diff --git a/pkg/policies/opa/rego/azure/azurerm_application_gateway/accurics.azure.NS.147.json b/pkg/policies/opa/rego/azure/azurerm_application_gateway/accurics.azure.NS.147.json index b322512ef..e304b672b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_application_gateway/accurics.azure.NS.147.json +++ b/pkg/policies/opa/rego/azure/azurerm_application_gateway/accurics.azure.NS.147.json @@ -10,5 +10,6 @@ "description": "Ensure Azure Application Gateway Web application firewall (WAF) is enabled", "reference_id": "accurics.azure.NS.147", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0189" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.AKS.3.json b/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.AKS.3.json index 189f10e09..4b89b09c7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.AKS.3.json +++ b/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.AKS.3.json @@ -10,5 +10,6 @@ "description": "Ensure Container Registry has locks", "reference_id": "accurics.azure.AKS.3", "category": "Resilience", - "version": 2 + "version": 2, + "id": "AC_AZURE_0185" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.EKM.164.json b/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.EKM.164.json index 38fc0a6bd..b6df40d8b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.EKM.164.json +++ b/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.EKM.164.json @@ -10,5 +10,6 @@ "description": "Ensure that admin user is disabled for Container Registry", "reference_id": "accurics.azure.EKM.164", "category": "Identity and Access Management", - "version": 2 + "version": 2, + "id": "AC_AZURE_0186" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.CAM.162.json b/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.CAM.162.json index 1ef7c5570..e77d94900 100755 --- a/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.CAM.162.json +++ b/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.CAM.162.json @@ -10,5 +10,6 @@ "description": "Ensure that Cosmos DB Account has an associated tag", "reference_id": "accurics.azure.CAM.162", "category": "Compliance Validation", - "version": 2 + "version": 2, + "id": "AC_AZURE_0277" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.NS.32.json b/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.NS.32.json index 1839cb03e..9a4ae45d5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.NS.32.json +++ b/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.NS.32.json @@ -10,5 +10,6 @@ "description": "Ensure to filter source Ips for Cosmos DB Account", "reference_id": "accurics.azure.NS.32", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0184" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.164.json b/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.164.json index 4fc51a20b..0f50079d7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.164.json +++ b/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.164.json @@ -10,5 +10,6 @@ "description": "Ensure the key vault is recoverable - enable \"Soft Delete\" setting for a Key Vault", "reference_id": "accurics.azure.EKM.164", "category": "Data Protection", - "version": 2 + "version": 2, + "id": "AC_AZURE_0170" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.20.json b/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.20.json index a4e96547f..c30852cc7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.20.json +++ b/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.20.json @@ -10,5 +10,6 @@ "description": "Ensure that logging for Azure KeyVault is 'Enabled'", "reference_id": "accurics.azure.EKM.20", "category": "Logging and Monitoring", - "version": 2 + "version": 2, + "id": "AC_AZURE_0169" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_key_vault_key/accurics.azure.EKM.25.json b/pkg/policies/opa/rego/azure/azurerm_key_vault_key/accurics.azure.EKM.25.json index 473e07dee..1478dbfe8 100755 --- a/pkg/policies/opa/rego/azure/azurerm_key_vault_key/accurics.azure.EKM.25.json +++ b/pkg/policies/opa/rego/azure/azurerm_key_vault_key/accurics.azure.EKM.25.json @@ -10,5 +10,6 @@ "description": "Ensure that the expiration date is set on all keys", "reference_id": "accurics.azure.EKM.25", "category": "Data Protection", - "version": 2 + "version": 2, + "id": "AC_AZURE_0164" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_key_vault_secret/accurics.azure.EKM.26.json b/pkg/policies/opa/rego/azure/azurerm_key_vault_secret/accurics.azure.EKM.26.json index 49a85057c..4009d5108 100755 --- a/pkg/policies/opa/rego/azure/azurerm_key_vault_secret/accurics.azure.EKM.26.json +++ b/pkg/policies/opa/rego/azure/azurerm_key_vault_secret/accurics.azure.EKM.26.json @@ -10,5 +10,6 @@ "description": "Ensure that the expiration date is set on all secrets", "reference_id": "accurics.azure.EKM.26", "category": "Data Protection", - "version": 2 + "version": 2, + "id": "AC_AZURE_0163" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.382.json b/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.382.json index 9ca74e9f8..f528d9d60 100755 --- a/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.382.json +++ b/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.382.json @@ -8,5 +8,6 @@ "description": "Ensure AKS cluster has Network Policy configured.", "reference_id": "accurics.azure.NS.382", "category": "Infrastructure Security", - "version": 1 + "version": 1, + "id": "AC_AZURE_0158" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.383.json b/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.383.json index 6933c07d2..7aab39ea1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.383.json +++ b/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.383.json @@ -8,5 +8,6 @@ "description": "Ensure Kube Dashboard is disabled", "reference_id": "accurics.azure.NS.383", "category": "Infrastructure Security", - "version": 1 + "version": 1, + "id": "AC_AZURE_0161" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.LOG.357.json b/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.LOG.357.json index f818c8e8b..05e0a9a68 100755 --- a/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.LOG.357.json +++ b/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.LOG.357.json @@ -11,5 +11,6 @@ "description": "Ensure that 'Auditing' Retention is 'greater than 90 days' for MSSQL servers.", "reference_id": "accurics.azure.LOG.357", "category": "Logging and Monitoring", - "version": 1 + "version": 1, + "id": "AC_AZURE_0136" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.MON.355.json b/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.MON.355.json index 6b5ec2dd2..02208bdca 100755 --- a/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.MON.355.json +++ b/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.MON.355.json @@ -11,5 +11,6 @@ "description": "Ensure that 'Auditing' is set to 'On' for MSSQL servers", "reference_id": "accurics.azure.MON.355", "category": "Logging and Monitoring", - "version": 1 + "version": 1, + "id": "AC_AZURE_0137" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_mysql_server/accurics.azure.NS.361.json b/pkg/policies/opa/rego/azure/azurerm_mysql_server/accurics.azure.NS.361.json index 66c6a9e64..2e269fc03 100755 --- a/pkg/policies/opa/rego/azure/azurerm_mysql_server/accurics.azure.NS.361.json +++ b/pkg/policies/opa/rego/azure/azurerm_mysql_server/accurics.azure.NS.361.json @@ -8,5 +8,6 @@ "description": "Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server.", "reference_id": "accurics.azure.NS.361", "category": "Infrastructure Security", - "version": 1 + "version": 1, + "id": "AC_AZURE_0131" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.101.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.101.json index 811640757..fe075d1e6 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.101.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.101.json @@ -16,5 +16,6 @@ "description": "Puppet Master (TCP:8140) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.101", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0451" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.103.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.103.json index bc148c96e..6c3464736 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.103.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.103.json @@ -16,5 +16,6 @@ "description": "SMTP (TCP:25) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.103", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0448" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.105.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.105.json index 78bcb49bb..6afcb9610 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.105.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.105.json @@ -16,5 +16,6 @@ "description": "SNMP (UDP:161) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.105", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0445" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.107.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.107.json index cad9acc63..55a492c00 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.107.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.107.json @@ -16,5 +16,6 @@ "description": "SQL Server Analysis (TCP:2382) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.107", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0442" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.109.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.109.json index 5806566e9..f3311da04 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.109.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.109.json @@ -16,5 +16,6 @@ "description": "SQL Server Analysis (TCP:2383) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.109", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0439" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.111.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.111.json index 27c9a69d3..7c4a9cccd 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.111.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.111.json @@ -16,5 +16,6 @@ "description": "SaltStack Master (TCP:4505) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.111", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0436" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.113.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.113.json index e93128139..dbd35ba7a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.113.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.113.json @@ -16,5 +16,6 @@ "description": "SaltStack Master (TCP:4506) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.113", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0433" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.115.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.115.json index 04f15a5ae..169b4bcbe 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.115.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.115.json @@ -16,5 +16,6 @@ "description": "Telnet (TCP:23) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.115", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0430" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.117.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.117.json index 7ddbbe4f6..efbf6c37f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.117.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.117.json @@ -16,5 +16,6 @@ "description": "VNC Listener (TCP:5500) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.117", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0427" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.119.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.119.json index b2c4ab76d..b459875af 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.119.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.119.json @@ -16,5 +16,6 @@ "description": "VNC Server (TCP:5900) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.119", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0424" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.171.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.171.json index a54217974..498ef7636 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.171.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.171.json @@ -16,5 +16,6 @@ "description": "Remote Desktop (TCP:3389) is exposed to the entire public internet", "reference_id": "accurics.azure.NPS.171", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0342" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.172.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.172.json index 935ed9236..ae217e3b5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.172.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.172.json @@ -16,5 +16,6 @@ "description": "SSH (TCP:22) is exposed to the entire public internet", "reference_id": "accurics.azure.NPS.172", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0285" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.174.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.174.json index 8b7a46163..9e4a6e610 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.174.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.174.json @@ -16,5 +16,6 @@ "description": "CIFS / SMB (TCP:3020) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.174", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0272" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.176.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.176.json index 0aa5c088b..d16a80e5e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.176.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.176.json @@ -16,5 +16,6 @@ "description": "Cassandra (TCP:7001) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.176", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0275" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.178.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.178.json index 251b6b821..7dffc0207 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.178.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.178.json @@ -16,5 +16,6 @@ "description": "Cassandra OpsCenter (TCP:61621) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.178", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0536" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.180.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.180.json index 4ee10f10d..951930986 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.180.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.180.json @@ -16,5 +16,6 @@ "description": "DNS (UDP:53) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.180", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0533" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.182.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.182.json index 0bbccb381..22c6e1fdf 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.182.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.182.json @@ -16,5 +16,6 @@ "description": "Hadoop Name Node (TCP:9000) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.182", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0530" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.184.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.184.json index 9b3be935b..5146dfcd0 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.184.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.184.json @@ -16,5 +16,6 @@ "description": " Known internal web port (TCP:8000) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.184", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0527" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.186.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.186.json index 194265853..bbab0eebf 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.186.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.186.json @@ -16,5 +16,6 @@ "description": " Known internal web port (TCP:8080) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.186", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0524" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.188.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.188.json index e82cd064d..98a17dfca 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.188.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.188.json @@ -16,5 +16,6 @@ "description": "LDAP SSL (TCP:636) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.188", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0521" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.190.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.190.json index 061d203ef..db9674e07 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.190.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.190.json @@ -16,5 +16,6 @@ "description": "MSSQL Admin (TCP:1434) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.190", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0518" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.192.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.192.json index 7d7c25a50..25abbc00b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.192.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.192.json @@ -16,5 +16,6 @@ "description": "MSSQL Browser (UDP:1434) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.192", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0518" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.194.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.194.json index b911343bb..1aebe5cfa 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.194.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.194.json @@ -16,5 +16,6 @@ "description": "MSSQL Debugger (TCP:135) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.194", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0512" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.196.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.196.json index 77b92d5e5..f38e35c2b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.196.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.196.json @@ -16,5 +16,6 @@ "description": "MSSQL Server (TCP:1433) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.196", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0509" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.198.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.198.json index 52aadb57c..4c699ddd9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.198.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.198.json @@ -16,5 +16,6 @@ "description": "Memcached SSL (TCP:11214) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.198", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0506" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.200.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.200.json index fbd441f82..308f00478 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.200.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.200.json @@ -16,5 +16,6 @@ "description": "Memcached SSL (TCP:11215) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.200", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0503" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.202.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.202.json index 4341caf37..6b20bdeee 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.202.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.202.json @@ -16,5 +16,6 @@ "description": "Memcached SSL (UDP:11214) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.202", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0506" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.204.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.204.json index 9a0408375..e73246b69 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.204.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.204.json @@ -16,5 +16,6 @@ "description": "Memcached SSL (UDP:11215) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.204", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0503" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.206.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.206.json index 67c5f1d49..e7ebdf3d6 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.206.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.206.json @@ -16,5 +16,6 @@ "description": "Microsoft-DS (TCP:445) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.206", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0494" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.208.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.208.json index 0274ddfc2..10a4d0c51 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.208.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.208.json @@ -16,5 +16,6 @@ "description": "Mongo Web Portal (TCP:27018) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.208", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0491" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.210.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.210.json index 89bf87b11..5d15f8f1a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.210.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.210.json @@ -16,5 +16,6 @@ "description": "MySQL (TCP:3306) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.210", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0488" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.212.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.212.json index 66a3771c6..81a3c032f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.212.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.212.json @@ -16,5 +16,6 @@ "description": "NetBIOS Name Service (TCP:137) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.212", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0485" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.214.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.214.json index 2435845f3..b014f99c8 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.214.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.214.json @@ -16,5 +16,6 @@ "description": "NetBIOS Name Service (UDP:137) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.214", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0485" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.216.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.216.json index 6d4007fe0..8cbb80b3f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.216.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.216.json @@ -16,5 +16,6 @@ "description": "NetBIOS Datagram Service (TCP:138) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.216", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0479" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.218.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.218.json index 5008b0f11..039fd3188 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.218.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.218.json @@ -16,5 +16,6 @@ "description": "NetBIOS Datagram Service (UDP:138) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.218", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0479" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.220.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.220.json index ced54e084..f5b6a6aec 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.220.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.220.json @@ -16,5 +16,6 @@ "description": "NetBIOS Session Service (TCP:139) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.220", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0473" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.222.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.222.json index 7a5c4bdea..70bb7364d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.222.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.222.json @@ -16,5 +16,6 @@ "description": "NetBIOS Session Service (UDP:139) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.222", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0473" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.224.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.224.json index 00dbe9f3c..d7c6a7b23 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.224.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.224.json @@ -16,5 +16,6 @@ "description": "Oracle DB SSL (TCP:2484) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.224", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0467" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.226.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.226.json index 0d580f0ab..330d976e9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.226.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.226.json @@ -16,5 +16,6 @@ "description": "Oracle DB SSL (UDP:2484) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.226", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0467" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.228.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.228.json index c571cf1e5..ea17f86e0 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.228.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.228.json @@ -16,5 +16,6 @@ "description": "POP3 (TCP:110) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.228", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0461" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.230.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.230.json index 711d04a27..2ce1139c9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.230.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.230.json @@ -16,5 +16,6 @@ "description": "PostgreSQL (TCP:5432) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.230", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0458" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.232.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.232.json index 447568b69..915f1b7d4 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.232.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.232.json @@ -16,5 +16,6 @@ "description": "PostgreSQL (UDP:5432) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.232", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0458" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.234.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.234.json index c0c147a5e..ec2ff82e7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.234.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.234.json @@ -16,5 +16,6 @@ "description": "Prevalent known internal port (TCP:3000) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.234", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0452" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.236.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.236.json index afb17b639..0f94c8ad1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.236.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.236.json @@ -16,5 +16,6 @@ "description": "Puppet Master (TCP:8140) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.236", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0449" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.238.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.238.json index df43585db..70240907b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.238.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.238.json @@ -16,5 +16,6 @@ "description": "SMTP (TCP:25) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.238", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0446" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.240.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.240.json index 22618514b..d32689652 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.240.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.240.json @@ -16,5 +16,6 @@ "description": "SNMP (UDP:161) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.240", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0443" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.242.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.242.json index e62205e70..33a5bc91a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.242.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.242.json @@ -16,5 +16,6 @@ "description": "SQL Server Analysis (TCP:2382) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.242", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0440" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.244.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.244.json index 51b7f29d3..4c98204bb 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.244.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.244.json @@ -16,5 +16,6 @@ "description": "SQL Server Analysis (TCP:2383) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.244", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0437" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.246.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.246.json index e74758b1e..d063cc1ae 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.246.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.246.json @@ -16,5 +16,6 @@ "description": "SaltStack Master (TCP:4505) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.246", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0434" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.248.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.248.json index cfa3e0284..1a226f959 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.248.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.248.json @@ -16,5 +16,6 @@ "description": "SaltStack Master (TCP:4506) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.248", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0431" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.250.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.250.json index eba93ad7a..1d4591f0e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.250.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.250.json @@ -16,5 +16,6 @@ "description": "Telnet (TCP:23) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.250", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0428" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.252.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.252.json index ca06b637f..b5375a8bb 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.252.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.252.json @@ -16,5 +16,6 @@ "description": "VNC Listener (TCP:5500) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.252", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0425" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.254.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.254.json index d4916cd70..dfeebb209 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.254.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.254.json @@ -16,5 +16,6 @@ "description": "VNC Server (TCP:5900) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.254", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0422" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.39.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.39.json index 082672947..534049bee 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.39.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.39.json @@ -16,5 +16,6 @@ "description": "CIFS / SMB (TCP:3020) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.39", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0270" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.41.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.41.json index e4d46e4cf..cf636f178 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.41.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.41.json @@ -16,5 +16,6 @@ "description": "Cassandra (TCP:7001) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.41", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0273" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.43.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.43.json index 370406d89..067d44941 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.43.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.43.json @@ -16,5 +16,6 @@ "description": "Cassandra OpsCenter (TCP:61621) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.43", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0276" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.45.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.45.json index 1e1a89af6..93d5aaf3f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.45.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.45.json @@ -16,5 +16,6 @@ "description": "DNS (UDP:53) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.45", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0535" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.47.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.47.json index f1641cda1..2828a2cba 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.47.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.47.json @@ -16,5 +16,6 @@ "description": "Hadoop Name Node (TCP:9000) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.47", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0532" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.49.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.49.json index 5beae42e9..9191b10bd 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.49.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.49.json @@ -16,5 +16,6 @@ "description": " Known internal web port (TCP:8000) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.49", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0529" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.51.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.51.json index 0fb238f67..fd2e9f0bf 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.51.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.51.json @@ -16,5 +16,6 @@ "description": " Known internal web port (TCP:8080) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.51", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0526" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.53.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.53.json index 08fefea00..d5c38bc55 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.53.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.53.json @@ -16,5 +16,6 @@ "description": "LDAP SSL (TCP:636) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.53", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0523" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.55.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.55.json index 198f7ce83..5d7980ba7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.55.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.55.json @@ -16,5 +16,6 @@ "description": "MSSQL Admin (TCP:1434) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.55", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0520" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.57.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.57.json index 3e76c98bc..2e9ecc119 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.57.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.57.json @@ -16,5 +16,6 @@ "description": "MSSQL Browser (UDP:1434) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.57", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0520" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.59.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.59.json index 43108e2ba..fd613332f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.59.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.59.json @@ -16,5 +16,6 @@ "description": "MSSQL Debugger (TCP:135) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.59", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0514" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.61.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.61.json index 902d2419b..424dd8a1f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.61.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.61.json @@ -16,5 +16,6 @@ "description": "MSSQL Server (TCP:1433) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.61", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0511" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.63.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.63.json index 57521e5d1..9c5e633df 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.63.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.63.json @@ -16,5 +16,6 @@ "description": "Memcached SSL (TCP:11214) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.63", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0508" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.65.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.65.json index cd1527279..17071f482 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.65.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.65.json @@ -16,5 +16,6 @@ "description": "Memcached SSL (TCP:11215) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.65", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0505" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.67.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.67.json index 1f851e428..82a0fa645 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.67.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.67.json @@ -16,5 +16,6 @@ "description": "Memcached SSL (UDP:11214) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.67", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0508" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.69.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.69.json index c7b60fb5c..0ee849298 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.69.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.69.json @@ -16,5 +16,6 @@ "description": "Memcached SSL (UDP:11215) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.69", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0505" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.71.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.71.json index dd62311c8..e1c7e554d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.71.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.71.json @@ -16,5 +16,6 @@ "description": "Microsoft-DS (TCP:445) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.71", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0496" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.73.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.73.json index a2c564df1..f46af6f96 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.73.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.73.json @@ -16,5 +16,6 @@ "description": "Mongo Web Portal (TCP:27018) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.73", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0493" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.75.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.75.json index bb8f1f361..29eb7ed36 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.75.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.75.json @@ -16,5 +16,6 @@ "description": "MySQL (TCP:3306) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.75", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0490" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.77.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.77.json index 7db9c4335..86d44af35 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.77.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.77.json @@ -16,5 +16,6 @@ "description": "NetBIOS Name Service (TCP:137) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.77", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0487" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.79.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.79.json index 4b3c12a57..02ac67303 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.79.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.79.json @@ -16,5 +16,6 @@ "description": "NetBIOS Name Service (UDP:137) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.79", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0487" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.81.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.81.json index f48089d73..24221659c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.81.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.81.json @@ -16,5 +16,6 @@ "description": "NetBIOS Datagram Service (TCP:138) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.81", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0481" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.83.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.83.json index e4ccddcc6..4f639a77a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.83.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.83.json @@ -16,5 +16,6 @@ "description": "NetBIOS Datagram Service (UDP:138) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.83", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0481" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.85.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.85.json index dec6b5bef..cf34db29e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.85.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.85.json @@ -16,5 +16,6 @@ "description": "NetBIOS Session Service (TCP:139) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.85", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0475" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.87.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.87.json index 88fdd11b1..79c0bbf29 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.87.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.87.json @@ -16,5 +16,6 @@ "description": "NetBIOS Session Service (UDP:139) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.87", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0475" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.89.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.89.json index 5cad64e24..9dad3e0f5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.89.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.89.json @@ -16,5 +16,6 @@ "description": "Oracle DB SSL (TCP:2484) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.89", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0469" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.91.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.91.json index 1767f4e53..b9389863b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.91.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.91.json @@ -16,5 +16,6 @@ "description": "Oracle DB SSL (UDP:2484) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.91", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0469" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.93.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.93.json index f0776b4ea..a4507326b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.93.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.93.json @@ -16,5 +16,6 @@ "description": "POP3 (TCP:110) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.93", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0463" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.95.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.95.json index ce13a0a79..3da9ee780 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.95.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.95.json @@ -16,5 +16,6 @@ "description": "PostgreSQL (TCP:5432) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.95", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0460" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.97.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.97.json index 01b5466b8..335366a00 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.97.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.97.json @@ -16,5 +16,6 @@ "description": "PostgreSQL (UDP:5432) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.97", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0460" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.99.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.99.json index 57d486755..afc1a20e9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.99.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.99.json @@ -16,5 +16,6 @@ "description": "Prevalent known internal port (TCP:3000) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.99", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0454" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.11.json b/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.11.json index 465ee7616..221cbab74 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.11.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.11.json @@ -10,5 +10,6 @@ "description": "Enable Network Watcher for Azure subscriptions. Network diagnostic and visualization tools available with Network Watcher help users understand, diagnose, and gain insights to the network in Azure.", "reference_id": "accurics.azure.NS.11", "category": "Logging and Monitoring", - "version": 1 + "version": 1, + "id": "AC_AZURE_0418" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.151.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.151.json index ab9e8d24b..bb9f8dcc2 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.151.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.151.json @@ -10,5 +10,6 @@ "description": "Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.151", "category": "Logging and Monitoring", - "version": 2 + "version": 2, + "id": "AC_AZURE_0414" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.152.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.152.json index cbad5f973..175459365 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.152.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.152.json @@ -10,5 +10,6 @@ "description": "Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.152", "category": "Logging and Monitoring", - "version": 2 + "version": 2, + "id": "AC_AZURE_0413" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.153.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.153.json index de86e39e6..26db9c360 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.153.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.153.json @@ -10,5 +10,6 @@ "description": "Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.153", "category": "Logging and Monitoring", - "version": 2 + "version": 2, + "id": "AC_AZURE_0412" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.154.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.154.json index 0e042f33d..b5b485400 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.154.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.154.json @@ -10,5 +10,6 @@ "description": "Ensure server parameter 'log_duration' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.154", "category": "Logging and Monitoring", - "version": 2 + "version": 2, + "id": "AC_AZURE_0411" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.364.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.364.json index 5a55d5c14..40f492785 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.364.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.364.json @@ -8,5 +8,6 @@ "description": "Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.364", "category": "Logging and Monitoring", - "version": 1 + "version": 1, + "id": "AC_AZURE_0409" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.BDR.163.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.BDR.163.json index 43b41d8f5..1bf81c572 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.BDR.163.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.BDR.163.json @@ -6,9 +6,10 @@ "template_args": { "prefix": "reme_" }, - "severity": "HIGH", + "severity": "MEDIUM", "description": "Ensure that Geo Redundant Backups is enabled on PostgreSQL", "reference_id": "accurics.azure.BDR.163", "category": "Resilience", - "version": 2 + "version": 2, + "id": "AC_AZURE_0407" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.EKM.1.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.EKM.1.json index 16542fdb3..c47c1563d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.EKM.1.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.EKM.1.json @@ -10,5 +10,6 @@ "description": "Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server", "reference_id": "accurics.azure.EKM.1", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0408" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.EKM.23.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.EKM.23.json index 681a92657..96f2cbbc0 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.EKM.23.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.EKM.23.json @@ -10,5 +10,6 @@ "description": "Ensure that the Redis Cache accepts only SSL connections", "reference_id": "accurics.azure.EKM.23", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0394" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.13.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.13.json index ad8778f47..24231861c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.13.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.13.json @@ -10,5 +10,6 @@ "description": "Ensure that Redis is updated regularly with security and operational updates.\n\nNote this feature is only available to Premium tier Redis Caches.", "reference_id": "accurics.azure.NS.13", "category": "Security Best Practices", - "version": 2 + "version": 2, + "id": "AC_AZURE_0393" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.166.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.166.json index 26fc71cb7..5ebe7521e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.166.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.166.json @@ -10,5 +10,6 @@ "description": "Ensure there are no firewall rules allowing Redis Cache access for a large number of source IPs", "reference_id": "accurics.azure.NS.166", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0390" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.30.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.30.json index e752a4266..93feb62f4 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.30.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.30.json @@ -12,5 +12,6 @@ "description": "Ensure there are no firewall rules allowing unrestricted access to Redis from the Internet", "reference_id": "accurics.azure.NS.30", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0392" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.31.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.31.json index 9e3e54db4..2cf4b24c1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.31.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.31.json @@ -12,5 +12,6 @@ "description": "Ensure there are no firewall rules allowing unrestricted access to Redis from other Azure sources", "reference_id": "accurics.azure.NS.31", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0391" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_resource_group/accurics.azure.NS.272.json b/pkg/policies/opa/rego/azure/azurerm_resource_group/accurics.azure.NS.272.json index e45569ff6..3b11a08f2 100755 --- a/pkg/policies/opa/rego/azure/azurerm_resource_group/accurics.azure.NS.272.json +++ b/pkg/policies/opa/rego/azure/azurerm_resource_group/accurics.azure.NS.272.json @@ -10,5 +10,6 @@ "description": "Ensure that Azure Resource Group has resource lock enabled", "reference_id": "accurics.azure.NS.272", "category": "Identity and Access Management", - "version": 2 + "version": 2, + "id": "AC_AZURE_0389" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_role_assignment/accurics.azure.IAM.388.json b/pkg/policies/opa/rego/azure/azurerm_role_assignment/accurics.azure.IAM.388.json index 27537ed3d..f9dee9d4f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_role_assignment/accurics.azure.IAM.388.json +++ b/pkg/policies/opa/rego/azure/azurerm_role_assignment/accurics.azure.IAM.388.json @@ -10,5 +10,6 @@ "description": "Ensure that there are no guest users", "reference_id": "accurics.azure.IAM.388", "category": "Identity and Access Management", - "version": 1 + "version": 1, + "id": "AC_AZURE_0388" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_security_center_subscription_pricing/accurics.azure.OPS.349.json b/pkg/policies/opa/rego/azure/azurerm_security_center_subscription_pricing/accurics.azure.OPS.349.json index 070527381..738646aa9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_security_center_subscription_pricing/accurics.azure.OPS.349.json +++ b/pkg/policies/opa/rego/azure/azurerm_security_center_subscription_pricing/accurics.azure.OPS.349.json @@ -10,5 +10,6 @@ "description": "Ensure that standard pricing tiers are selected", "reference_id": "accurics.azure.OPS.349", "category": "Security Best Practices", - "version": 1 + "version": 1, + "id": "AC_AZURE_0385" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_active_directory_administrator/accurics.azure.IAM.137.json b/pkg/policies/opa/rego/azure/azurerm_sql_active_directory_administrator/accurics.azure.IAM.137.json index f61584f89..b9648ff01 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_active_directory_administrator/accurics.azure.IAM.137.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_active_directory_administrator/accurics.azure.IAM.137.json @@ -10,5 +10,6 @@ "description": "Avoid using names like 'Admin' for an Azure SQL Server Active Directory Administrator account", "reference_id": "accurics.azure.IAM.137", "category": "Compliance Validation", - "version": 2 + "version": 2, + "id": "AC_AZURE_0384" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_database/accurics.azure.MON.157.json b/pkg/policies/opa/rego/azure/azurerm_sql_database/accurics.azure.MON.157.json index 65470c0e2..fbd39c0c6 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_database/accurics.azure.MON.157.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_database/accurics.azure.MON.157.json @@ -10,5 +10,6 @@ "description": "Ensure that 'Threat Detection' is enabled for Azure SQL Database", "reference_id": "accurics.azure.MON.157", "category": "Logging and Monitoring", - "version": 2 + "version": 2, + "id": "AC_AZURE_0383" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.169.json b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.169.json index ccece51b5..cb86f62e1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.169.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.169.json @@ -10,5 +10,6 @@ "description": "Restrict Azure SQL Server accessibility to a minimal address range", "reference_id": "accurics.azure.NS.169", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0280" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.21.json b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.21.json index 446ff5735..106fff2c3 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.21.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.21.json @@ -8,9 +8,10 @@ "name": "sqlIngressAccess", "prefix": "reme_" }, - "severity": "HIGH", + "severity": "MEDIUM", "description": "Ensure that no SQL Server allows ingress from 0.0.0.0/0 (ANY IP)", "reference_id": "accurics.azure.NS.21", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0380" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.5.json b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.5.json index c053cf9d7..096e47bf8 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.5.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.5.json @@ -12,5 +12,6 @@ "description": "Ensure entire Azure infrastructure doesn't have access to Azure SQL ServerEnsure entire Azure infrastructure doesn't have access to Azure SQL Server", "reference_id": "accurics.azure.NS.5", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0381" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.10.json b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.10.json index b14f18764..e34bd6b00 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.10.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.10.json @@ -10,5 +10,6 @@ "description": "Ensure that Azure Active Directory Admin is configured for SQL Server", "reference_id": "accurics.azure.IAM.10", "category": "Identity and Access Management", - "version": 2 + "version": 2, + "id": "AC_AZURE_0378" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.138.json b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.138.json index 8e8eafb17..59650ec3b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.138.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.138.json @@ -10,5 +10,6 @@ "description": "Avoid using names like 'Admin' for an Azure SQL Server admin account login", "reference_id": "accurics.azure.IAM.138", "category": "Compliance Validation", - "version": 2 + "version": 2, + "id": "AC_AZURE_0377" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.LOG.356.json b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.LOG.356.json index 638949b56..98d30f59b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.LOG.356.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.LOG.356.json @@ -4,9 +4,10 @@ "policy_type": "azure", "resource_type": "azurerm_sql_server", "template_args": null, - "severity": "MEDIUM", + "severity": "LOW", "description": "Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers.", "reference_id": "accurics.azure.LOG.356", "category": "Compliance Validation", - "version": 1 + "version": 1, + "id": "AC_AZURE_0375" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.MON.354.json b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.MON.354.json index bba7b806a..f4313a215 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.MON.354.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.MON.354.json @@ -8,5 +8,6 @@ "description": "Ensure that 'Auditing' is set to 'On' for SQL servers", "reference_id": "accurics.azure.MON.354", "category": "Logging and Monitoring", - "version": 1 + "version": 1, + "id": "AC_AZURE_0376" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.EKM.7.json b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.EKM.7.json index 8225358c0..79e5787dd 100755 --- a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.EKM.7.json +++ b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.EKM.7.json @@ -10,5 +10,6 @@ "description": "Ensure that 'Secure transfer required' is enabled for Storage Accounts", "reference_id": "accurics.azure.EKM.7", "category": "Data Protection", - "version": 2 + "version": 2, + "id": "AC_AZURE_0373" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.2.json b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.2.json index 29ded9c91..8c0bb6d02 100755 --- a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.2.json +++ b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.2.json @@ -10,5 +10,6 @@ "description": "Ensure 'Trusted Microsoft Services' is enabled for Storage Account access", "reference_id": "accurics.azure.NS.2", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0371" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.4.json b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.4.json index c72b1838f..bac58bdce 100755 --- a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.4.json +++ b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.4.json @@ -10,5 +10,6 @@ "description": "Ensure default network access rule for Storage Accounts is not open to public", "reference_id": "accurics.azure.NS.4", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0370" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_storage_container/accurics.azure.IAM.368.json b/pkg/policies/opa/rego/azure/azurerm_storage_container/accurics.azure.IAM.368.json index 471d58d70..6512e4235 100755 --- a/pkg/policies/opa/rego/azure/azurerm_storage_container/accurics.azure.IAM.368.json +++ b/pkg/policies/opa/rego/azure/azurerm_storage_container/accurics.azure.IAM.368.json @@ -10,5 +10,6 @@ "description": "Anonymous, public read access to a container and its blobs can be enabled in Azure Blob storage. This is only recommended if absolutely necessary.", "reference_id": "accurics.azure.IAM.368", "category": "Identity and Access Management", - "version": 1 + "version": 1, + "id": "AC_AZURE_0366" } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_virtual_network/accurics.azure.NS.161.json b/pkg/policies/opa/rego/azure/azurerm_virtual_network/accurics.azure.NS.161.json index b6a705711..0feecf54e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_virtual_network/accurics.azure.NS.161.json +++ b/pkg/policies/opa/rego/azure/azurerm_virtual_network/accurics.azure.NS.161.json @@ -10,5 +10,6 @@ "description": "Ensure that Azure Virtual Network subnet is configured with a Network Security Group", "reference_id": "accurics.azure.NS.161", "category": "Infrastructure Security", - "version": 2 + "version": 2, + "id": "AC_AZURE_0356" } \ No newline at end of file