Skip to content

Alibaba Cloud

TypeResourceRule NameStatus
calculationcloud server ECSECS high-risk Port open
ECS opens port 22 to the public network
The entire ECS network is open
ECS outbound traffic is fully connected
Storageobject Storage OSSOSS enabled public read/write
OSS bucket allows anonymous operations
The bucket permission is set to public-read.
The bucket permission is set to public-read-write.
OSS does not configure network policy risk
OSS access to any VPC
OSS anti-theft chain settings include *
OSS cross-domain origin configuration includes *
OSS manifest file leakage risk
File storage NASpublic network exposure risk of file store NAS
NFS ACL whitelist not enabled
SMB ACL whitelist not enabled
Databaseapsaradb for RDSthe instance port is open to the entire network.
Cloud Native database PolarDBthe polardb port is open across the network (or the ACL setting is improper)
Cloud Database oceanbaseOceanBase is open to the whole network
Apsaradb for mongodbMongoDB is open to the entire network.
HBase cloud databasecloud Database HBase public network exposure risk
Cloud Database ClickHousecloud Database ClickHouse public network exposure risk
Cloud Database ClickHousecloud Database ClickHouse set public network ACL network segment range is too large
Cloud native data warehouse AnalyticDB PostgreSQLthe cloud-native data warehouse AnalyticDB PostgreSQL is open to the public network.
Redisenable public proxy for the instance
Instance ports are open across the network
The instance does not have audit logs enabled
Cloud-native multimodal database Lindormcloud-native multimode database Lindorm public network exposure risk
Middlewarecloud message queue for Kafkaopen access to the public network for kafka instances
Message Queue RocketMQ version 5.0message Queuing RocketMQ public network exposure risk
The microservice engine MSEmicroservice engine MSE public network exposure risk🚧(TBD)
Containercontainer mirroring service ACRinstance public network exposure risk
Container Service ACKIngressNightmare
Securitycloud Security Center (sas)cloud security center is not installed on the ECS instance
Cloud Firewallcloud Firewall does not set the default non-network policy.
There are assets not covered by Firewall🚧(TBD)
access control RAMUser AK not used for more than one year
AK exists under the sub-account that can be logged on to the console.
Enable AccessKey for the primary account
Login risk of sub-account control account
RAM user permissions are too large
RAM roles are authorized to external accounts
RAM role is authorized to ECS
Digital Certificate Management Service (formerly SSL Certificate)SSL Certificate purchased on the cloud expires or is about to expire
Private network VPCpublic network exposure of the security group
Inappropriate security group settings
Load balancing SLBthe SLB non-standard port is open across the network or the ACL is set improperly.
Applied load balancing ALBopen ALB port without ACL configuration, directly open to the public network
Network-based load balancing NLBNLB high-risk Port exposure
Big Data Computingsearch analysis service Elasticsearch versionthe Elasticsearch port is open across the network (or the ACL setting is improper)
The kibana instance is open for public access.
Cloud Native big data computing service MaxComputeno whitelist protection risk for MaxCompute projects

Released under the Apache 2.0 License.