Available Remediation

Rule Name

Cloud

Remediation

Remediation Description

CHECK_SECURITY_GROUP_SSH_OPEN_TO_PUBLIC

AWS

SG_SSH_OPEN_TO_PUBLIC

Delete security group ingress SSH rule that allows access to public

SECURITYGROUP_ALL_INCOMING_PORTS_OPEN

AWS

SG_DELETE_ALL_INCOMING_PORTS_RULE

Delete All Incoming port rule from Security Group

VPC_FLOWLOGS_ENABLED

AWS

ENABLE_VPC_FLOW_LOG

Enable vpc flow log for non compliant vpc. Note:- Auto remediation is not supported for this rule. Please proceed to "Compliance Analysis" to remediate non compliant resources of this rule.

ICMP_OPEN_TO_PUBLIC

AWS

BLOCK_ICMP_PUBLIC_ACCESS

Delete network ACL entry which is allowing ICMP public access.

CHECK_RESOURCE_GROUP_BUDGET_EXCEEDED

AZURE

CHECK_SUBSCRIPTION_SCOPE_BUDGET_EXCEEDED

Stop all non compliant Virtual Machine instances

S3_BUCKET_ACL_GLOBAL_READ

AWS

S3_BUCKET_ACL_GLOBAL_READ

Disable global read permission by changing access control list

CHECK_SUBSCRIPTION_SCOPE_BUDGET_EXCEEDED

AZURE

CHECK_SUBSCRIPTION_SCOPE_BUDGET_EXCEEDED

Stop all non compliant Virtual Machine instances

CHECK_EC2_INSTANCE_IDLE_CPU

AWS

CHECK_EC2_INSTANCE_THRESHOLD_EXCEEDED

Stop all non compliant EC2 instances

S3_BUCKET_ACL_GLOBAL_FULL_CONTROL

AWS

S3_BUCKET_ACL_GLOBAL_FULL_CONTROL

Disable global full control permission by changing access control list

S3_BUCKET_ACL_GLOBAL_WRITE

AWS

S3_BUCKET_ACL_GLOBAL_WRITE

Disable global write permission by changing access control list

S3_OBJECT_VERSIONING_ENABLED

AWS

ENABLE_S3_OBJECT_VERSIONING

Enable object versioning and provide user an option to enable mfa delete for non compliant bucket.

CHECK_EC2_INSTANCE_THRESHOLD_EXCEEDED

AWS

CHECK_EC2_INSTANCE_THRESHOLD_EXCEEDED

Stop all non compliant EC2 instances

CHECK_SECURITY_GROUP_TCP_OPEN_TO_PUBLIC

AWS

SG_CUSTOM_TCP_OPEN_TO_PUBLIC

Delete security group ingress TCP rule that allows access to public on port or port range inputted by user in Security policy

CHECK_SECURITY_GROUP_UDP_OPEN_TO_PUBLIC

AWS

SG_CUSTOM_UDP_OPEN_TO_PUBLIC

Delete security group ingress UDP rule that allows access to public on port or port range inputted by user in Security policy

CHECK_SECURITY_GROUP_RDP_OPEN_TO_PUBLIC

AWS

SG_RDP_OPEN_TO_PUBLIC

Delete security group ingress RDP rule that allows access to public

IAM_USER_IS_GROUP_MEMBER

AWS

IAM-USER-GROUP-MEMBERSHIP-CHECK

Add user to a deafult group "No Access".

BUDGET_CHECK_COST_EXCEEDED_ON_EC2_WITH_REMEDIATION_ON_TAG

AWS

CHECK_EC2_INSTANCE_THRESHOLD_EXCEEDED

Stop all non compliant EC2 instances

Note: Azure budget rules "CHECK RESOURCE GROUP BUDGET EXCEEDED" and "CHECK_SUBSCRIPTION_SCOPE_BUDGET_EXCEEDED" are only supported on Classic Azure subscriptions

© 2020 CloudSphere