- DATE:
- AUTHOR:
- The folks at Scrut
AWS Extended Cloud Findings with Metadata
What is this feature?
We are excited to announce a significant expansion of our AWS Cloud Findings along with Metadata in the Scrut platform. With this release, we are adding 23 new test findings, each accompanied by comprehensive metadata, to provide enhanced insights into your AWS infrastructure's security posture. The new 23 AWS test findings are listed below:
Global Service Logging Duplicated
Trail Is Not Integrated with CloudWatch
Data Events Logging Not Configured
CloudTrail Logs Not Encrypted with KMS Customer Master Keys (CMKs)
Group with No Users
User without MFA
Users with Access Keys Created during Initial Setup and Not Used
Auto Minor Version Upgrade Disabled
RDS Instance Publicly Accessible
Publicly Accessible Snapshot
DKIM Not Enabled
DKIM Not Verified
Publicly Accessible AMI
Unused Security Group
Public EBS Snapshot
Potential Secret in Instance User Data
Instance with a Public IP Address
Drop Invalid Header Fields Disabled
Bucket without MFA Delete
GetTopicAttributes Authorized to All Principals
ListSubscriptionsByTopic Authorized to All Principals
Queue with Encryption Disabled
Version Upgrade Disabled
How to Access AWS Extended Cloud Findings with Metadata:
Log in to the Scrut platform.
Navigate to the 'Cloud', go to the 'Tests' section.
Select your AWS account and explore the newly added test findings, each accompanied by detailed metadata.
To view the metadata, click on any one of the resources that you would like to see the metadata for, and a page with the information will be opened from the right side.
If you have any questions or issues, please reach out to your assigned Customer Success Manager. They'll be happy to assist you!
To view all the product updates, please click here.