CloudFormation detectors
Showing all detectors for the CloudFormation language.
Browse by tags
Browse all detectors by tags.
Browse by severity
Browse all detectors by severity.
Browse by category
Browse all detectors by category.
Browse all detectors
CloudFront Distribution Resources does not have the Viewer Certificate configuration present.
Provisioned throughput capacity of DynamoDB tables is not configured.
AWS CloudTrail trail is logging Amazon S3 data events for all S3 buckets.
Amazon CloudFront Distribution is not configured with two Origin Group Members.
DirectInternetAccess property is set to Enabled and value for SubnetId property is not set.
CloudWatch alarms have at least one alarm action.
Cross-zone load balancing is not enabled for the Classic Load Balancer.
Disabled domain logging is detected for AWS Elasticsearch.
Elasticsearch domains are not configured with at least three dedicated primary nodes.
S3 bucket has policies allowing HTTP requests.
Disabled Dynamodb point in time recovery is detected for global tables.
Amazon Redshift automated snapshot is not enabled for clusters.
Allowance of message lookup in Log4j2 by WAF is detected.
Amazon Relational Database Service logs (Amazon RDS) are not enabled.
S3 buckets have cross-region replication not enabled.
IAM profile is not attached with EC2 instance.
Amazon S3 bucket is not encrypted with AWS KMS key.
Unsecured encryption of DAX is detected at rest.
Disabled Encryption is detected for all data in Aurora at rest.
The KMS key policy includes wildcard (asterisk) principal.
Amazon CloudFront distribution is configured to return a specific object that is the default root object.
Checks if routes to an Internet Gateway have a destination CIDR block of '0.0.0.0/0' or '::/0'.
RDS instances with AutoMinorVersionUpgrade property is not present or set to false.
Amazon Virtual Private Cloud (Amazon VPC) subnets are not assigned a public IP address.
Unencrypted AWS Redshift cluster using CMK is detected.
The Amazon CloudWatch LogGroup retention period is not set.
EMR cluster resources KerberosAttributes property does not exist.
Redshift Cluster resources have property EnhancedVpcRouting is not persent or set to false.
Unencryption is not prevented by Athena workgroup.
Disabled versioning is detected for AWS S3 object.
Amazon ECS task definitions ContainerDefinitions has User not present and Privileged set to false.
HTTPS is not configured in the ViewerProtocolPolicy of CloudFront distribution.
Monitoring is not enabled for EC2 instances.
Disabled IAM authentication is detected for RDS database.
AWS S3 bucket allows public WRITE permission.
Overly permissive access is granted for AWS Private ECR repository policy.
Disabled Encryption is detected for AWS RDS DB cluster.
FSx File Systems resources do not have LustreConfiguration set with AutomatedBackupRetentionDays.
AWS CloudTrail trail is not logging Amazon S3 data events for all S3 buckets.
AWS IAM policy permits role permission for assumption for all services.
Unencrypted Timestream database is detected with KMS CMK.
DMS replication instance with public accessibility is detected.
Amazon Redshift clusters don't have the specified maintenance settings.
It seems like RDS instances with BackupRetentionPeriod property is not present or is set to 0.
Amazon Elastic Kubernetes Service (Amazon EKS) endpoint is publicly accessible.
CidrIp Property is set to 0.0.0.0/0.
Enabled public accessibility for RDS database is detected.
Amazon Aurora MySQL cluster has backtracking disabled.
Classic Load Balancer configured with HTTPS/SSL listener does not use a certificate provided by ACM.
S3 ObjectLockEnabled parameter not set to true.
Sagemaker Notebook Instance resources KmsKeyId property does not exist.
Secrets are being revealed by EC2 user data.
S3 Bucket is not configured to IgnorePublicAcls.
Unencryption is detected for CodeBuild project.
Amazon CloudFront distributions are not configured to use SNI to serve HTTPS requests.
All DynamoDB Tables does not have SEE enabled.
The exposure of secrets through Lambda function's environment variables is detected.
Custom Master Key is not used in SNS topic for encryption of messages.
Disabled Neptune logging is detected.
API GW does not have endpoint configuration set to REGIONAL
, PRIVATE
, and/or EDGE
.
The security groups in use is allowing unrestricted incoming TCP traffic to the specified ports.
Disabled DynamoDB Point-In-Time Recovery is detected.
EBS Optimization is not enabled for EC2 instances.
The IAM role doesn't permit only specific services or principals for assumption.
EC2 Auto Scaling launch configurations are configured to not associate public IP addresses.
Auto Scaling groups that are associated with a load balancer are not using Elastic Load Balancing health checks.
implicit SSH access from 0.0.0.0/0 for AWS EKS node group is detected.
Elasticsearch domain does not have VPCOptions or Endpoint properties.
Disabled Encryption is detected for the Glue Data Catalog.
Unsecured Encryption in transit is detected for EFS volumes in ECS task definitions.
EFS File System is not covered by a backup plan.
Disabled EnforceHTTPS is detected for AWS Elasticsearch domains.
Instances and Launch configurations with unencrypted EBS volumes is detected.
EC2 instance with public IP is detected.
RDS instances with DeletionProtection property is not present or set to false.
The Bucket ACL allows public READ permission.
Application Load Balancer is not set to HTTPS.
Disabled encryption is configured in AWS Glue security.
EC2 instance does not belong to a virtual private cloud (VPC).