characters are present.
- SAML SP initiated POST requests now correctly navigate to the IdP page.
- Fixed Azure DevOps (TFS) sync error for “missing ‘fields’”.
- SD Elements no longer crashes if a large number of projects sharing the same risk policy refresh their risk policies at the same time.
Content additions and updates (as of October 25, 2019):
Compliance Regulations and Mappings
- Added FedRAMP compliance report for Low/Moderate/High baselines.
- Added FedRAMP additional requirements for Low/Moderate/High baselines.
- Added NIST 800-53 compliance report for Low/Moderate/High baselines.
- Added NYDFS compliance report.
- Updated CalOPPA compliance report and added new subsections.
Updated Tasks
- T5: Use minimum standards for passwords [Updated the text.]
- T680: Do not create IAM policies that allow full administrative privileges (AWS) [Updated the title.]
- T681: Enable CloudTrail in all regions (AWS) [Updated the text.]
- T699: Test that credentials unused for 90 days or greater are disabled (AWS) [Updated the text.]
- T700: Test that access keys are rotated every 90 days or less (AWS) [Updated the text.]
- T714: Test if any IAM policy exists that allows full administrative privileges (AWS) [Updated the title and the text.]
- T718: Test if AWS Config is enabled in all regions (AWS) [Updated the text.]
- T719: Test if S3 bucket access logging is enabled on the CloudTrail S3 bucket (AWS) [Updated the text.]
- T720: Test that log metrics and alarms are created (AWS) [Updated the text.]
- T725: Test that log file validation is enabled (AWS) [Updated the text.]
- T1053: Enable VM protection features (Microsoft Azure) [Updated the text.]
- T1054: Test that VM protection features are enabled (Microsoft Azure) [Updated the text.]
- T1056: Test that all VMs are updated (Microsoft Azure) [Updated the text.]
- T1057: Enable disk and storage encryption (Microsoft Azure) [Updated the text.]
- T1058: Test that disk and storage encryption is enabled (Microsoft Azure) [Updated the text.]
- T1059: Configure network security groups and firewalls securely (Microsoft Azure) [Updated the text.]
- T1060: Test that network security groups and firewalls are configured securely (Microsoft Azure) [Updated the text.]
- T1061: Enable SQL auditing (Microsoft Azure) [Changed the old title "Enable SQL auditing and threat detection" and updated the text.]
- T1062: Verify that SQL auditing is enabled (Microsoft Azure) [Changed the old title "Test that SQL auditing and threat detection are enabled" and updated the text.]
- T1063: Set up security contacts (Microsoft Azure) [Updated the text.]
- T1064: Verify that security contacts are set up (Microsoft Azure) [Changed the old title and updated the text.]
- T1073: Keep logs long enough (Microsoft Azure) [Updated the text.]
- T1074: Verify that logs are kept long enough (Microsoft Azure) [Updated the text.]
- T1077: Log critical events (Microsoft Azure) [Updated the text.]
- T1078: Verify that critical events are logged (Microsoft Azure) [Updated the text.]
- T1082: Verify that Key Vault is configured securely (Microsoft Azure) [Updated the text.]
- T1087: Select standard pricing tier (Microsoft Azure) [Updated the text.]
- T1088: Verify that standard pricing tier is selected (Microsoft Azure) [Updated the text.]
Deactivated Tasks
- T674: Enable Detailed Billing (AWS)
- T675: Activate IAM Master and IAM Manager roles (AWS)
- T708: Verify that detailed billing is enabled (AWS)
- T709: Verify that IAM Master and IAM Manager roles are active (AWS)
Added Tasks
- T2033: Ensure SELinux is enabled on all container instances (Amazon ECS)
- T2034: Ensure AppArmor is enabled on all container instances (Amazon ECS)
- T2035: Ensure privileged containers are not permitted on the container instance (Amazon ECS)
- T2036: Ensure containers do not run as root (Amazon ECS)
- T2037: Set root filesystems to be read-only (Amazon ECS)
- T2038: Apply resource limits on containers (Amazon ECS)
- T2039: Enable container insights on ECS clusters (Amazon ECS)
- T2040: Ensure host operating systems are up to date (Amazon ECS)
- T2041: Attach IAM roles for ECS container instances (Amazon ECS)
- T2042: Ensure virtual machines running ECS instances are inside a VPC (Amazon ECS)
- T2043: Identify and remediate vulnerabilities in container images (Amazon ECS)
- T2044: Utilize AWS parameter store for sensitive data storage (Amazon ECS)
- T2045: Ensure a VPC endpoint is used to access DynamoDB tables (Amazon DynamoDB)
- T2046: Encrypt data stored in DynamoDB at rest (Amazon DynamoDB)
- T2047: Attach IAM policies to DynamoDB resources (Amazon DynamoDB)
- T2048: Utilize client-side encryption for DynamoDB (Amazon DynamoDB)
- T2051: Configure network access rules for storage accounts (Microsoft Azure)
- T2052: Verify that network access rules are configured properly for storage accounts (Microsoft Azure)
- T2053: Ensure virtual machines running instances are inside a VPC (Amazon Aurora)
- T2054: Utilize Security Groups to restrict access to instances (Amazon Aurora)
- T2055: Enforce network ACLs for instances (Amazon Aurora)
- T2056: Encrypt data stored at rest (Amazon Aurora)
- T2057: Enforce authentication on your database engine (Amazon Aurora)
- T2058: Attach IAM policies to resources (Amazon Aurora)
- T2059: Enable App Service authentication and identity management (Microsoft Azure)
- T2060: Ensure snapshots are not public (Amazon Aurora)
- T2061: Change the default master username (Amazon Aurora)
- T2062: Use AWS Secrets Manager for connection credentials (Amazon Aurora)
- T2063: Utilize Database Activity Streams for PostgreSQL databases (Amazon Aurora)
- T2064: Verify that App Service authentication and identity management is enabled (Microsoft Azure)
- T2065: Configure TLS for secure connections to App Service (Microsoft Azure)
- T2066: Verify that TLS is configured properly for App Service (Microsoft Azure)
- T2067: Use the latest version of software on App Service (Microsoft Azure)
- T2068: Verify that the latest version of software is used on App Service (Microsoft Azure)
- T2069: Set 'Enforce SSL connection' to 'ENABLED' for database servers (Microsoft Azure)
- T2070: Verify that 'Enforce SSL connection' is set to 'ENABLED' for database servers (Microsoft Azure)
- T2071: Enable logging of important PostgreSQL security events (Microsoft Azure)
- T2072: Verify that logging of important PostgreSQL security events is enabled (Microsoft Azure)
- T2073: Enable 'log_retention_days' on PostgreSQL servers (Microsoft Azure)
- T2074: Verify that server parameter 'log_retention_days' is set to more than 3 days for PostgreSQL database server (Microsoft Azure)
- T2075: Enable 'connection_throttling' on PostgreSQL servers (Microsoft Azure)
- T2076: Verify that 'connection_throttling' on PostgreSQL servers is enabled (Microsoft Azure)
- T2077: Use strong cryptographic ciphers (Kubernetes)
- T2078: Verify that strong cryptographic ciphers are used (Kubernetes)
- T2079: Restrict Kublet nodes to access only objects associated with them. (Kubernetes)
- T2080: Verify that Kublet nodes are restricted to access only objects associated with them. (Kubernetes)
- T2081: Encrypt data at rest properly (Kubernetes)
- T2082: Verify that data at rest is encrypted properly (Kubernetes)
- T2083: Limit the rate at which the API server accepts requests (Kubernetes)
- T2084: Verify that the admission control plugin 'EventRateLimit' is set (Kubernetes)
- T2089: Turn on Role Based Access Control (Kubernetes)
- T2090: Verify that Role Based Access Control is turned on (Kubernetes)
- T2091: Do not bind the scheduler and the controller manager services to non-loopback insecure addresses (Kubernetes)
- T2092: Verify that the scheduler and controller manager services are not bound to non-loopback insecure addresses (Kubernetes)
- T2093: Enable Kubelet server certificate rotation (Kubernetes)
- T2094: Verify that Kubelet server certificate rotation is enabled (Kubernetes)
- T2095: Set the permissions properly on the sensitive configuration files (Kubernetes)
- T2096: Verify that the permissions on the sensitive configuration files are set properly (Kubernetes)
- T2097: Do not let containers to be run with excessive privileges (Kubernetes)
- T2098: Verify that containers with excessive privileges are not permitted (Kubernetes)
Updated Additional Requirements
- TA927: Test in-depth controls [Updated the text.]
Added Additional Requirements
- TA1980: Blind Server Side Request Forgery (SSRF)
- TA1981: AWS Metadata Endpoint Data Exfiltration (SSRF)
- TA2847: NYDFS Cybersecurity Regulation / Penetration Testing and Vulnerability Assessments
- TA2848: NYDFS Cybersecurity Regulation / Audit Trail
- TA2849: NYDFS Cybersecurity Regulation / Access Privileges
- TA2850: NYDFS Cybersecurity Regulation / Multi-Factor Authentication
- TA2851: Enable JIT Network Access for virtual machines - More in-depth controls
- TA2852: Verify that JIT Network Access for virtual machines is enabled - More in-depth controls
- TA2853: Enable 'Advanced Data Security' on critical SQL Servers - More in-depth controls
- TA2854: Verify that 'Advanced Data Security' is enabled on critical SQL Servers - More in-depth controls
- TA2855: Enable security alerts for SQL servers - More in-depth controls
- TA2856: Verify that security alerts for SQL servers are enabled - More in-depth controls
- TA2857: Kubernetes: Do not let containers to be run with excessive privileges - More in-depth controls
- TA2858: Kubernetes: Verify that containers with excessive privileges are not permitted - More in-depth controls
Updated Problems
- P846: Lack of CloudTrail logs for all regions (AWS) [Updated the text.]
- P1020: Inactive VM protection features (Microsoft Azure) [Updated the text.]
- P1024: No SQL auditing (Microsoft Azure) [Changed the old title "No SQL auditing or threat detection".]
- P1025: No security contacts (Microsoft Azure) [Updated the text.]
- P1030: Inadequate Log Retention (Microsoft Azure) [Updated the text.]
- P1032: Insufficient Logging (Microsoft Azure) [Updated the text.]
Deactivated Problems
- P854: Lack of Detailed Billing records (AWS)
- P855: One-person control over IAM (AWS)
Added Problems
- P1494: Unrestricted connectivity to sensitive data (Amazon ECS)
- P1495: Using unsafe container images (Amazon ECS)
- P1496: Unprotected sensitive data in containers (Amazon ECS)
- P1497: Publicly accessible database (Amazon DynamoDB)
- P1498: Missing database encryption (Amazon DynamoDB)
- P1499: Improper network access rules for storage accounts (Microsoft Azure)
- P1500: Unrestricted connectivity to sensitive data (Amazon Aurora)
- P1501: Unrestricted connectivity to sensitive data (Amazon RDS)
- P1502: Misconfigured or missing network ACLs (Amazon Aurora)
- P1503: Missing encryption mechanism (Amazon Aurora)
- P1504: Improper authentication and access control (Amazon Aurora)
- P1505: Improper App Service authentication and identity management (Microsoft Azure)
- P1506: Misconfigured IAM policies attached to instances (Amazon Aurora)
- P1507: Ensure snapshots are not public (Amazon Aurora)
- P1508: Default master usernames (Amazon Aurora)
- P1509: Improper secret or connection string management (Amazon Aurora)
- P1510: Insufficient logging or protection of logs (Amazon Aurora)
- P1511: Insecure network communication (Microsoft Azure)
- P1512: Using outdated software in App Service (Microsoft Azure)
- P1513: Insecure connection to database servers (Microsoft Azure)
- P1514: No connection throttling for PostgreSQL database server (Microsoft Azure)
- P1515: Using weak cryptographic ciphers (Kubernetes)
- P1516: Inadequate access control for Kubelet nodes (Kubernetes)
- P1517: Cleartext or weakly encrypted data at rest (Kubernetes)
- P1518: Resource Exhaustion (Kubernetes)
- P1521: Lack of Role Based Access Control (RBAC) (Kubernetes)
- P1522: Unauthorized access to the scheduler and controller manager API services (Kubernetes)
- P1523: Downtimes due to expired certificates (Kubernetes)
- P1524: Unauthorized access to the sensitive configuration files (Kubernetes)
- P1525: Allowing containers with excessive privileges (Kubernetes)
Updated HowTo's
- I609: How to delete IAM policies that allow full administrative privileges (AWS) [Updated the text.]
- I610: How to enable CloudTrail in all regions (AWS) [Updated the text.]
- I613: How to enable AWS Config in all regions (AWS) [Updated the text.]
- I615: How to create log metrics and alarms (AWS) [Updated the text.]
- I626: How to create log metrics and alarms (AWS) - In-depth controls [Updated the text.]
- I724: Apache HTTP Server: How to secure Apache access control [Updated the text.]
- I858: Microsoft Azure: How to enable VM protection features [Updated the text.]
- I859: Microsoft Azure: How to update VMs [Updated the text.]
- I860: Microsoft Azure: How to enable disk and storage encryption [Updated the text.]
- I861: Microsoft Azure: How to configure network security groups and firewalls securely [Updated the text.]
- I862: Microsoft Azure: How to enable SQL auditing [Changed the old title "Microsoft Azure: How to enable SQL auditing and threat detection" and updated the text.]
- I863: Microsoft Azure: How to set up security contacts [Updated the text.]
- I868: Microsoft Azure: Keep logs long enough [Updated the text.]
- I870: Microsoft Azure: Log critical events [Updated the text.]
- I872: Microsoft Azure: Configure Key Vault securely [Updated the text.]
- I878: Microsoft Azure: Select standard pricing tier [Updated the text.]
Deactivated HowTo's
- I603: How to enable Detailed Billing (AWS)
- I604: How to activate IAM Master and IAM Manager roles (AWS)
Added HowTo's
- I1333: Amazon ECS-optimized AMI: Configure SELinux on each container instance
- I1334: Amazon ECS: Configure AppArmor on each container instance
- I1335: Amazon ECS: Disable privileged containers on each container instance
- I1336: Amazon ECS: Configure containers to run as non-root
- I1337: Amazon ECS: Provide containers in ECS Task Definitions with read-only access to the root file system
- I1338: Amazon ECS: Configure resource limits for containers
- I1339: Amazon ECS: Enable Container Insights in a new ECS cluster
- I1340: Amazon ECS: Enable update on ECS container instances
- I1341: Amazon ECS: Configure proper IAM policies on ECS clusters
- I1343: Amazon ECS: Configure ECS instances to run in a VPC
- I1344: Amazon ECS: Configure containers to inject sensitive data at runtime
- I1345: Amazon DynamoDB: Configure DynamoDB tables to use a VPC endpoint
- I1346: Amazon DynamoDB: Use a customer-managed key (CMK) in DynamoDB
- I1347: Amazon DynamoDB: Configure IAM policies as required
- I1348: Amazon DynamoDB: Utilizing the DynamoDB Encryption Client
- I1349: Microsoft Azure: How to set network access rules for storage accounts
- I1350: Amazon Aurora: How to determine if the RDS instance is configured to run in a VPC
- I1351: Amazon Aurora: How to determine if Security Groups are configured to protect RDS resources
- I1352: Amazon Aurora: How to determine if Network ACLs are configured securely
- I1353: Amazon Aurora: How to determine if data at rest is encrypted in RDS
- I1354: Amazon Aurora: How to ensure IAM Authentication is enabled for databases
- I1355: Amazon Aurora: How to determine if an IAM account is configured securely for RDS
- I1356: Amazon Aurora: How to determine if RDS database snapshots are publicly accessible
- I1357: Amazon Aurora: How to determine if the default master username is changed
- I1358: Amazon Aurora: How to create a secret or connection string in AWS Secrets Manager
- I1359: Amazon Aurora: How to determine if Database Activity Streams are enabled
- I1360: Microsoft Azure: How to enable App Service authentication and identity management
- I1361: Microsoft Azure: How to configure TLS for secure connections to App Service
- I1362: Microsoft Azure: How to use the latest version of software on App Service
- I1363: Microsoft Azure: How to enforce SSL connection for database servers
- I1364: Microsoft Azure: How to enable logging of security events for PostgreSQL database
- I1365: Microsoft Azure: How to set log retention duration for PostgreSQL database server
- I1366: Microsoft Azure: How to enable connection throttling on PostgreSQL database servers
- I1367: Microsoft Azure: How to enable JIT Network Access for virtual machines - More in-depth controls
- I1368: Microsoft Azure: How to enable 'Advanced Data Security' on critical SQL Servers - More in-depth controls
- I1369: Microsoft Azure: How to enable security alerts for SQL servers - More in-depth controls
- I1370: Kubernetes: How to only use strong cryptographic ciphers
- I1371: Kubernetes: How to restrict Kublet nodes to access only objects associated with them.
- I1372: Kubernetes: How to encrypt data at rest properly
- I1373: Kubernetes: How to limit the rate at which the API server accepts requests
- I1376: Kubernetes: How to turn on Role Based Access Control
- I1377: Kubernetes: How to find the address of the scheduler and controller manager services
- I1378: Kubernetes: How to enable Kubelet server certificate rotation
- I1379: Kubernetes: How to set the permissions properly on the sensitive configuration files
- I1380: Kubernetes: How to not permit containers to be run with excessive privileges
- I1384: Kubernetes: How to for in-depth controls
Changes to Project Properties and Profiles
- Added "Q319: In-Scope for FedRAMP Compliance" under "Q237: Compliance Scope: Other"
- Added "Q320: FedRAMP Control Baseline" under "Q319: In-Scope for FedRAMP Compliance"
- Added "A1247: Yes" under "Q319: In-Scope for FedRAMP Compliance"
- Added "A1248: Low" under "Q320: FedRAMP Control Baseline"
- Added "A1249: Moderate" under "Q320: FedRAMP Control Baseline"
- Added "A1250: High" under "Q320: FedRAMP Control Baseline"
- Added "A1251: Aurora" under "Q298: AWS Services"
- Added "A1252: PostgreSQL" under "Q305: Database Management System (DBMS)"
- Added "A1253: Asia Pacific" under "Q159: Organization is Subject to Laws of:"
- Added "A1254: In-scope for MAS-TRMG Guidelines" under "Q229: Financial Regulations"
5.1
New features and improvements
Risk Policy and Project Classification
- Project Classification no longer shows a Project as being reclassified from Unclassified the first time a project is classified. It now only displays the initial Project Classification.
- The Project Classification filter in Global Reports now allows filtering on Projects that are Unclassified.
LDAP Sync
- LDAP Sync now supports LDAPS protocol.
Existing Integrations
- Veracode
- Updated Veracode authentication for XML to HMAC authentication. Authentication now requires a Veracode Access Key (API ID) and Veracode Secret Key (Key).
- Existing Veracode connections will not work until credentials are updated.
- Veracode
New Integrations for Verification
- OWASP Dependency Track
The beta version of PTA now supports the following verification tools:
- Threadfix
- OWASP Dependency Track
Known bugs:
- OWASP Dependency Track:
- False positives are counted as flaws in SD Elements unless you explicitly suppress them in the OWASP Dependency Track tool.This will be corrected in a later version.
- OWASP Dependency Track:
Bug Fixes
- Fixed bug that allowed Problems to be deleted.
- Fixed LDAP sync group mapping form field that was limited to 1000 groups.
- Fixed LDAP sync issue with custom certificates.
- Fixed LDAP sync failing with names longer than 30 characters.
- First and last names longer than 30 characters are now auto-truncated.
- Fixed a bug that allowed a Project’s Classification to be updated when the Project’s Survey was saved, but incomplete.
- Fixed a bug that allowed users to name or rename their project and application to “archived”.
- Fixed a bug in the Fortify integration where suppressed issues were being included in scanner results.
- Fixed a bug where the hover zone for a tooltip on the add new Remote Agent button was too small.
Hotfixes:
- PDF Reports
- PDF reports should be faster to produce as we have replaced the underlying engines used to build them.
- Fixed an error that was causing Veracode reports with unicode characters to fail to import.
- Fixed the modification of a Library Task’s priority
- PDF Reports
Content additions and updates (as of September 16, 2019):
Added Tasks
- T1925: Maintain the default behavior for anonymous access (OpenShift)
- T1926: Verify that the default behavior for anonymous access is maintained (OpenShift)
- T1927: Disable basic-auth-file method (OpenShift)
- T1928: Verify that the basic-auth-file option has not been configured (OpenShift)
- T1929: Secure communication between API server and master nodes (OpenShift)
- T1930: Verify that the connection between API server and master node is secure (OpenShift)
- T1931: Prevent insecure bindings and insecure port access (OpenShift)
- T1932: Verify that insecure-bind-address and insecure-port are disabled (OpenShift)
- T1933: Do not disable 'secure-port' for API server traffic (OpenShift)
- T1934: Verify that 'secure-port' is not disabled (OpenShift)
- T1935: Do not expose API server profiling data (OpenShift)
- T1936: Verify that API server profiling is not exposed (OpenShift)
- T1937: Set the 'repair-malformed-updates' value to 'true' (OpenShift)
- T1938: Verify the value of 'repair-malformed-updates' (OpenShift)
- T1939: Disable 'AlwaysAdmit' admission controller (OpenShift)
- T1940: Verify that 'AlwaysAdmit' admission controller is disabled (Open Shift)
- T1941: Disable 'AlwaysPullImages' admission controller if possible (OpenShift)
- T1942: Verify that 'AlwaysPullImages' admission controller is disabled (OpenShift)
- T1943: Use Security Context Constraints instead of 'DenyEscalatingExec' and 'SecurityContextDeny' admission controllers (OpenShift)
- T1944: Verify the user/groups that are bound to 'edit' and 'admin' roles and usage of Security Context Constraints (OpenShift)
- T1945: Do not disable 'NamespaceLifecycle' admission controller (OpenShift)
- T1946: Verify that the 'NamespaceLifecycle' plugin is not disabled (OpenShift)
- T1947: Configure auditing properly on the API server (OpenShift)
- T1948: Verify that API server auditing is configured properly (OpenShift)
- T1949: Do not set 'authorization-mode' flag (OpenShift)
- T1950: Verify that 'authorization-mode' is not set (OpenShift)
- T1951: Do not use static token files for authentication (OpenShift)
- T1952: Verify that static token files are not used (OpenShift)
- T1953: Do not set 'service-account-lookup' and 'service-account-key-file' arguments (OpenShift)
- T1954: Verify that 'service-account-lookup' and 'service-account-key-file' arguments are not set (OpenShift)
- T1955: Do not enable 'PodSecurityPolicy' admission control plugin (OpenShift)
- T1956: Verify that 'PodSecurityPolicy' is disabled (OpenShift)
- T1957: Do not set 'etcd-certfile', 'etcd-keyfile' or 'etcd-cafile' arguments (OpenShift)
- T1958: Verify that 'etcd-certfile', 'etcd-keyfile', or 'etcd-cafile' arguments are not set (OpenShift)
- T1959: Do not disable 'ServiceAccount' admission controller (OpenShift)
- T1960: Verify that 'ServiceAccount' plugin is not disabled (OpenShift)
- T1961: Do not disable 'NodeRestriction' admission controller (OpenShift)
- T1962: Test that the 'NodeRestriction' admission controller is enabled (OpenShift)
- T1963: Encrypt data at rest in etcd datastore (OpenShift)
- T1964: Verify data at rest on 'etcd' datastore is encrypted with 'aescbc' encryption provider (OpenShift)
- T1965: Enable the 'EventRateLimit' plugin (OpenShift)
- T1966: Verify that the 'EventRateLimit' plugin is enabled (OpenShift)
- T1967: Adjust the request timeout value (OpenShift)
- T1968: Verify that request timeout is set to an appropriate value (OpenShift)
- T1969: Do not expose profiling to the web (OpenShift)
- T1970: Verify that profiling is not exposed to the web (OpenShift)
- T1971: Adjust the 'terminated-pod-gc-threshold' argument as needed (OpenShift)
- T1972: Verify the 'terminated-pod-gc-threshold' value (OpenShift)
- T1973: Do not disable 'use-service-account-credentials' argument (OpenShift)
- T1974: Verify that 'use-service-account-credentials' is not disabled (OpenShift)
- T1975: Do not set 'service-account-private-key-file' argument (OpenShift)
- T1976: Verify that 'service-account-private-key-file' argument is not set (OpenShift)
- T1977: Do not set 'serviceAccountConfig.masterCA' argument (OpenShift)
- T1978: Verify that the '--root-ca-file' argument is not set (OpenShift)
- T1979: Never give pods more privileges than required (OpenShift)
- T1980: Verify that Security Context Constraints get applied (OpenShift)
- T1981: Enable the 'RotateKubeletServerCertificate' feature gate (OpenShift)
- T1982: Verify that the 'RotateKubeletServerCertificate' feature is enabled (OpenShift)
- T1983: Set permissions for sensitive files properly (OpenShift)
- T1984: Verify the permissions for the configuration files (OpenShift)
- T1985: Secure etcd communication (OpenShift)
- T1986: Verify that etcd communication is secure (OpenShift)
- T1987: Follow the principle of least privilege (OpenShift)
- T1988: Verify that the cluster-admin role is only used where required (OpenShift)
- T1989: Run pods with the most restrictive Security Context Constraints possible (OpenShift)
- T1990: Verify Security Context Constraints as in use (OpenShift)
- T1991: Restrict access to projects only to the required users (OpenShift)
- T1992: Verify that only required users are assigned to projects (OpenShift)
- T1993: Create restrictive network segmentation (OpenShift)
- T1994: Verify the network segmentation (OpenShift)
- T1995: Enable and configure seccomp (OpenShift)
- T1996: Verify that Security Context Constraints have been configured with seccomp (OpenShift)
- T1997: Manage image provenance using ImagePolicy plugin (OpenShift)
- T1998: Verify image policy configuration (OpenShift)
- T1999: Implement strong network policies (OpenShift)
- T2000: Verify network policies (OpenShift)
- T2001: Limit the use of privileged containers (OpenShift)
- T2002: Verify the usage of privileged containers (OpenShift)
- T2003: Do not disable the 'allow-privileged' flag (OpenShift)
- T2004: Verify that the 'allow-privileged' flag is not disabled (OpenShift)
- T2005: Enable the 'anonymous-auth' flag (OpenShift)
- T2006: Verify that the 'anonymous-auth' is not disabled (OpenShift)
- T2007: Do not set the 'authorization-mode' argument (OpenShift)
- T2008: Verify that the 'authorization-mode' argument is not set (OpenShift)
- T2009: Do not change the default value of the 'client-ca-file' argument (OpenShift)
- T2010: Verify that the 'client-ca-file' argument is not set (OpenShift)
- T2011: Do not set the 'read-only-port' argument (OpenShift)
- T2012: Verify that the read-only port is not enabled (OpenShift)
- T2013: Adjust the value of 'streaming-connection-idle-timeout' argument (OpenShift)
- T2014: Verify the value of 'streaming-connection-idle-timeout' argument (OpenShift)
- T2015: Do not set the 'protect-kernel-defaults' argument (OpenShift)
- T2016: Verify that the 'protect-kernel-defaults' argument is not set (OpenShift)
- T2017: Do not disable the 'make-iptables-util-changes' flag (OpenShift)
- T2018: Verify that the 'make-iptables-util-chains' argument is not disabled (OpenShift)
- T2019: Do not enable the 'keep-terminated-pod-volumes' flag (OpenShift)
- T2020: Verify that the 'keep-terminated-pod-volumes' is not enabled (OpenShift)
- T2021: Do not disable the 'hostname-override' flag (OpenShift)
- T2022: Verify that the 'hostname-override' flag is not disabled (OpenShift)
- T2023: Set the 'event-qps' argument to 0 (OpenShift)
- T2024: Verify the value of 'event-qps' argument (OpenShift)
- T2025: Do not set the 'cert-dir' argument (OpenShift)
- T2026: Verify the value of 'cert-dir' argument (OpenShift)
- T2027: Do not enable cAdvisor endpoint (OpenShift)
- T2028: Verify that cAdvisor endpoint is not enabled (OpenShift)
- T2029: Do not disable the 'RotateKubeletClientCertificate' and 'RotateKubeletServerCertificate' flags (OpenShift)
- T2030: Verify that the 'RotateKubeletClientCertificate' and 'RotateKubeletServerCertificate' are not disabled (OpenShift)
Updated Tasks
- T1053: Enable VM protection features (Microsoft Azure) [Updated text.]
- T1056: Test that all VMs are updated (Microsoft Azure) [Updated text.]
- T1057: Enable disk and storage encryption (Microsoft Azure) [Updated text.]
- T1058: Test that disk and storage encryption is enabled (Microsoft Azure) [Updated text.]
- T1059: Configure network security groups and firewalls securely (Microsoft Azure) [Updated text.]
- T1060: Test that network security groups and firewalls are configured securely (Microsoft Azure) [Updated text.]
- T1061: Enable SQL auditing and threat detection (Microsoft Azure) [Updated text.]
- T1062: Test that SQL auditing and threat detection are enabled (Microsoft Azure) [Updated text.]
- T1063: Set up security contacts (Microsoft Azure) [Updated text.]
- T1064: Test that security contacts are set up (Microsoft Azure) [Updated text.]
- T1077: Log critical events (Microsoft Azure) [Updated text.]
- T1074: Verify that logs are kept long enough (Microsoft Azure) [Updated text.]
- T1078: Verify that critical events are logged (Microsoft Azure) [Updated text.]
- T1082: Verify that Key Vault is configured securely (Microsoft Azure) [Updated text.]
- T1087: Select standard pricing tier (Microsoft Azure) [Updated text.]
- T1368: Perform security testing using SAST tools [Updated the old title "Perform SAST and triage findings" and text to better reflect completion conditions.]
- T1369: Perform security testing using DAST tools [Updated the old title "Perform DAST and triage findings" and text to better reflect completion conditions.]
- T1635: Drop connections after 3 unsuccessful login attempts (Oracle Database) [Changed the old title: "Lock out accounts after 3 unsuccessful attempts" and updated the text.]
- T1636: Verify that connections are dropped after 3 unsuccessful login attempts (Oracle Database) [Changed the old title: "Verify that accounts are locked out after 3 unsuccessful attempts" and updated the text."
- T1649: Lock out accounts after 5 unsuccessful attempts (Oracle Database) [Updated the text.]
- T1650: Verify that accounts are locked out after 5 unsuccessful attempts (Oracle Database) [Updated the text.]
- T1893: Perform a cloud solution security posture assessment [Updated text to better reflect completion conditions.]
- T1915: Perform network vulnerability assessment [Updated the old title "Perform network vulnerability assessment and triage findings" and text to better reflect completion conditions.]
- T1921: Track and manage usage of third-party and commercial off the shelf (COTS) hardware or software [Updated title text to better reflect completion conditions.]
Added Problems
- P1440: Changing default behavior for anonymous access (OpenShift)
- P1441: Using static passwords (OpenShift)
- P1442: Unsecure connection between API server and node/kubelet (OpenShift)
- P1443: Insecure binding or port access for API server (OpenShift)
- P1444: Disabled 'secure-port' flag (OpenShift)
- P1445: Exposed API server profiling data (OpenShift)
- P1446: API incompatibility across versions (OpenShift)
- P1447: Active 'AlwaysAdmit' admission controller (OpenShift)
- P1448: Active 'AlwaysPullImages' admission controller (OpenShift)
- P1449: Using 'DenyEscalatingExec' or 'SecurityContextDeny' admission controllers (OpenShift)
- P1450: Disabled 'NamespaceLifecycle' admission controller (OpenShift)
- P1451: Lack of proper auditing or retention of audit logs for API server (OpenShift)
- P1452: Using 'authorization-mode' flag (OpenShift)
- P1453: Using static token files (OpenShift)
- P1454: Using 'service-account-lookup' or 'service-account-key-file' arguments (OpenShift)
- P1455: Enabling 'PodSecurityPolicy' and 'SecurityContextConstraints' at the same time (OpenShift)
- P1456: Unsecure communication to 'etcd' (OpenShift)
- P1457: Inactive 'ServiceAccount' admission controller (OpenShift)
- P1458: Disabled 'NodeRestriction' admission plugin (OpenShift)
- P1459: Unencrypted data on 'etcd' (OpenShift)
- P1460: No rate limit for requests to API server (OpenShift)
- P1461: Inappropriate request timeout value (OpenShift)
- P1462: Exposing profiling to the web (OpenShift)
- P1463: Inappropriate 'terminated-pod-gc-threshold' value (OpenShift)
- P1464: Disabling 'use-service-account-credentials argument' argument (OpenShift)
- P1465: Changing the default 'service-account-private-key-file' (OpenShift)
- P1466: Changing the default 'root-ca-file' (OpenShift)
- P1467: Giving unnecessary privileges to the pods (OpenShift)
- P1468: Lack of certificate rotation (OpenShift)
- P1469: Improper permissions for sensitive files (OpenShift)
- P1470: Unsecure etcd communication (OpenShift)
- P1471: Granting excessive permissions (OpenShift)
- P1472: Loose access constraints for pods (OpenShift)
- P1473: Excessive access to projects (OpenShift)
- P1474: Lack of restrictive network segmentation (OpenShift)
- P1475: Running containers with unconfined seccomp settings (OpenShift)
- P1476: Lack of control on images run in a cluster (OpenShift)
- P1477: Lack of network access control (OpenShift)
- P1478: Using privileged containers (OpenShift)
- P1479: Disabling the 'allow-privileged' flag (OpenShift)
- P1480: Disabling the 'anonymous-auth' flag (OpenShift)
- P1481: Setting the 'authorization-mode' argument (OpenShift)
- P1482: Improper configuration of the 'client-ca-file' argument (OpenShift)
- P1483: Enabling read-only port (OpenShift)
- P1484: Improper value for the 'streaming-connection-idle-timeout' argument (OpenShift)
- P1485: Setting the 'protect-kernel-defaults' argument (OpenShift)
- P1486: Disabling the 'make-iptables-util-chains' flag (OpenShift)
- P1487: Enabling the 'keep-terminated-pod-volumes' flag (OpenShift)
- P1488: Disabling the 'hostname-override' flag (OpenShift)
- P1489: Non-zero value for the 'event-qps' argument (OpenShift)
- P1490: Improper value for the 'cert-dir' argument (OpenShift)
- P1491: Enabling cAdvisor endpoint (OpenShift)
- P1492: Disabling the 'RotateKubeletClientCertificate' and 'RotateKubeletServerCertificate' flags (OpenShift)
Updated Problems
- P1169: Server Side Request Forgery (SSRF) [Corrected text errors.]
- P1306: Unlimited number of login attempts during a connection (Oracle Database) [Changed the old title: "Unlimited number of login attempts can lead to brute-force attack".]
- P1313: Unlimited failed login attempts by a user (Oracle Database) [Changed the old title: "Repeated failed login attempts" and updated the text.]
Added HowTo's
- I1307: Using Correct Cryptographic Algorithms and Parameters in Java
- I1308: OpenShift: How to see the cert and key used by the API server to sign service account tokens
- I1309: OpenShift: How to remove insecure-bind-address and insecure-port
- I1310: OpenShift: How to make sure 'secure-port' is not disabled
- I1311: OpenShift: How to disable profiling data exposure
- I1312: OpenShift: How to modify 'repair-malformed-updates' value for API compatibility
- I1313: OpenShift: How to disable 'AlwaysAdmit' admission controller
- I1314: OpenShift: How to enable 'AlwaysPullImages' plugin
- I1315: OpenShift: How to restrict usage of 'edit' and 'admin' roles
- I1316: OpenShift: How to make sure 'NamespaceLifecycle' plugin is not disabled
- I1317: OpenShift: How to make sure 'authorization-mode' is not set
- I1318: OpenShift: How to make sure static token files are not used
- I1319: OpenShift: How to see public/private keys used by the API server to sign service account tokens
- I1320: OpenShift: How to disable the 'PodSecurityPolicy' admission control plugin
- I1321: OpenShift: How to see the cert and key used by the API server for etcd communication
- I1322: OpenShift: How to enable 'ServiceAccount' admission controller
- I1323: OpenShift: How to change the 'request-timeout' value
- I1324: OpenShift: How to make sure profiling is not exposed to the web
- I1325: OpenShift: How to make sure 'use-service-account-credentials' is not disabled
- I1326: OpenShift: How to make sure 'service-account-private-key-file' argument is not set
- I1327: OpenShift: How to make sure 'root-ca-file' argument is not set
- I1328: OpenShift: How to rotate certificates
- I1329: OpenShift: How to set the permissions for the configuration files
- I1330: OpenShift: How to configure imagePolicy plugin
- I1331: OpenShift: How to make sure the 'client-ca-file' argument is not set
- I1332: OpenShift: How to set the 'streaming-connection-timeout' value
Updated HowTo's
- I1: Java with Jasypt [Change of text, Content was reviewed and updated.]
- I2: Java with Jasypt and Bouncy Castle [Change of text, Content was reviewed and updated.]
- I3: Java [Change of text, Content was reviewed and updated.]
- I4: Java with Jasypt [Change of text, Content was reviewed and updated.]
- I5: Centralize authorization using AccessController interface of ESAPI [Change of text, Content was reviewed and updated.]
- I6: Authorize every page using ESAPI AccessController interface [Change of text, Content was reviewed and updated.]
- I8: Java EE with ESAPI: Invalidate old session ID [Change of text, Content was reviewed and updated.]
- I9: Java EE [Change of text, Content was reviewed and updated.]
- I11: Java EE with Tomcat [Change of text, Content was reviewed and updated.]
- I12: Java EE with WebLogic 9.2 [Change of text, Content was reviewed and updated.]
- I14: Java EE , Servlet Spec 3+ [Change of text, Content was reviewed and updated.]
- I15: SiteMinder 6 [Change of text, Content was reviewed and updated.]
- I17: Java EE with Tomcat 6.0+ [Change of text, Content was reviewed and updated.]
- I18: Java EE with WebLogic 9.2 [Change of text, Content was reviewed and updated.]
- I19: Java EE with WebSphere 6.1+ [Change of text, Content was reviewed and updated.]
- I20: Java EE [Change of text, Content was reviewed and updated.]
- I21: SiteMinder 6 [Change of text, Content was reviewed and updated.]
- I28: Java EE, Servlet Spec 3.x [Change of text, Content was reviewed and updated.]
- I30: Java EE [Change of text, Content was reviewed and updated.]
- I32: Java [Change of text, Content was reviewed and updated.]
- I33: Java EE with ESAPI: Perform input validation on all forms of input [Change of text, Content was reviewed and updated.]
- I38: Java EE with JSF [Change of text, Content was reviewed and updated.]
- I41: Java EE with WebLogic 9.2 [Change of text, Content was reviewed and updated.]
- I42: Java EE with WebSphere 6.1+ [Change of text, Content was reviewed and updated.]
- I44: Java EE with ESAPI: Escape untrusted data [Change of text, Content was reviewed and updated.]
- I46: Java EE with JSF and Facelets [Change of text, Content was reviewed and updated.]
- I51: Java with JDBC Prepared Statements [Change of text, Content was reviewed and updated.]
- I53: Java EE with Java Persistence Architecture (JPA) [Change of text, Content was reviewed and updated.]
- I54: Java EE with ESAPI: Disallow carriage returns in HTTP response headers [Change of text, Content was reviewed and updated.]
- I55: Java with ESAPI: Use XML encoding [Change of text, Content was reviewed and updated.]
- I56: Java EE with JAXB [Change of text, Content was reviewed and updated.]
- I57: Java EE with ESAPI: Use Lightweight Directory Access Protocol (LDAP) encoding [Change of text, Content was reviewed and updated.]
- I59: Java with ESAPI: Avoid unsafe operating system interaction [Change of text, Content was reviewed and updated.]
- I60: Java EE [Change of text, Content was reviewed and updated.]
- I63: Java EE with AppSensor [Change of text, Content was reviewed and updated.]
- I68: Java with ESAPI and Jasypt: Use standard libraries for encryption [Change of text, Content was reviewed and updated.]
- I69: Java EE with Jasypt, Bouncy Castle, and Spring IOC [Change of text, Content was reviewed and updated.]
- I271: Java [Change of text, Content was reviewed and updated.]
- I366: Java [Change of text, Content was reviewed and updated.]
- I381: Bouncy Castle [Change of text, Content was reviewed and updated.]
- I420: Java or Android Keystore [Change of text, Content was reviewed and updated.]
- I507: Java Object Serialization [Change of text, Content was reviewed and updated.]
- I509: Storing cryptographic keys and data [Change of text, Content was reviewed and updated.]
- I1004: Enable encrypted connection to database engine [Updated the text.]
Updated T186, w/ latest security patch level for third-party libraries
- Django
- Spring Framework
- Apache Tomcat
- GnuTLS
- OpenSSL
- Apache HTTP Server
- Apache Wicket
- Java
- Bouncy Castle
- Node.js
- AngularJS/Angular
- Docker
Changes to Project Properties and Profiles
- Updated "A754: Provides web services or external APIs" [Updated tooltip description.]
- Added "A1245: OpenShift" under "Q308: Containerization Technologies"
- Added "A1236: Cloud IAM" under "Q309: Google Cloud Services"
- Added "A1237: Compute Engine" under "Q309: Google Cloud Services"
- Added "A1238: Cloud Key Management Service" under "Q309: Google Cloud Services"
- Added "A1239: Virtual Private Cloud (VPC)" under "Q309: Google Cloud Services"
- Added "A1240: Cloud Storage" under "Q309: Google Cloud Services"
- Added "A1241: Cloud Audit Logs" under "Q309: Google Cloud Services"
- Added "A1242: Cloud DNS" under "Q309: Google Cloud Services"
- Added "A1243: Cloud SQL" under "Q309: Google Cloud Services"
- Added "A1244: Stackdriver" under "Q309: Google Cloud Services"
5.0
Introducing SD Elements V5!
This release is dedicated to Mark Rathwell. Thank you for your friendship and passion.
- Anticipated release dates:
- Early Access Server: August 5th, 2019
- General Availability: August 19th, 2019
New features and improvements:
V5 presents a set of major enhancements to the SD Elements platform and its content in support of Continuous Compliance.
Automated Project Classification:
- You can now better manage projects by classifying them by their potential risk.
- This feature can be enabled or disabled by the organization admin. It is disabled by default.
- Once enabled, projects may be automatically assigned a risk classification and a default Risk Policy based on the answers of the Project Survey.
- Project Classifications are reflected after completing the Project Survey, in the Activity Log, and in Global Reports. Please see the user guide for more information.
- Risk Policies may be configured after completing the Project Survey.
- Project Classifications require one answer and one Risk Policy. Deleting a custom answer from the Project Survey will remove it from Project Classifications. If that was the only answer assigned to the Classification, the Classification cannot be saved until a replacement is provided.
Enhancements to Verification Integrations:
- Analysis integration categories are now displayed on the integration forms such as Veracode (SAST, DAST).
- Added support for the following new verification integrations:
- Sonarqube
- OWASP Dependency Check
- Tenable Nessus (CIS AWS Benchmarks Compliance)
Process Controls for the Software Security Lifecycle:
- Process controls enhance the coverage of SD Elements beyond software development to cover the entire security lifecycle of your software, including operations and maintenance of software being developed or purchased.
- Process controls are mapped to popular security frameworks such as NIST 800-53 and PCI-SSLC.
- This new set of content is disabled by default. Please contact your Customer Success representative to enable it.
- Process controls are added in a new phase called “Activities”.
- These new tasks take advantage of our classification system to decide on the applicability of various process activities.
- For more details, please refer to the content additions and updates below.
Process Task Automation Beta (PTA):
- The Beta version of PTA is available to customers that have activated Process Controls for the Software Security Lifecycle.
- A new event-action framework supports automatically transitioning certain SD Elements process tasks to ‘Complete’.
- This is based on the occurrence of triggering events within SD Elements with certain predefined criteria.
- For instance, marking the process task T1368 complete when a SAST code scanner is run and the results are imported into SD Elements with zero high and zero critical findings.
- Or reopen a process task previously marked complete (such as T1368), if a SAST scan has not been run and results are imported into SDE within a predefined time threshold.
- The following process tasks are automatically marked ‘Complete’ when scan results are returned with zero high and zero critical vulnerabilities for the respective category:
- T1368: Perform security testing using SAST tools
- T1369: Perform security testing using DAST tools
- T1893: Perform a cloud solution security posture assessment
- T1915: Perform network vulnerability assessment
- T1921: Avoid obtaining code (source or mobile) from untrusted sources such as public Internet
- The beta version of PTA supports the following verification tools:
- Microfocus Fortify SSC
- Microfocus WebInspect
- IBM Appscan Standard
- IBM Appscan Source
- Sonarqube
- OWASP Dependency Check
- Checkmarx
- Veracode
- Nessus
- Support for additional events and actions will be added in future releases.
Deprecations:
- The super-user only ‘Export Logs’ feature has been removed. To retrieve log files, refer to the SSH method here: https://docs.sdelements.com/release/latest/sysadmin/docs/ongoing_tasks.html#_examine_logs
- SD Elements no longer supports legacy AppScan Standard files (9.0.3.0 and earlier).
- Fortify no longer supports XML file uploads. (It continues to support FVDL and FPR.)
- Thoughtworks Mingle support in SD Elements will be deprecated on July 31st, 2019, and it may cease to function on or after that date. Mingle support will be removed in a future version of SD Elements.
Bug Fixes
- Fixed a bug where LDAP sync table’s status did not change to ‘In progress’ when a sync was in progress.
- Task verification notes created by a verification sync will now include the report reference if available.
- Fixed a bug where the Global Reports ‘Last Modified’ column was only updated when the report was created.
Content additions and updates (as of July 23, 2019):
Updated Tasks
- T29: Use anti-Cross-Site Request Forgery (CSRF) tokens (Change of text, a note was added on generating one token per session independent of session id)
- T87: Verify that all data in transit is encrypted using a secure TLS channel (Change of text and title. Merged with content from T254)
- T422: Verify that built-in sanitization is used in Angular with limited code or markup (Change of title and text. Added test section for Angular as well)
- T496: Protect sensitive data on forward and back (reverse) RFID channels (Change of title from encrypt to protect)
- T797: Make all RDS Databases private and ensure RDS instances are inside a VPC (AWS) [Change of title and text, emphasis on VPC instance and use of EC2-VPC]
- T830: Test that RDS Databases are not publicly accessible and are defined in a VPC (AWS) [Change of title and text, emphasis on VPC instance and verifying VPC assignment for RDS]
- T1164: Secure swarm mode (Docker) [Updated text and rules]
- T1165: Verify that swarm mode is secured (Docker) [Updated text and rules)
- T1873: Prevent information leakage through HTTP response headers (Change of text)
Added Tasks
- T1887: Decide on the right OAuth 2.0 flow for your application
- T1888: Decide on the right OpenID Connect flow for your application
- T1889: Secure the configuration of the authorization server
- T1890: Implement OAuth 2.0 securely on the resource server
- T1897: Encrypt SQS queue messages (AWS)
- T1898: Verify that SQS queue messages are encrypted (AWS)
- T1899: Do not allow unauthorized access to SQS queues (AWS)
- T1900: Verify that SQS queues are only accessible from trusted AWS accounts (AWS)
- T1901: Attach IAM policies to SQS resources (AWS)
- T1902: Verify that SQS queues have IAM Policies attached (AWS)
- T1903: Enforce Network ACLs for RDS (AWS)
- T1904: Encrypt data stored in RDS at rest (AWS)
- T1905: Verify whether data at rest in RDS is encrypted (AWS)
- T1906: Enforce authentication on your relational database services (AWS)
- T1907: Verify whether IAM authentication is enabled for RDS databases (AWS)
- T1909: Change the RDS default master username (AWS)
- T1910: Verify whether the default master username is changed (AWS)
- T1911: Attach IAM policies to RDS resources (AWS)
- T1912: Verify that RDS databases have IAM policies attached (AWS)
- T1919: Use JSON Web Token (JWT) securely
- T1922: Integrate OAuth 2.0 and OpenID Connect where appropriate
- T1923: Disable swarm mode if not needed
- T1924: Verify that swarm mode is disabled
Deactivated Tasks
- T495: Send sensitive data in cover-coded mode on forward channel (Deactivated. Merged with T496: Protect sensitive data on forward and back (reverse) RFID channels)
- T254: Test that TLS/SSL communication is protected (Deactivated. Merged with T87: Verify that all data in transit is encrypted using a secure TLS channel)
Added Additional Requirements
- TA1007: Restricting the user
- TA1008: Restricting the client
- TA1009: Restricting the scope
- TA1010: Testing Security Group requirements for RDS (AWS)
- TA1011: Configuring Security Groups for RDS (AWS)
- TA1012: Use database engine authentication (AWS)
- TA1013: Purpose of each OAuth 2.0 flow
- TA1014: Using scopes as permissions
- TA1015: Understanding the Authorization Code Grant flow with PKCE
- TA1016: Understanding the Client Credentials flow
- TA1017: Proof-of-possession tokens
- TA1018: Securing client registration
- TA1019: Understanding the OIDC Authorization Code flow with PKCE
- TA1020: Understanding the OIDC Hybrid flow
- TA1023: The purpose of OAuth 2.0
- TA1021: Understanding the OIDC Implicit flow
- TA1022: Context information on OAuth 2.0 and OIDC
- TA1024: The purpose of OpenID Connect
- TA1025: Ensure RDS snapshots are not public (AWS)
- TA1026: Verify that RDS snapshots are not publicly accessible (AWS)
Updated Problems
- P1074: Unlocked swarm (Docker) [Updated rules.]
- P1102: Failing to manage secrets in Docker Swarm (Docker) [Updated rules.]
Added Problems
- P1431: Insecure use of JSON Web Token (JWT)
Updated HowTo’s
- I927: Docker: How to secure swarm mode (Updated text.)
Added HowTo’s
- I1293: Handling user involvement in OIDC
- I1294: Implementing the Authorization Code Grant flow with PKCE
- I1295: Session Management with OIDC
- I1297: Handling the Identity Token for User Authentication
- I1299: Validating reference tokens
- I1300: Validating self-contained tokens
- I1302: How to enforce ACL for RDS (AWS)
- I1303: Implementing the Client Credentials flow
- I1304: Augmenting OAuth 2.0 flows with OIDC properties
- I1305: Docker: How to disable swarm mode
Updated T186, w/ latest security patch level for third-party libraries
- Rails
- Django
- Spring Framework
- Apache Tomcat
- Java
- AFNetworking Library
- Node.js
- Docker
Changes to Project Properties and Profiles
- Deactivated "Q125: Authentication Backend" (This question has been disabled and all of its answers have been moved under "Q121: Authentication Method")
- Updated "A8: Stand-alone application" (Changed the description to suggest using this application type for some categories of libraries and SDKs)
- Updated "A21: Passwords stored in configuration files" (Updated matching conditions to make this applicable to all types of applications)
- Updated "A27: Uses encryption functions (not including SSL)" (Updated matching conditions to make this applicable to all types of applications)
- Updated "A39: Has file upload or file transfer functions" (Relaxed the matching conditions/applicability criteria)
- Updated "A54: Uses SSO or federated authentication" (Moved under "Q121: Authentication Method" and removed generic server application from its machine conditions)
- Updated "A55: Uses LDAP repository" (Moved under "Q121: Authentication Method" and removed generic server application from its machine conditions)
- Updated "A167: Uses database authentication" (Moved under "Q121: Authentication Method" and removed generic server application from its machine conditions)
- Updated "A194: Rich client" (Changed the description to suggest using this application type for some categories of libraries and SDKs)
- Updated "A697: Django" (Added "Generic Web Application" to the matching conditions/applicability criteria)
- Deactivated "A756: Authentication is handled through a different system" (Combined with "A758: Has direct or third party authentication for end users, devices or nodes")
- Updated "A758: Has direct or third party authentication for end users, devices or nodes" (Updated text)
- Updated "A1122: Requires non-repudiation" (Removed ‘Requires security logging’ from the matching conditions/applicability criteria)
- Added "A1227: SQS" under "Q298: AWS Services"
- Added "A1235: Swarm" under "Q308: Containerization Technologies"
We also added Oracle database content based on CIS Oracle Database 12c benchmark:
Added Tasks
- T1476: Use secure channels for remote administration (Oracle Database)
- T1477: Verify that secure channels are used for remote administration (Oracle Database)
- T1478: Remove 'extproc' from 'listener.ora' (Oracle Database)
- T1479: Verify that external procedures are not enabled (Oracle Database)
- T1480: Block unauthorized users from making changes to 'listener.ora' (Oracle Database)
- T1481: Verify that unauthorized users are not able to make alterations to remote data/service settings (Oracle Database)
- T1482: Use encrypted channels for remote connections (Oracle Database)
- T1483: Verify remote connections are established through encrypted channels (Oracle Database)
- T1613: Use latest versions and patches (Oracle Database)
- T1614: Verify that latest versions and patches are used (Oracle Database)
- T1615: Keep passwords secure (Oracle Database)
- T1616: Verify that all default passwords are changed (Oracle Database)
- T1617: Remove all sample data and sample schemas (Oracle Database)
- T1618: Verify that sample schemas are removed from the production environment (Oracle Database)
- T1619: Keep audit parameters enabled at all times (Oracle Database)
- T1620: Verify that audit parameters are enabled (Oracle Database)
- T1621: Only allow authorized domains to connect with database (Oracle Database)
- T1622: Verify that name of database link matches the remote database (Oracle Database)
- T1623: Block all unauthorized access to data structures (Oracle Database)
- T1624: Verify that the value of Dictionary_Accessibility is set to False (Oracle Database)
- T1625: Do not allow OS external groups to connect with database (Oracle Database)
- T1626: Verify that external groups are not able to connect with database (Oracle Database)
- T1627: Disable remote listener setting (Oracle Database)
- T1628: Verify that remote listener setting is empty (Oracle Database)
- T1629: Do not share login password file between databases (Oracle Database)
- T1630: Verify that remote login password file is not shared between the databases (Oracle Database)
- T1631: OS 'roles' with attendant privileges should be incapable of remote client connections (Oracle Database)
- T1632: Verify that OS 'roles' are incapable of remote client connections (Oracle Database)
- T1633: Leave the utl_file_dir setting value empty (Oracle Database)
- T1634: Verify that utl_file_dir setting value is empty (Oracle Database)
- T1635: Lock out accounts after 3 unsuccessful attempts (Oracle Database)
- T1636: Verify that accounts are locked out after 3 unsuccessful attempts (Oracle Database)
- T1637: Drop a connection after 3 bad packets from the client (Oracle Database)
- T1638: Verify that system drops a connection after 3 bad packets from the client (Oracle Database)
- T1639: Maintain server logs for bad packets received from the client (Oracle Database)
- T1640: Verify that system maintains server logs for bad packets received from the client (Oracle Database)
- T1641: Do not allow database to return current patch/update information (Oracle Database)
- T1642: Verify that database is not disclosing the current patch/update information (Oracle Database)
- T1643: User must have SELECT object privilege (Oracle Database)
- T1644: Verify that user has been granted SELECT object privilege (Oracle Database)
- T1645: Restrict trace file access by making it unreadable (Oracle Database)
- T1646: Verify that system's trace file is unreadable (Oracle Database)
- T1647: Enforce resource limit in any database profile (Oracle Database)
- T1648: Verify that resource limit has been enforced in database profile (Oracle Database)
- T1649: Lock out accounts after 5 unsuccessful attempts (Oracle Database)
- T1650: Verify that accounts are locked out after 5 unsuccessful attempts (Oracle Database)
- T1651: Accounts must be unlocked automatically after a period of time (Oracle Database)
- T1652: Verify that locked account is unlocked automatically after 1 day (Oracle Database)
- T1653: Do not allow remote OS authentication of the user (Oracle Database)
- T1654: Verify that users cannot be authenticated by remote OS for full authorization to database (Oracle Database)
- T1655: Limit the number of sessions per user (Oracle Database)
- T1656: Verify that maximum number of sessions per user is less than or equal to 10 (Oracle Database)
- T1657: Do not assign default profile to any user (Oracle Database)
- T1658: Verify that default profile has not been assigned to any user (Oracle Database)
- T1659: Revoke excessive system privileges from unauthorized users (Oracle Database)
- T1660: Verify that excessive system privileges have been revoked from unauthorized users (Oracle Database)
- T1661: Proxy users should only have connect privileges (Oracle Database)
- T1662: Verify the access privileges for proxy users (Oracle Database)
- T1663: Remove 'EXECUTE ANY PROCEDURE' from OUTLN and DBSNMP users (Oracle Database)
- T1664: Verify that 'EXECUTE ANY PROCEDURE' is revoked (Oracle Database)
- T1665: Revoke default public execute privileges from powerful packages and object types (Oracle Database)
- T1666: Verify that default public execute privileges from powerful packages and object types have been revoked (Oracle Database)
- T1667: Revoke non-default public execute privileges from powerful packages and object types (Oracle Database)
- T1668: Verify that non-default public execute privileges from powerful packages and object types have been revoked (Oracle Database)
- T1669: Revoke powerful roles where they are not likely needed (Oracle Database)
- T1670: Verify that powerful roles have been revoked from where they are not likely needed (Oracle Database)
- T1671: Revoke excessive tables and view privileges (Oracle Database)
- T1672: Verify that excessive tables and view privileges have been revoked for unauthorized users (Oracle Database)
- T1673: All traditional audit options must be enabled at all times (Oracle Database)
- T1674: Verify that all traditional audit options are enabled at all times (Oracle Database)
- T1733: Enable all unified audit options (Oracle Database)
- T1734: Verify that all unified audit options are enabled (Oracle Database)
Added Problems
- P1230: Unencrypted remote connections can result in sniffing of the control configuration (Oracle Database)
- P1231: Database can run procedures from OS libraries (Oracle Database)
- P1232: Nonprivileged users can compromise data confidentiality (Oracle Database)
- P1233: Unauthorized users can sniff unencrypted remote channels (Oracle Database)
- P1295: Using an outdated version of the database (Oracle Database)
- P1296: Attackers can gain access if default passwords are not changed (Oracle Database)
- P1297: Sample schemas can launch exploits in production database (Oracle Database)
- P1298: Not monitoring user activities (Oracle Database)
- P1299: Unauthorized domain sources connecting to the database (Oracle Database)
- P1300: Unauthorized access to critical data structures (Oracle Database)
- P1301: External groups can cause privilege overlaps (Oracle Database)
- P1302: Remote listener setting can lead to connection spoofing (Oracle Database)
- P1303: Remote login password file could permit unsecured privileged connections (Oracle Database)
- P1304: OS roles can cause connection spoofing and privilege overlaps (Oracle Database)
- P1305: utl_file_dir can impact the integrity of files (Oracle Database)
- P1306: Unlimited number of login attempts can lead to brute-force attack (Oracle Database)
- P1307: Receiving bad packets could result in a denial-of-service condition (Oracle Database)
- P1308: Receiving bad packets can indicate packet-based attack (Oracle Database)
- P1309: Disclosing release/patch numbers can reveal known weaknesses to unauthorized users (Oracle Database)
- P1310: Inadvertent information disclosure (Oracle Database)
- P1311: Disclosure of sensitive information about instance operations (Oracle Database)
- P1312: Performance impact due to resource limit (Oracle Database)
- P1313: Repeated failed login attempts (Oracle Database)
- P1314: Administrative overhead due to account lockout (Oracle Database)
- P1315: Remote OS authentication of a user can grant full access to database (Oracle Database)
- P1316: Allowing multiple sessions per user can lead to memory resource consumption or denial-of-service attack (Oracle Database)
- P1317: Default profile settings can lead to privileged access (Oracle Database)
- P1318: Unauthorized users with excessive privileges can impact confidentiality and integrity of data (Oracle Database)
- P1319: Not monitoring access of proxy users (Oracle Database)
- P1320: Granting excessive privileges (Oracle Database)
- P1321: Unauthorized users can impact confidentiality and integrity of database (Oracle Database)
- P1322: Excessive privileges can lead to unauthorized actions in the database (Oracle Database)
- P1323: Powerful roles can be configured to perform unauthorized actions in the database (Oracle Database)
- P1324: Unauthorized users can attack the confidentiality and integrity of database tables (Oracle Database)
- P1325: Not logging the pattern of unauthorized activities (Oracle Database)
- P1355: Not monitoring the activities of malicious users (Oracle Database)
Added HowTo's
- I1082: Oracle Database: How to use secure channels for remote administration
- I1083: Oracle Database: How to remove 'extproc' from 'listener.ora'
- I1084: Oracle Database: How to block unauthorized users from making alterations
- I1085: Oracle Database: How to encrypt remote connections
- I1154: Oracle Database: How to apply latest and critical patches
- I1155: Oracle Database: How to change default passwords
- I1156: Oracle Database: How to remove sample schemas
- I1157: Oracle Database: How to enable audit parameters
- I1158: Oracle Database: How to enable remote database settings
- I1159: Oracle Database: How to block unauthorized access to data structures
- I1160: Oracle Database: How to disable OS external groups settings for database management
- I1161: Oracle Database: How to make the remote listener setting empty
- I1162: Oracle Database: How to remove remote login password files between databases
- I1163: Oracle Database: How to disable remote client connections for OS 'roles'
- I1164: Oracle Database: How to make the utl_file_dir setting value empty
- I1165: Oracle Database: How to lock out an account after 3 unsuccessful attempts
- I1166: Oracle Database: How to drop a connection after receiving 3 bad packets from the client
- I1167: Oracle Database: How to log the response level for bad/malformed packets from the client
- I1168: Oracle Database: How to modify database settings so that current patch/update information is not disclosed
- I1169: Oracle Database: How to modify SELECT object privilege
- I1170: Oracle Database: How to make the system trace file unreadable
- I1171: Oracle Database: How to enforce resource limits in any database profile
- I1172: Oracle Database: How to set failed login attempt limit
- I1173: Oracle Database: How to set password lock time
- I1174: Oracle Database: How to remove remote OS authentication of a user
- I1175: Oracle Database: How to limit the number of sessions per user
- I1176: Oracle Database: How to assign function-appropriate profile to a user
- I1177: Oracle Database: How to revoke excessive system privileges from unauthorized users
- I1178: Oracle Database: How to modify the access privileges for proxy users
- I1179: Oracle Database: How to revoke excessive privileges
- I1180: Oracle Database: How to revoke default public execute privileges from powerful packages and object types
- I1181: Oracle Database: How to revoke non-default public execute privileges from powerful packages and object types
- I1182: Oracle Database: How to revoke powerful roles
- I1183: Oracle Database: How to revoke excessive tables and view privileges for unauthorized users
- I1184: Oracle Database: How to enable all audit options
- I1214: Oracle Database: How to enable all unified audit options
Continuous Compliance content:
We have added 33 tasks for continuous compliance processes that are disabled by default. Once you upgrade to 5.0, please contact your Customer Success representative for more information.
Added Tasks:
- T1366: Identify applicable compliance regulations
- T1367: Identify and classify critical assets
- T1368: Perform security testing using SAST tools
- T1369: Perform security testing using DAST tools
- T1370: Identify and track common software weaknesses and threats
- T1371: Use a software security management solution to select and track security controls
- T1372: Follow software change management process
- T1373: Maintain the integrity of all software code
- T1374: Ensure the integrity of software release and update delivery
- T1375: Properly collect and protect sensitive data
- T1376: Provide and maintain guidance on secure installation, maintenance, and configuration of all software components
- T1377: Establish and maintain a bi-directional communication channel for receiving security reports and sending security notifications
- T1378: Release a change summary for each software update
- T1380: Enforce secure user registration and access control
- T1381: Establish secure processes for key management
- T1382: Manage performance and capacity
- T1383: Separate development, test, and operational environments
- T1384: Back up and restore securely
- T1385: Institute secure logging and event monitoring
- T1386: Regulate the use of electronic messaging
- T1387: Ensure the security of products acquired through the supply chain and contractors
- T1388: Triage and fix vulnerabilities discovered during automated and manual security tests
- T1389: Perform penetration testing
- T1891: Perform Privacy Impact Assessment (PIA)
- T1892: Perform a Threat and Risk Assessment (TRA)
- T1893: Perform a cloud solution security posture assessment
- T1894: Perform a vendor security assessment
- T1895: Protect applications with Intrusion Detection / Protection System (IDS/IPS)
- T1915: Perform network vulnerability assessment
- T1917: Perform container security assessment
- T1918: Integrate with SSO
- T1920: Conduct security architecture and design reviews before starting code development
- T1921: Track and manage usage of third-party and commercial off the shelf (COTS) hardware or software
Added Additional Requirements
- TA993: PCI-DSS Requirements
Added Problems
- P1170: Lack of a secure process for outsourcing
- P1171: Lack of a process for identifying applicable compliance regulation
- P1172: Lack of a process for identifying critical assets
- P1173: Lack of a process for dynamic application testing
- P1174: Lack of software change management process
- P1175: Insufficient software code control
- P1177: Lack of a process for creating summary of changes upon each software update
- P1178: Lack of a process for ensuring the integrity of software release and update
- P1179: A secure backup and restore processes are missing or lacking
- P1180: Lack of process for collecting and protecting sensitive data
- P1181: Lack of guidance on secure installation, maintenance and configuration of all software components
- P1182: Lack of a communication channel for reporting security issues
- P1183: No secure processes for logging and monitoring events
- P1184: Lack of a secure process for penetration testing
- P1185: Lack of process for user registration and enforcement of access control
- P1186: Lack of a process for static application security testing (SAST)
- P1187: Lack of a process for identifying and assessing software threats
- P1188: Lack of software security management solution to track security controls
- P1190: Lack of process for performance and capacity management
- P1191: Deploying software in production on the same environment as development and testing
- P1225: Unmanaged test result findings
- P1226: Lack of a process for regulating the use of electronic messaging
- P1429: Applications not protected with Intrusion Detection / Protection System (IDS/IPS)
- P1432: Lack of security architecture and design activities
- P1433: Lack of third-party software code or dependencies management
- P1434: Lack of secure key management process
- P1435: Lack of Privacy Impact Assessment (PIA)
- P1436: Lack of cloud solution security posture assessment
- P1437: Lack of vendor security assessment
- P1438: Lack of network vulnerability assessment
- P1439: Lack of container security assessment
Added HowTo's
- I1044: Oracle
- I1045: Microsoft SQL Server