Skip to content

Instantly share code, notes, and snippets.

@metahertz
Created March 29, 2021 14:07
Show Gist options
  • Save metahertz/0d4e6d3c747436fcda3e8781e8c4e99f to your computer and use it in GitHub Desktop.
Save metahertz/0d4e6d3c747436fcda3e8781e8c4e99f to your computer and use it in GitHub Desktop.
Checkov V2 New Checks
Checkov Check ID Check Description (CKV_ checks are python, CKV2_ checks are graph/yaml)
CKV_AZURE_55 Ensure that Azure Defender is set to On for Servers
CKV_AZURE_61 Ensure that Azure Defender is set to On for App Service
CKV_AZURE_69 Ensure that Azure Defender is set to On for Azure SQL database servers
CKV_AZURE_79 Ensure that Azure Defender is set to On for SQL servers on machines
CKV_AZURE_84 Ensure that Azure Defender is set to On for Storage
CKV_AZURE_85 Ensure that Azure Defender is set to On for Kubernetes
CKV_AZURE_86 Ensure that Azure Defender is set to On for Container Registries
CKV_AZURE_87 Ensure that Azure Defender is set to On for Key Vault
CKV_AZURE_58 Ensure that 'Security contact emails' is set
CKV_AZURE_77 Ensure that UDP Services are restricted from the Internet
CKV_AZURE_78 Ensure FTP deployments are disabled
CKV_K8S_100 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate
CKV_AZURE_80 Ensure that 'Net Framework' version is the latest, if used as a part of the web app
CKV_AZURE_81 Ensure that 'PHP version' is the latest, if used to run the web app
CKV_AZURE_82 Ensure that 'Python version' is the latest, if used to run the web app
CKV_AZURE_83 Ensure that 'Java version' is the latest, if used to run the web app
CKV_K8S_101 Ensure that the --client-ca-file argument is set as appropriate (Scored)
CKV_K8S_102 Ensure that the --etcd-cafile argument is set as appropriate
CKV_K8S_104 Ensure that encryption providers are appropriately configured
CKV_K8S_105 Ensure that the API Server only makes use of Strong Cryptographic Ciphers
CKV_K8S_106 Ensure that the --terminated-pod-gc-threshold argument is set as appropriate
CKV_K8S_107 Ensure that the --profiling argument is set to false
CKV_K8S_108 Ensure that the --use-service-account-credentials argument is set to true
CKV_AZURE_100 Ensure that Cosmos DB accounts have customer-managed keys to encrypt data at rest
CKV_AZURE_101 Ensure that Azure Cosmos DB disables public network access
CKV_AZURE_102 Ensure that PostgreSQL server enables geo-redundant backups
CKV_AZURE_103 Ensure that Azure Data Factory uses Git repository for source control
CKV_AZURE_104 Ensure that Azure Data factory public network access is disabled
CKV_AZURE_105 Ensure that Data Lake Store accounts enables encryption
CKV_AZURE_106 Ensure that Azure Event Grid Domain public network access is disabled
CKV_AZURE_107 Ensure that API management services uses virtual networks
CKV_AZURE_108 Ensure that Azure IoT Hub disables public network access
CKV_AZURE_109 Ensure that key vault allows firewall rules settings
CKV_AZURE_110 Ensure that key vault enables purge protection
CKV_AZURE_111 Ensure that key vault enables soft delete
CKV_AZURE_112 Ensure that key vault key is backed by HSM
CKV_AZURE_113 Ensure that key vault key use cryptographic type of ESA or EC
CKV_AZURE_114 Ensure that key vault secrets have "content_type" set
CKV_AZURE_115 Ensure that AKS enables private clusters
CKV_AZURE_116 Ensure that AKS uses Azure Policies Add-on
CKV_AZURE_117 Ensure that AKS uses disk encryption set
CKV_AZURE_118 Ensure that Network Interfaces disable IP forwarding
CKV_AZURE_119 Ensure that Network Interfaces don't use public IPs
CKV_AZURE_120 Ensure that Application Gateway enables WAF
CKV_AZURE_121 Ensure that Azure Front Door enables WAF
CKV_AZURE_122 Ensure that Application Gateway uses WAF in "Detection" or "Prevention" modes
CKV_AZURE_123 Ensure that Azure Front Door uses WAF in "Detection" or "Prevention" modes
CKV_AZURE_124 Ensure that Azure Cognitive Search disables public network access
CKV_AZURE_125 Ensures that Service Fabric use three levels of protection available
CKV_AZURE_126 Ensures that Active Directory is used for authentication for Service Fabric
CKV_AZURE_127 Ensure that My SQL server enables Threat detection policy
CKV_AZURE_128 Ensure that PostgreSQL server enables Threat detection policy
CKV_AZURE_129 Ensure that MariaDB server enables geo-redundant backups
CKV_K8S_110 Ensure that the --service-account-private-key-file argument is set as appropriate
CKV_K8S_111 Ensure that the --root-ca-file argument is set as appropriate
CKV_K8S_112 Ensure that the RotateKubeletServerCertificate argument is set to true
CKV_K8S_113 Ensure that the --bind-address argument is set to 127.0.0.1
CKV_K8S_114 Ensure that the --profiling argument is set to false
CKV_K8S_115 Ensure that the --bind-address argument is set to 127.0.0.1
CKV_K8S_116 Ensure that the --cert-file and --key-file arguments are set as appropriate
CKV_K8S_117 Ensure that the --client-cert-auth argument is set to true
CKV_K8S_118 Ensure that the --auto-tls argument is not set to true
CKV_K8S_119 Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate
CKV_K8S_121 Ensure that the --peer-client-cert-auth argument is set to true
CKV_K8S_122 Ensure that the --peer-auto-tls argument is not set to true
CKV_K8S_138 Ensure that the --anonymous-auth argument is set to false
CKV_K8S_139 Ensure that the --authorization-mode argument is not set to AlwaysAllow
CKV_K8S_140 Ensure that the --client-ca-file argument is set as appropriate
CKV_K8S_141 Ensure that the --read-only-port argument is set to 0
CKV_K8S_143 Ensure that the --streaming-connection-idle-timeout argument is not set to 0
CKV_K8S_144 Ensure that the --protect-kernel-defaults argument is set to true
CKV_K8S_145 Ensure that the --make-iptables-util-chains argument is set to true
CKV_K8S_146 Ensure that the --hostname-override argument is not set
CKV_K8S_147 Ensure that the --event-qps argument is set to 0 or a level which ensures appropriate event capture
CKV_K8S_148 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate
CKV_K8S_149 Ensure that the --rotate-certificates argument is not set to false
CKV_K8S_150 Ensure that the RotateKubeletServerCertificate argument is set to true
CKV_K8S_151 Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers
CKV_K8S_68 Ensure that the --anonymous-auth argument is set to false
CKV_K8S_69 Ensure that the --basic-auth-file argument is not set
CKV_K8S_70 Ensure that the --token-auth-file parameter is not set
CKV_K8S_71 Ensure that the --kubelet-https argument is set to true
CKV_K8S_72 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate
CKV_K8S_73 Ensure that the --kubelet-certificate-authority argument is set as appropriate
CKV_K8S_74 Ensure that the --authorization-mode argument is not set to AlwaysAllow
CKV_K8S_75 Ensure that the --authorization-mode argument includes Node
CKV_K8S_77 Ensure that the --authorization-mode argument includes RBAC
CKV_K8S_78 Ensure that the admission control plugin EventRateLimit is set
CKV_K8S_79 Ensure that the admission control plugin AlwaysAdmit is not set
CKV_K8S_80 Ensure that the admission control plugin AlwaysPullImages is set
CKV_K8S_81 Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not used
CKV_K8S_82 Ensure that the admission control plugin ServiceAccount is set
CKV_K8S_83 Ensure that the admission control plugin NamespaceLifecycle is set
CKV_K8S_84 Ensure that the admission control plugin PodSecurityPolicy is set
CKV_K8S_85 Ensure that the admission control plugin NodeRestriction is set
CKV_K8S_86 Ensure that the --insecure-bind-address argument is not set
CKV_K8S_88 Ensure that the --insecure-port argument is set to 0
CKV_K8S_89 Ensure that the --secure-port argument is not set to 0
CKV_K8S_90 Ensure that the --profiling argument is set to false
CKV_K8S_91 Ensure that the --audit-log-path argument is set
CKV_K8S_92 Ensure that the --audit-log-maxage argument is set to 30 or as appropriate
CKV_K8S_93 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriate
CKV_K8S_94 Ensure that the --audit-log-maxsize argument is set to 100 or as appropriate
CKV_K8S_95 Ensure that the --request-timeout argument is set as appropriate
CKV_K8S_96 Ensure that the --service-account-lookup argument is set to true
CKV_K8S_97 Ensure that the --service-account-key-file argument is set as appropriate
CKV_AZURE_59 Ensure Storage logging is enabled for Blob service for read requests
CKV_AZURE_60 Ensure Storage logging is enabled for Table service for read requests
CKV2_AZURE_1 Ensure storage for critical data are encrypted with Customer Managed Key
CKV2_AZURE_2 Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Account
CKV2_AZURE_3 Ensure that VA setting Periodic Recurring Scans is enabled on a SQL server
CKV2_AZURE_4 Ensure that VA setting Send scan reports to is configured for a SQL server
CKV2_AZURE_5 Ensure that VA setting 'Also send email notifications to admins and subscription owners' is set for a SQL server
CKV2_AZURE_7 Ensure that Azure Active Directory Admin is configured
CKV2_AZURE_8 Ensure the storage container storing the activity logs is not publicly accessible
CKV2_AZURE_9 Ensure Virtual Machines are utilizing Managed Disks
CKV2_GCP_6 Ensure that Cloud KMS cryptokeys are not anonymously or publicly accessible
CKV2_GCP_8 Ensure that Cloud Audit Logging is configured properly across all services and all users from a project
CKV2_GCP_9 Ensure that retention policies on log buckets are configured using Bucket Lock
CKV2_GCP_10 Ensure legacy networks do not exist for a project
CKV_GCP_68 Ensure that a MySQL database instance does not allow anyone to connect with administrative privileges
CKV_AZURE_130 Ensure that PostgreSQL server enables infrastructure encryption
CKV_AZURE_131 Ensure that SQL server disables public network access
CKV_AZURE_133 Ensure that PostgreSQL server disables public network access
CKV_AZURE_134 Ensure that Azure File Sync disables public network access
CKV_AZURE_135 Ensure that storage account enables secure transfer
CKV_K8S_99 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate
CKV_AZURE_136 Ensure that Storage accounts disallow public access
CKV_AZURE_137 Ensure that Azure Synapse workspaces enables managed virtual networks
CKV_AZURE_56 Ensure that function apps enables Authentication
CKV_AZURE_57 Ensure that CORS disallows every resource to access app services
CKV_AZURE_62 Ensure that CORS disallows every resource to access function apps
CKV_AZURE_63 Ensure that App service enables HTTP logging
CKV_AZURE_65 TBDEnsure that App service enables detailed error messages
CKV_AZURE_66 Ensure that App service enables failed request tracing
CKV_AZURE_67 Ensure that 'HTTP Version' is the latest if used to run the function app
CKV_AZURE_70 Ensure that Function apps is only accessible over HTTPS
CKV_AZURE_71 Ensure that Managed identity provider is enabled for app services
CKV_AZURE_72 Ensure that remote debugging is not enabled for app services
CKV_AZURE_73 Ensure that Automation account variables are encrypted
CKV_AZURE_74 Ensure that Azure Data Explorer uses disk encryption
CKV_AZURE_75 Ensure that Azure Data Explorer uses double encryption
CKV_AZURE_76 Ensure that Azure Batch account uses key vault to encrypt data
CKV_AZURE_88 Ensure that app services use Azure Files
CKV_AZURE_89 Ensure that Azure Cache for Redis disables public network access
CKV_AZURE_91 Ensure that only SSL are enabled for Cache for Redis
CKV_AZURE_92 Ensure that Virtual Machines use managed disks
CKV_AZURE_93 Ensure that managed disks use a specific set of disk encryption sets for the customer-managed key encryption
CKV_AZURE_94 Ensure that My SQL server enables geo-redundant backups
CKV_AZURE_95 Ensure that automatic OS image patching is enbaled for Virtual Machine Scale Sets
CKV_AZURE_96 Ensure that PostgreSQL server enables infrastructure encryption
CKV_AZURE_97 Ensure that Virtual machine scale sets have encryption at host enabled
CKV_AZURE_98 Ensure that Azure Container Container group is deployed into virtual network
CKV_AZURE_99 Ensure Cosmos DB accounts have restricted access
CKV2_AZURE_10 Ensure that Microsoft Antimalware is configured to automatically updates for Virtual Machines
CKV2_AZURE_11 Ensure that Azure Data Explorer encryption at rest uses a customer-managed key
CKV2_AZURE_12 Ensure that virtual machines are backed up using Azure Backup
CKV2_AZURE_13 Ensure that sql servers enables data security policy
CKV2_AZURE_14 Ensure that Unattached disks are encrypted
CKV2_AZURE_15 Ensure that Azure data factories are encrypted with a customer-managed key
CKV2_AZURE_16 Ensure that MySQL server enables customer-managed key for encryption
CKV2_AZURE_17 Ensure that PostgreSQL server enables customer-managed key for encryption
CKV2_AZURE_18 Ensure that Storage Accounts use customer-managed key for encryption
CKV2_AZURE_19 Ensure that Azure Synapse workspaces have no IP firewall rules attached
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment