-
Notifications
You must be signed in to change notification settings - Fork 507
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
New Policies for Azure & Category Updates. (#580)
* add new categories for all azure policies * rule reference ids updated for azure policies * rule reference ids updated: azure network security rules * post review rule reference id fix
- Loading branch information
1 parent
cca6d2f
commit 02d312e
Showing
325 changed files
with
1,412 additions
and
1,700 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0069.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort3020ExposedPublicEntire", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort3020ExposedPublicEntire", | ||
"numberOfHosts": 1, | ||
"portNumber": 3020, | ||
"prefix": "reme_", | ||
"protocol": "TCP" | ||
}, | ||
"severity": "High", | ||
"description": "CIFS / SMB (TCP:3020) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0069", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0072.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort7001ExposedPublicEntire", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort7001ExposedPublicEntire", | ||
"numberOfHosts": 1, | ||
"portNumber": 7001, | ||
"prefix": "reme_", | ||
"protocol": "TCP" | ||
}, | ||
"severity": "High", | ||
"description": "Cassandra (TCP:7001) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0072", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0075.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort61621ExposedPublicEntire", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort61621ExposedPublicEntire", | ||
"numberOfHosts": 1, | ||
"portNumber": 61621, | ||
"prefix": "reme_", | ||
"protocol": "TCP" | ||
}, | ||
"severity": "High", | ||
"description": "Cassandra OpsCenter (TCP:61621) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0075", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0078.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort53ExposedPublicEntireUdp", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort53ExposedPublicEntireUdp", | ||
"numberOfHosts": 1, | ||
"portNumber": 53, | ||
"prefix": "reme_", | ||
"protocol": "UDP" | ||
}, | ||
"severity": "High", | ||
"description": "DNS (UDP:53) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0078", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0081.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort9000ExposedPublicEntire", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort9000ExposedPublicEntire", | ||
"numberOfHosts": 1, | ||
"portNumber": 9000, | ||
"prefix": "reme_", | ||
"protocol": "TCP" | ||
}, | ||
"severity": "High", | ||
"description": "Hadoop Name Node (TCP:9000) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0081", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0084.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort8000ExposedPublicEntire", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort8000ExposedPublicEntire", | ||
"numberOfHosts": 1, | ||
"portNumber": 8000, | ||
"prefix": "reme_", | ||
"protocol": "TCP" | ||
}, | ||
"severity": "High", | ||
"description": " Known internal web port (TCP:8000) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0084", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0087.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort8080ExposedPublicEntire", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort8080ExposedPublicEntire", | ||
"numberOfHosts": 1, | ||
"portNumber": 8080, | ||
"prefix": "reme_", | ||
"protocol": "TCP" | ||
}, | ||
"severity": "High", | ||
"description": " Known internal web port (TCP:8080) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0087", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0090.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort636ExposedPublicEntire", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort636ExposedPublicEntire", | ||
"numberOfHosts": 1, | ||
"portNumber": 636, | ||
"prefix": "reme_", | ||
"protocol": "TCP" | ||
}, | ||
"severity": "High", | ||
"description": "LDAP SSL (TCP:636) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0090", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0096.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort1434ExposedPublicEntireUdp", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort1434ExposedPublicEntireUdp", | ||
"numberOfHosts": 1, | ||
"portNumber": 1434, | ||
"prefix": "reme_", | ||
"protocol": "UDP" | ||
}, | ||
"severity": "High", | ||
"description": "MSSQL Browser (UDP:1434) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0096", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0099.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort135ExposedPublicEntire", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort135ExposedPublicEntire", | ||
"numberOfHosts": 1, | ||
"portNumber": 135, | ||
"prefix": "reme_", | ||
"protocol": "TCP" | ||
}, | ||
"severity": "High", | ||
"description": "MSSQL Debugger (TCP:135) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0099", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0102.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort1433ExposedPublicEntire", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort1433ExposedPublicEntire", | ||
"numberOfHosts": 1, | ||
"portNumber": 1433, | ||
"prefix": "reme_", | ||
"protocol": "TCP" | ||
}, | ||
"severity": "High", | ||
"description": "MSSQL Server (TCP:1433) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0102", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
18 changes: 18 additions & 0 deletions
18
pkg/policies/opa/rego/azure/azurerm_network_security_rule/AC-AZ-IS-NS-H-0111.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
{ | ||
"name": "reme_networkPort11214ExposedPublicEntireUdp", | ||
"file": "networkPortExposedPublic.rego", | ||
"template_args": { | ||
"endLimit": 0, | ||
"evalHosts": true, | ||
"name": "networkPort11214ExposedPublicEntireUdp", | ||
"numberOfHosts": 1, | ||
"portNumber": 11214, | ||
"prefix": "reme_", | ||
"protocol": "UDP" | ||
}, | ||
"severity": "High", | ||
"description": "Memcached SSL (UDP:11214) is exposed to entire Public network", | ||
"reference_id": "AC-AZ-IS-NS-H-0111", | ||
"category": "Infrastructure Security", | ||
"version": 2 | ||
} |
Oops, something went wrong.