Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Shortened rule names and constrained to a single line of text #117

Merged
merged 1 commit into from
Jan 25, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions resources/rules/gcp-database-sql-cross-db-flag.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,8 @@ id: b986202a-4007-45d1-9d53-07e3640be33e
refId: gcp-database-sql-cross-db-flag
type: asset
name: >
Cross DB ownership chaining opens up attack vectors
description: >
The "cross db ownership chaining" configuration flag allows you to control cross-database ownership chaining at the SQL Server database level or to allow cross-database ownership chaining for all SQL Server databases.
Enabling "cross db ownership chaining" flag is not recommended unless all of the databases hosted by the SQL Server need to participate in cross-database ownership chaining and you are fully aware of the security implications of this configuration setting.
severity: medium
Expand Down
3 changes: 1 addition & 2 deletions resources/rules/gcp-iam-and-security-iam-project-roles.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,7 @@ id: 3111574f-4af8-4fac-bd68-839f9f8d6477
refId: gcp-iam-and-security-iam-project-roles
type: asset
name: >
IAM users are assigned the Service Account User or
Service Account Token Creator roles at project level
IAM users are assigned the Service Account User or Service Account Token Creator roles at project level
description: >
It is recommended to assign the Service Account User (iam.serviceAccountUser) and
Service Account Token Creator (iam.serviceAccountTokenCreator) roles to a user for
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,7 @@ id: 0b2fda2b-4fc5-485e-97c4-0ab05e846749
refId: gcp-network-and-content-delivery-ensure-firewall-rules-for-instances-behind-iap-only-allow-traffic-from-gclb-addresses
type: asset
name: >
Ensure Firewall Rules for instances behind Identity Aware Proxy (IAP)
only allow the traffic from Google Cloud Loadbalancer (GCLB) Health Check and Proxy Addresses
Firewall rules for Identity Aware Proxy are overly permissive
description: >
IAP ensure that access to VMs is controlled by authenticating incoming requests.
However if the VM is still accessible from IP addresses other than the IAP it may still be possible to send unauthenticated requests to the instance.
Expand Down
Loading