Skip to main content

Naver Cloud



CategoryResourceOptionItemDescriptionRisk LevelISO27001CSAPISMS-PStability Assessment
ComputeLaunch ConfigurationIs Encrypted VolumeEncryptionDisable block storage encryption
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ComputeServerIs Encrypted Base Block Storage VolumeEncryptionDisable block storage encryption
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
ContainerKubernetes ClusterEnable Audit LogLogging MonitoringDisable audit logging
MEDIUM
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
ContainerKubernetes ClusterEnable Public Subnet NetworkAccess ControlAllow public network access
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
DatabaseMongodbBackup File Retention PeriodData ProtectionShort log retention period
MEDIUM
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
DatabaseMssqlBackup File Retention PeriodData ProtectionShort log retention period
MEDIUM
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
DatabaseMysqlEnable BackupData ProtectionDisable backup
MEDIUM
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
DatabaseMysqlBackup File Retention PeriodData ProtectionShort log retention period
MEDIUM
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
DatabaseMysqlEnable High Availability, Is Storage EncryptionEncryptionDisable storage encryption
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
DatabaseRedisEnable BackupData ProtectionDisable backup
MEDIUM
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
DatabaseRedisBackup File Retention PeriodData ProtectionShort log retention period
MEDIUM
8.1 Operational planning and control6.2.2. Redundancy and Backup2.9 System and Service Operation Management5.2.1 Service Availability
NetworkingAccess Control GroupAcg DescriptionLogging MonitoringAbsence of description
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
NetworkingAccess Control GroupInbound Rule > DescriptionLogging MonitoringAbsence of description
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
NetworkingAccess Control GroupOutbound Rule > DescriptionLogging MonitoringAbsence of description
CRITICAL
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
NetworkingAccess Control GroupInbound Rule > Ip BlockAccess ControlSet CIDR full range
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingAccess Control GroupInbound Rule > Ip Block, Inbound Rule > Port RangeAccess ControlFTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingAccess Control GroupInbound Rule > Ip Block, Inbound Rule > Port RangeAccess ControlSSH Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingAccess Control GroupInbound Rule > Ip Block, Inbound Rule > Port RangeAccess ControlHTTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingAccess Control GroupInbound Rule > Ip Block, Inbound Rule > Port RangeAccess ControlRDP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingAccess Control GroupOutbound Rule > Ip BlockAccess ControlSet CIDR full range
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingLoad BalancerNetwork TypeAccess ControlUse public network
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingLoad BalancerListener > Tls Min Version TypeEncryptionUse of Weak TLS Versions
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
NetworkingLoad BalancerListener > ProtocolAccess ControlUsing Unencrypted HTTP Protocol
CRITICAL
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
NetworkingNetwork AclNacl DescriptionLogging MonitoringAbsence of description
LOW
9.1 Monitoring, measurement, analysis and evaluation7.2.2 Audit Records and Monitoring2.11 Incident Prevention and Response1.4.1 Security Audit
NetworkingNetwork AclInbound Rule > Ip BlockAccess ControlSet CIDR full range
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingNetwork AclInbound Rule > Port RangeAccess ControlSet port full range
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingNetwork AclInbound Rule > Ip Block, Inbound Rule > Action, Inbound Rule > Port RangeAccess ControlFTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingNetwork AclInbound Rule > Ip Block, Inbound Rule > Action, Inbound Rule > Port RangeAccess ControlSSH Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingNetwork AclInbound Rule > Ip Block, Inbound Rule > Action, Inbound Rule > Port RangeAccess ControlHTTP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingNetwork AclInbound Rule > Ip Block, Inbound Rule > Action, Inbound Rule > Port RangeAccess ControlRDP Access Allowed from the Internet
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingNetwork AclOutbound Rule > Ip BlockAccess ControlSet CIDR full range
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingPublic IpTarget Server NameAccess ControlPublic IP exists
CRITICAL
8.1 Operational planning and control10.1.1. Access Control Policy Establishment2.6 Access Control7.1.1 Access Control Policy
NetworkingTarget GroupProtocolAccess ControlUse unencrypted HTTP protocol
CRITICAL
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption
StorageNas VolumeIs EncryptedEncryptionDisable encryption
HIGH
8.1 Operational planning and control12.3.1. Encryption Policy Establishment2.7 Cryptography Application10.2.1 Encryption