Skip to main content

Aliyun Rules

Total rules: 317

Rules by Severity

High Severity (98 Rules)

Rule IDNameDescription
ack-cluster-node-multi-zoneACK Cluster Multi-Zone DeploymentThe ACK cluster nodes should be distributed across 3 or more availability zones for high availability.
ack-cluster-public-endpoint-checkACK Cluster Public Endpoint CheckACK clusters should not have a public endpoint set, or the associated SLB listener should have ACL enabled.
acs-cluster-node-multi-zoneACS Cluster Node Multi-Zone DeploymentThe ACS cluster nodes should be distributed across 3 or more availability zones for high availability.
actiontrail-enabledActionTrail EnabledEnsures ActionTrail is enabled to record account activities.
actiontrail-trail-intact-enabledActionTrail Trail Intact EnabledActionTrail trail should be enabled and track all event types (Read and Write).
alb-acl-public-access-checkALB ACL Does Not Allow Public AccessEnsures that ALB access control lists do not contain 0.0.0.0/0 (allowing all IPs).
alb-all-listener-health-check-enabledALB All Listeners Health Check EnabledEnsures all ALB listeners have health checks enabled.
alb-delete-protection-enabledALB Instance Deletion Protection EnabledEnsures that ALB instances have deletion protection enabled.
alb-instance-multi-zoneALB Instance Multi-Zone DeploymentALB instances should be deployed across multiple availability zones for high availability. If only one zone is selected, a zone failure will affect the ALB instance and business stability.
alb-instance-waf-enabledALB Instance Has WAF ProtectionEnsures that ALB instances have WAF3 (Web Application Firewall) protection enabled.
alb-server-group-multi-serverALB Server Group Has Multiple ServersEnsures that ALB server groups contain at least two backend servers for high availability.
alidns-route-53-mx-checkDNS MX Record Has Valid SPF in Associated TXT RecordEnsures that MX records have associated TXT records with valid SPF values for email validation.
api-gateway-group-force-httpsAPI Gateway Group Force HTTPSEnsures API Gateway groups with public custom domains have HTTPS force redirect enabled.
bastionhost-instance-expired-checkBastionHost Instance Expiration CheckPrepaid BastionHost instances should have auto-renewal enabled.
cdn-domain-multiple-origin-serversCDN Domain Multiple Origin ServersCDN domains should be configured with multiple origin servers for high availability and fault tolerance.
cr-instance-any-ip-access-checkCR Instance No Any IP AccessEnsures Container Registry instances do not have any IP (0.0.0.0/0) in their whitelist.
cr-repository-image-scanning-enabledCR Instance Image Scanning EnabledEnsures Container Registry instances have image scanning enabled for security vulnerability detection.
cr-repository-type-privateCR Repository Type PrivateEnsures that CR repositories are set to PRIVATE.
dcdn-domain-multiple-origin-serversDCDN Domain Multiple Origin ServersDCDN domains should be configured with multiple origin servers for high availability and fault tolerance.
eci-containergroup-environment-no-specified-keysECI Container Group Does Not Contain Sensitive Environment VariablesEnsures that ECI container groups do not have sensitive environment variables like passwords or access keys.
ecs-available-disk-encryptedECS Disk Encryption EnabledEnsures that all ECS disks are encrypted.
ecs-instance-attached-security-groupECS Instance Attached Security GroupIf the ECS instance is included in the specified security group, the configuration is considered compliant.
ecs-instance-deletion-protection-enabledECS Instance Deletion Protection EnabledEnsures that ECS instances have deletion protection enabled.
ecs-instance-enabled-security-protectionECS Instance Enabled Security ProtectionEnsures that ECS instances have security enhancement strategy enabled.
ecs-instance-expired-checkECS Prepaid Instance Expiration CheckPrepaid instances should have auto-renewal enabled to avoid service interruption due to expiration.
ecs-instance-no-public-ipECS instance should not bind public IPECS instances should not directly bind IPv4 public IP or Elastic IP, considered compliant.
ecs-launch-template-version-attach-security-groupECS launch template version attaches security groupsECS launch template versions have security groups configured for instances, considered compliant.
ecs-running-instance-no-public-ipECS Instance No Public IPECS instances should not have a public IP address to reduce direct internet exposure.
ecs-security-group-egress-not-all-accessSecurity Group Egress Not Set to All AccessSecurity group egress direction should not be set to allow all access (all protocols, all ports, all destinations).
ecs-security-group-not-internet-cidr-accessSecurity Group Ingress Source IP Not Include Public IPSecurity group ingress rules with accept policy should not have source IP containing public internet IPs.
ecs-security-group-not-open-all-portSecurity Group Ingress Not Open All PortsSecurity group ingress rules should not allow all ports. When the port range is not set to -1/-1, it is considered compliant.
ecs-security-group-not-open-all-protocolSecurity Group Ingress Not Open All ProtocolsSecurity group ingress rules should not allow all protocols. When the protocol type is not set to ALL, it is considered compliant.
ecs-security-group-risky-ports-check-with-protocolSecurity Group Risky Ports Check with ProtocolWhen security group ingress source is set to 0.0.0.0/0, the port range should not include risky ports (22, 3389) for specified protocols (TCP/UDP), to reduce the risk of brute force attacks.
ecs-security-group-white-list-port-checkSecurity Group Non-Whitelist Port Ingress CheckExcept for whitelisted ports (80), other ports should not have ingress rules allowing access from 0.0.0.0/0.
elasticsearch-instance-enabled-kibana-public-checkElasticsearch Instance Kibana Does Not Enable Public AccessEnsures that Elasticsearch instance Kibana is not accessible from public networks.
elasticsearch-instance-enabled-public-checkElasticsearch Instance Does Not Enable Public AccessEnsures that Elasticsearch instances are not accessible from public networks.
elasticsearch-instance-node-not-use-specified-specElasticsearch Instance Does Not Use Deprecated SpecEnsures that Elasticsearch instances do not use deprecated or unsupported node specifications.
elasticsearch-instance-version-not-deprecatedElasticsearch Instance Does Not Use Deprecated VersionEnsures that Elasticsearch instances are not using deprecated or EOL versions.
elasticsearch-public-and-any-ip-access-checkElasticsearch Public and Any IP Access CheckEnsures that Elasticsearch instances do not have public access enabled or an open whitelist.
ess-scaling-configuration-data-disk-encryptedESS Scaling Configuration Data Disk EncryptionESS scaling configurations should enable data disk encryption to protect data at rest.
ess-scaling-configuration-sg-public-accessESS Scaling Configuration Security Group Public AccessESS scaling configuration security groups should not allow access from 0.0.0.0/0 to prevent unauthorized access.
ess-scaling-configuration-system-disk-encryptedESS Scaling Configuration System Disk EncryptionESS scaling configurations should enable system disk encryption to protect system data at rest.
fc-function-runtime-checkFC Function Runtime CheckFC functions should not use deprecated runtimes that may have security vulnerabilities.
fc-trigger-http-not-anonymousFC HTTP Trigger Authentication CheckFC HTTP triggers should require authentication to prevent unauthorized access.
gpdb-instance-disk-encryption-enabledGPDB Disk Encryption EnabledEnsures GPDB instances have disk encryption enabled.
hbase-cluster-expired-checkHBase Cluster Expiration CheckPrepaid HBase clusters should have auto-renewal enabled.
hbase-cluster-ha-checkHBase Cluster HA EnabledEnsures HBase clusters are configured for High Availability (HA).
kafka-instance-disk-encryptedKafka Instance Disk EncryptedKafka instance should have disk encryption enabled during deployment for data protection.
kafka-instance-public-access-checkKafka Public Access DisabledEnsures Kafka instances do not have public network access.
maxcompute-project-encryption-enabledMaxCompute Project Encryption EnabledEnsures MaxCompute projects have encryption enabled to protect stored data.
maxcompute-project-ip-whitelist-enabledMaxCompute Project IP Whitelist EnabledEnsures MaxCompute projects have an IP whitelist configured to restrict access.
mongodb-cluster-expired-checkMongoDB Instance Expiration CheckPrepaid MongoDB instances should have auto-renewal enabled.
mongodb-instance-class-not-sharedMongoDB Instance Uses Dedicated ClassEnsures MongoDB instances use dedicated or exclusive instance classes, not shared instances.
mongodb-min-maxconnections-limitMongoDB Meets Minimum Connection RequirementsEnsures MongoDB instances provide at least the minimum required number of connections.
mongodb-min-maxiops-limitMongoDB Meets Minimum IOPS RequirementsEnsures MongoDB instances provide at least the minimum required IOPS.
mongodb-public-access-checkMongoDB Whitelist Internet RestrictionEnsures MongoDB security IP whitelists do not contain 0.0.0.0/0.
mongodb-public-and-any-ip-access-checkMongoDB Public and Any IP Access CheckEnsures that MongoDB instances do not have an open whitelist (0.0.0.0/0).
mse-cluster-architecture-checkMSE Cluster Has Multiple NodesEnsures that MSE (Microservice Engine) clusters have more than 3 nodes for high availability.
mse-cluster-internet-checkMSE Cluster Has No Public Internet AccessEnsures that MSE clusters do not have public internet access enabled.
mse-gateway-architecture-checkMSE Gateway Has Multiple NodesEnsures that MSE (Microservice Engine) gateways have more than 1 node for high availability.
nas-access-group-public-access-checkNAS Access Group IP RestrictionEnsures NAS access rules do not allow 0.0.0.0/0.
nat-risk-ports-checkNAT Gateway Risk Ports CheckNAT gateway DNAT mappings should not expose risky ports to the internet to prevent security vulnerabilities.
oss-bucket-anonymous-prohibitedOSS Bucket Anonymous Access ProhibitedEnsures that anonymous access is prohibited for the OSS bucket.
oss-bucket-only-https-enabledOSS Bucket Only HTTPS EnabledOSS bucket should have a policy that denies non-HTTPS requests to ensure data transport security.
oss-bucket-policy-no-any-anonymousOSS bucket policy does not grant permissions to anonymous usersOSS bucket policy does not grant any read or write permissions to anonymous users.
oss-bucket-policy-outside-organization-checkOSS Bucket Policy No Outside Organization AccessEnsures OSS bucket policies do not grant access to principals outside of the organization.
oss-bucket-public-read-prohibitedOSS Bucket Public Read ProhibitedOSS buckets should not allow public read access unless specifically required. Public read access allows anyone to access and download objects in the bucket.
oss-bucket-public-write-prohibitedOSS Bucket Public Write ProhibitedOSS buckets should not allow public write access. Public write access allows anyone to upload, modify, or delete objects in the bucket, which poses significant security risks.
oss-bucket-server-side-encryption-enabledOSS Bucket Server-Side Encryption EnabledOSS buckets should have server-side encryption enabled to protect data at rest. Server-side encryption uses KMS or AES256 to encrypt data stored in OSS.
parameter-sensitive-noecho-checkSensitive Parameters Must Have NoEchoTemplate parameters that contain sensitive information (passwords, API keys, secrets) must be protected by either setting NoEcho to true or using valid AssociationProperty values to prevent them from being displayed in plain text.
polardb-cluster-enabled-tdePolarDB Cluster TDE EnabledEnsures PolarDB clusters have Transparent Data Encryption (TDE) enabled.
polardb-cluster-expired-checkPolarDB Cluster Expiration CheckPrepaid PolarDB clusters should have auto-renewal enabled.
polardb-public-access-checkPolarDB Public Access CheckEnsures PolarDB IP whitelist is not set to 0.0.0.0/0.
polardb-public-and-any-ip-access-checkPolarDB Public and Any IP Access CheckEnsures that PolarDB clusters do not have public endpoints and are not open to any IP address (0.0.0.0/0).
ram-policy-no-statements-with-admin-access-checkRAM Policy No Admin AccessEnsures custom RAM policies do not grant full AdministratorAccess.
ram-user-mfa-checkRAM User MFA EnabledRAM users with console access should have multi-factor authentication (MFA) enabled.
rds-instance-enabled-disk-encryptionRDS Instance Disk Encryption EnabledEnsures RDS instances have disk encryption enabled.
rds-instance-expired-checkRDS Prepaid Instance Expiration CheckPrepaid RDS instances should have auto-renewal enabled.
rds-public-access-checkRDS Instance Public Access CheckRDS instances should not be configured with public network addresses. Public access exposes databases to potential security threats from the internet.
rds-public-connection-and-any-ip-access-checkRDS Public Connection and Any IP Access CheckEnsures that RDS instances with public connections do not have a whitelist open to all IPs.
rds-white-list-internet-ip-access-checkRDS Whitelist Internet RestrictionEnsures RDS security IP whitelists do not contain 0.0.0.0/0.
redis-instance-expired-checkRedis Prepaid Instance Expiration CheckPrepaid Redis instances should have auto-renewal enabled.
redis-instance-no-public-ipRedis Instance No Public IPEnsures Redis instance does not have public IP assigned.
redis-instance-open-auth-modeRedis Authentication Mode EnabledEnsures Redis instances require authentication and are not in 'no-password' mode.
redis-public-and-any-ip-access-checkRedis Public and Any IP Access CheckEnsures that Redis instances do not have public access enabled or an open whitelist.
root-ak-checkRoot User AccessKey CheckEnsures that the root account does not have active AccessKeys.
root-mfa-checkRoot User MFA CheckEnsures that Multi-Factor Authentication (MFA) is enabled for the root account.
sg-public-access-checkSecurity Group Ingress ValidSecurity group ingress rules should not allow all ports (-1/-1) from all sources (0.0.0.0/0) simultaneously.
sg-risky-ports-checkSecurity group does not open risky ports to 0.0.0.0/0When security group ingress rule source is set to 0.0.0.0/0, the port range should not include specified risky ports, considered compliant. If source is not 0.0.0.0/0, it's compliant even if risky ports are included.
slb-acl-public-access-checkSLB ACL Public Access CheckEnsures that SLB ACLs do not contain 0.0.0.0/0 to prevent unrestricted public access.
slb-all-listener-health-check-enabledSLB All Listeners Health Check EnabledEnsures all SLB listeners have health checks enabled.
slb-all-listener-servers-multi-zoneSLB Multi-Zone with Multi-Zone Backend ServersSLB instances should be multi-zone, and all server groups used by listeners should have resources added from multiple zones.
slb-delete-protection-enabledSLB Instance Deletion Protection EnabledEnsures that SLB instances have deletion protection enabled.
slb-listener-risk-ports-checkSLB Listener Risk Ports CheckEnsures SLB listeners do not expose high-risk ports like 22 or 3389.
transit-router-vpc-attachment-multi-zoneTransit Router VPC Attachment Multi-Zone ConfigurationTransit Router VPC attachments should be configured with vSwitches in at least two different availability zones for cross-zone high availability.
tsdb-instance-security-ip-checkTSDB Instance Does Not Allow Any IP AccessEnsures that TSDB instances do not have security whitelists that allow all IPs.
use-waf-instance-for-security-protectionUse WAF for Security ProtectionWEB Application Firewall (WAF) should be used to protect websites and APPs from web-based attacks.
vpc-network-acl-risky-ports-checkVPC Network ACL Risky Ports CheckEnsures VPC Network ACLs do not allow unrestricted access to risky ports (22, 3389).

Medium Severity (179 Rules)

Rule IDNameDescription
ack-cluster-encryption-enabledACK Cluster Secret Encryption EnabledACK Pro clusters should have Secret encryption at rest enabled using KMS.
ack-cluster-inspect-kubelet-version-outdate-checkACK Kubelet Version CheckEnsures the Kubelet version in the ACK cluster is up to date.
ack-cluster-log-plugin-installedACK Cluster Log Plugin InstalledEnsures the log-service addon is installed in the ACK cluster.
ack-cluster-rrsa-enabledACK Cluster RRSA EnabledEnsures that the RAM Roles for Service Accounts (RRSA) feature is enabled for the ACK cluster.
ack-cluster-supported-versionACK Cluster Supported VersionEnsures that the ACK cluster is running a supported version.
ack-cluster-upgrade-latest-versionACK Cluster Upgraded to Latest VersionEnsures that the ACK cluster is running the latest available version.
adb-cluster-multi-zoneADB Cluster Multi-Zone DeploymentThe ADB cluster should be deployed in multi-zone mode.
alb-all-listenter-has-serverALB Listener Has Backend ServerEnsures all ALB listeners are associated with a non-empty server group.
alb-instance-bind-security-group-or-enabled-aclALB Instance Bind Security Group or Enable ACLALB instance should have security groups associated or ACL configured for all running listeners.
alb-server-group-multi-zoneALB Server Group Multi-Zone DistributionALB server groups should have backend servers distributed across multiple availability zones for high availability. This rule does not apply to server groups with no attached servers, or to IP/Function Compute type server groups.
alidns-domain-regex-matchAlibaba Cloud DNS Domain Names Match Naming ConventionEnsures that Alibaba Cloud DNS domain names match the specified naming convention regex.
api-gateway-api-auth-jwtAPI Gateway API Auth JWTEnsures API Gateway APIs use JWT authentication.
api-gateway-api-auth-requiredAPI Gateway API Auth RequiredEnsures API Gateway APIs have authentication configured.
api-gateway-api-internet-request-httpsAPI Gateway Internet Request HTTPS EnabledEnsures that API Gateway APIs exposed to the internet use HTTPS protocol.
api-gateway-api-visibility-privateAPI Gateway API Visibility PrivateEnsures API Gateway APIs are set to PRIVATE visibility.
api-gateway-group-bind-domainAPI Gateway Group Bind DomainEnsures API Gateway groups have custom domains bound.
api-gateway-group-enabled-sslAPI Gateway Group SSL EnabledEnsures that SSL is enabled for API Gateway groups.
api-gateway-group-https-policy-checkAPI Gateway Group HTTPS Policy CheckEnsures API Gateway groups have HTTPS security policy set correctly.
api-gateway-group-log-enabledAPI Gateway Group Log EnabledEnsures API Gateway groups have logging configured.
apigateway-instance-multi-zoneAPI Gateway Instance Multi-Zone DeploymentAPI Gateway instances should be deployed in multi-zone configuration for high availability.
bastionhost-instance-spec-checkBastionHost Instance Multi-Zone Spec CheckThe BastionHost instance should use the Enterprise version which supports multi-zone deployment.
cen-cross-region-bandwidth-checkCEN Cross-Region Bandwidth CheckCEN instance cross-region connections should have sufficient bandwidth allocation to meet performance requirements.
clickhouse-dbcluster-multi-zoneClickHouse DBCluster Multi-Zone DeploymentClickHouse clusters should use the HighAvailability (Double-replica) edition for multi-zone deployment. Note: This applies only to community edition.
cr-instance-multi-zoneCR Instance with Zone-Redundant OSS BucketContainer Registry instances should be associated with zone-redundant OSS buckets for high availability.
ecs-disk-all-encrypted-by-kmsECS disk with KMS encryption enabledECS disks (including system disk and data disks) are encrypted with KMS, considered compliant.
ecs-disk-encryptedECS data disk encryption enabledECS data disk has encryption enabled, considered compliant.
ecs-disk-in-useECS disk is in useECS disks are attached to an instance or in use state, considered compliant. Disks that are available or unattached may be idle resources.
ecs-disk-retain-auto-snapshotRetain auto snapshot when ECS disk is releasedConfigure ECS disks to retain auto snapshots when released, considered compliant. This helps protect data from accidental deletion.
ecs-in-use-disk-encryptedECS In-Use Disk EncryptionECS data disks should have encryption enabled to protect data at rest. Encrypted disks use KMS keys to encrypt data, ensuring data security and compliance with regulatory requirements.
ecs-instance-auto-renewal-enabledECS subscription instance has auto-renewal enabledECS subscription (prepaid) instances have auto-renewal enabled, considered compliant. Pay-as-you-go instances are not applicable.
ecs-instance-image-expired-checkECS Instance Image Expired CheckEnsures that the image used by the ECS instance has not expired.
ecs-instance-image-type-checkECS Instance Image Type CheckEnsures ECS instances use images from authorized sources.
ecs-instance-login-use-keypairECS Instance Login Using Key PairEnsures that ECS instances use key pairs for login instead of passwords.
ecs-instance-meta-data-mode-checkECS instance metadata access uses security-enhanced mode (IMDSv2)When accessing ECS instance metadata, security-enhanced mode (IMDSv2) is enforced, considered compliant. Instances associated with ACK clusters are not applicable.
ecs-instance-no-public-and-anyipECS Instance Should Not Bind Public IP or Allow Any IP AccessECS instances should not directly bind IPv4 public IPs or Elastic IPs, and associated security groups should not expose 0.0.0.0/0. Compliant when no public IP is bound.
ecs-instance-not-bind-key-pairECS Instance Not Bound to Key PairEnsures that ECS instances use key pairs for authentication instead of passwords.
ecs-instance-type-family-not-deprecatedECS Instance Type Not DeprecatedEnsures ECS instances do not use deprecated or legacy instance types.
ecs-instances-in-vpcECS Instances in VPCECS instances should be deployed in VPC (Virtual Private Cloud) networks rather than classic networks. VPC provides better network isolation, security, and flexibility.
ecs-internetmaxbandwidth-checkECS Internet Max Bandwidth CheckEnsures ECS internet outbound bandwidth does not exceed specified limits.
ecs-launch-template-network-type-checkECS launch template uses VPC network typeECS launch template versions have network type set to VPC, considered compliant. Classic network type is not recommended for production environments.
ecs-launch-template-version-data-disk-encryptedECS launch template version enables data disk encryptionAll data disks configured in ECS launch template versions are encrypted, considered compliant.
ecs-launch-template-version-image-type-checkLaunch Template Image Type CheckEnsures ECS launch templates use authorized image types.
ecs-running-instances-in-vpcRunning ECS instances are in VPCRunning ECS instances are deployed in Virtual Private Cloud (VPC), considered compliant. This provides network isolation and enhanced security.
ecs-snapshot-policy-timepoints-checkECS auto snapshot policy timepoints configured reasonablyThe snapshot creation timepoints in the auto snapshot policy are within the specified time range, considered compliant. Creating snapshots temporarily reduces block storage I/O performance, with performance differences generally within 10%, causing brief slowdowns. It is recommended to select timepoints that avoid business peak hours.
eip-delete-protection-enabledEIP Deletion Protection EnabledEnsures that EIP instances have deletion protection enabled.
elasticsearch-instance-enabled-data-node-encryptionElasticsearch Data Node Encryption EnabledEnsures that data nodes in the Elasticsearch instance have disk encryption enabled.
elasticsearch-instance-enabled-node-config-disk-encryptionES Node Config Disk EncryptionEnsures Elasticsearch elastic node configurations have disk encryption enabled.
elasticsearch-instance-multi-zoneElasticsearch Instance Multi-Zone DeploymentElasticsearch instances should be deployed across multiple availability zones.
emr-cluster-master-public-access-checkEMR Cluster Master Node Public Access CheckEMR on ECS cluster master nodes should not have public IP enabled.
ess-group-health-checkESS Scaling Group Health CheckESS scaling groups should enable ECS instance health check to ensure only healthy instances are in service.
ess-scaling-configuration-attach-security-groupESS Scaling Configuration Security GroupESS scaling configurations should attach security groups to instances for proper network isolation and access control.
ess-scaling-configuration-enabled-internet-checkESS Scaling Configuration Internet Access CheckEnsures that ESS scaling configurations do not enable public IP addresses for instances unless necessary.
ess-scaling-configuration-image-checkESS Scaling Configuration Image CheckESS scaling configurations should use maintained images to ensure security and stability.
ess-scaling-configuration-image-type-checkESS Scaling Configuration Image Type CheckESS scaling configurations should use images from specified sources for better security and management.
ess-scaling-group-attach-multi-switchESS Scaling Group Multi-VSwitchESS scaling groups should be associated with at least two VSwitches for high availability across multiple zones.
ess-scaling-group-attach-slbESS Scaling Group Attach SLBESS scaling groups should be attached to Classic Load Balancer (SLB) for proper traffic distribution.
ess-scaling-group-loadbalancer-checkESS Scaling Group Load Balancer Existence CheckESS scaling groups should be attached to existing and active Load Balancer instances for proper traffic distribution.
fc-function-custom-domain-and-cert-enableFC Function Custom Domain Certificate CheckFC custom domains should have SSL certificates configured for secure communication.
fc-function-custom-domain-and-https-enableFC Function Custom Domain HTTPS CheckFC custom domains should have HTTPS enabled for secure communication.
fc-function-custom-domain-and-tls-enableFC Function Custom Domain and TLS EnabledEnsures that custom domains for Function Compute functions have TLS enabled.
fc-function-internet-and-custom-domain-enableFC Service Internet Access with Custom DomainFC services with internet access should be bound to custom domains for proper access control.
fc-function-settings-checkFC Function Settings CheckFC function settings should meet specified requirements for optimal performance and security.
fc-service-bind-roleFC Service Bound to RAM RoleEnsures that the Function Compute service has a RAM role bound to it.
fc-service-internet-access-disableFC Service Internet Access DisabledEnsures that the Function Compute service has internet access disabled when it should only access internal resources.
fc-service-log-enableFC Service Log EnableFC services should have logging enabled for monitoring and troubleshooting.
fc-service-tracing-enableFC Service Tracing EnableFC services should have tracing enabled for performance monitoring and debugging.
fc-service-vpc-bindingFC Service VPC Binding EnabledEnsures that the Function Compute service is configured to access resources within a VPC.
firewall-asset-open-protectCloud Firewall Asset Protection EnabledEnsures assets are protected by Cloud Firewall.
gpdb-instance-multi-zoneGPDB Instance Multi-Zone DeploymentGPDB instances should be deployed with a standby zone for high availability.
gwlb-loadbalancer-multi-zoneGWLB LoadBalancer Multi-Zone DeploymentGWLB LoadBalancer instances should be deployed across at least two availability zones for high availability.
hbase-cluster-deletion-protectionHBase Cluster Deletion Protection EnabledEnsures that HBase clusters have deletion protection enabled.
hbase-cluster-in-vpcHBase Cluster in VPCEnsures that the HBase cluster is deployed within a VPC.
hbase-cluster-multi-zoneHBase Cluster Multi-Zone DeploymentHBase clusters should be deployed in cluster mode with at least 2 nodes for high availability.
internet-nat-gateway-in-specified-vpcInternet NAT Gateway in Specified VPCInternet-facing NAT gateways should be created in specified VPCs according to network security requirements.
intranet-nat-gateway-in-specified-vpcIntranet NAT Gateway in Specified VPCIntranet-facing NAT gateways should be created in specified VPCs according to network security requirements.
kafka-instance-multi-zoneKafka Instance Multi-Zone DeploymentKafka instances should be deployed across multiple availability zones for high availability.
kms-instance-multi-zoneKMS Instance Multi-Zone DeploymentKMS instances should be deployed across at least two availability zones for high availability and disaster recovery.
kms-key-delete-protection-enabledKMS key deletion protection enabledKMS master key has deletion protection enabled, considered compliant. Keys not in enabled status and service keys (which cannot be deleted) are not applicable.
kms-key-rotation-enabledKMS key automatic rotation enabledKMS user master key has automatic rotation enabled, considered compliant. Service keys and externally imported keys are not applicable.
kms-secret-rotation-enabledKMS secret automatic rotation enabledKMS secret has automatic rotation enabled, considered compliant. Generic secrets are not applicable.
lindorm-instance-in-vpcLindorm in VPC CheckEnsures Lindorm instances are deployed within a VPC.
lindorm-instance-multi-zoneLindorm Instance Multi-Zone DeploymentLindorm instances should be configured for multi-zone deployment with at least 4 LindormTable nodes for high availability.
mongodb-instance-enabled-sslMongoDB Instance SSL EnabledEnsures MongoDB instances have SSL encryption enabled.
mongodb-instance-encryption-byok-checkMongoDB Instance Uses Custom Key for TDEEnsures MongoDB instances use custom KMS keys for Transparent Data Encryption (TDE).
mongodb-instance-in-vpcMongoDB Instance Uses VPC NetworkEnsures MongoDB instances are deployed in a Virtual Private Cloud (VPC) network.
mongodb-instance-log-auditMongoDB Instance Log Audit EnabledEnsures MongoDB instances have audit logging enabled.
mongodb-instance-multi-nodeMongoDB Instance Uses Multiple NodesEnsures MongoDB instances are deployed with multiple nodes for high availability.
mongodb-instance-multi-zoneMongoDB Instance Multi-Zone DeploymentMongoDB instances should be deployed across multiple availability zones for high availability.
mongodb-instance-release-protectionMongoDB Instance Release Protection EnabledEnsures that MongoDB instances have release protection enabled.
mse-cluster-config-auth-enabledMSE Cluster Config Auth EnabledEnsures that the Microservices Engine (MSE) cluster configuration center has authentication enabled.
mse-cluster-multi-availability-area-architecture-checkMSE Cluster High-Availability ConfigurationMSE clusters should use the Professional Edition with at least 3 instances (odd number) for high availability.
mse-cluster-stable-version-checkMSE Cluster Uses Stable VersionEnsures that MSE cluster engine version is greater than the minimum stable version.
mse-gateway-multi-availability-area-architecture-checkMSE Gateway Multi-Availability Zone DeploymentMSE gateways should be deployed across multiple availability zones by configuring a backup VSwitch.
nas-filesystem-mount-target-access-group-checkNAS Mount Target Access Group CheckEnsures NAS mount targets do not use the 'DEFAULT_VPC_GROUP_NAME'.
natgateway-delete-protection-enabledNAT Gateway Deletion Protection EnabledEnsures that NAT Gateways have deletion protection enabled.
natgateway-eip-used-checkNAT Gateway EIP Usage CheckSNAT and DNAT should not use the same EIP to avoid potential conflicts and improve network segmentation.
natgateway-snat-eip-bandwidth-checkNAT Gateway SNAT EIP Bandwidth ConsistencyWhen SNAT entries are bound to multiple EIPs, the bandwidth peak settings should be consistent or they should be added to a shared bandwidth package.
nlb-loadbalancer-multi-zoneNLB LoadBalancer Multi-Zone DeploymentNLB LoadBalancer instances should be deployed across at least two availability zones for high availability.
nlb-server-group-multi-zoneNLB Server Group Multi-Zone DistributionNLB server groups should have backend servers distributed across multiple availability zones for high availability. This rule does not apply to server groups with no attached servers, or to IP type server groups.
oss-bucket-authorize-specified-ipOSS Bucket Authorize Specified IPEnsures OSS bucket policies restrict access to specified IP ranges.
oss-bucket-backup-enableOSS Backup EnabledEnsures OSS buckets have backup or versioning enabled.
oss-bucket-logging-enabledOSS Bucket Logging EnabledOSS buckets should have logging enabled to track access and operations. Logging helps with security auditing, troubleshooting, and compliance requirements.
oss-bucket-remote-replicationOSS Bucket Remote Replication EnabledEnsures that cross-region replication is enabled for the OSS bucket for disaster recovery.
oss-bucket-tls-version-checkOSS Bucket TLS Version CheckEnsures that the OSS bucket is configured to use a secure version of TLS (TLS 1.2 or higher).
oss-bucket-versioning-enabledOSS Bucket Versioning EnabledOSS bucket should have versioning enabled to protect against accidental deletion or overwriting.
oss-default-encryption-kmsOSS bucket server-side KMS encryption enabledOSS bucket has server-side KMS encryption enabled, considered compliant.
oss-encryption-byok-checkOSS Bucket BYOK Encryption CheckOSS buckets should use customer-managed KMS keys (BYOK - Bring Your Own Key) for encryption. This provides better control over encryption keys and meets compliance requirements.
oss-zrs-enabledOSS Bucket Zone-Redundant Storage EnabledOSS buckets should use zone-redundant storage (ZRS) for high availability and data durability.
ots-instance-multi-zoneOTS Instance Zone-Redundant StorageEnsures Tablestore (OTS) instances use zone-redundant storage for high availability.
ots-instance-network-not-normalOTS Restricted Network TypeEnsures Table Store (OTS) instances do not use the 'Normal' (unrestricted) network type.
pai-eas-instances-multi-zonePAI EAS Instance Multi-Zone DeploymentEnsures that PAI EAS instances are deployed across multiple zones for high availability.
polardb-cluster-default-time-zone-not-systemPolarDB Cluster Default Time Zone Not SystemEnsures PolarDB cluster default time zone is not set to SYSTEM.
polardb-cluster-delete-protection-enabledPolarDB Cluster Deletion Protection EnabledEnsures that PolarDB clusters have deletion protection enabled.
polardb-cluster-enabled-sslPolarDB Cluster SSL EnabledEnsures PolarDB clusters have SSL encryption enabled.
polardb-cluster-multi-zonePolarDB Cluster Multi-Zone DeploymentPolarDB clusters should be deployed across multiple availability zones for high availability.
polardb-dbcluster-in-vpcPolarDB Cluster in VPCEnsures PolarDB cluster is deployed in a VPC.
polardb-revision-version-used-checkPolarDB Revision Version Used CheckEnsures PolarDB cluster is using a stable kernel revision version.
polardb-x2-instance-multi-zonePolarDB-X 2.0 Instance Multi-Zone DeploymentPolarDB-X 2.0 instances should be deployed across 3 availability zones.
privatelink-server-endpoint-multi-zonePrivateLink VPC Endpoint Service Multi-Zone DeploymentPrivateLink VPC endpoint services should have resources deployed across multiple availability zones for high availability.
privatelink-servier-endpoint-multi-zonePrivateLink Service Endpoint Multi-Zone DeploymentEnsures that PrivateLink service endpoints are deployed across multiple zones for high availability.
ram-password-policy-checkRAM Password Policy CheckEnsures that the RAM password policy meets the specified security requirements.
ram-policy-no-has-specified-documentRAM Policy No Specified DocumentEnsures custom RAM policies do not contain the specified permission configuration.
ram-role-has-specified-policyRAM Role Has Specified PolicyEnsures RAM roles have the specified policies attached.
ram-role-no-product-admin-accessRAM Role No Product Admin AccessEnsures RAM roles do not have full administrative access or product administrator permissions.
ram-user-activated-ak-quantity-checkRAM User Active AK Quantity CheckEnsures RAM users do not have more than one active AccessKey.
ram-user-ak-create-date-expired-checkRAM User AccessKey Creation Date Expired CheckEnsures that RAM user AccessKeys are not older than the specified number of days.
ram-user-ak-used-expired-checkRAM User AccessKey Last Used Date CheckEnsures that RAM user AccessKeys have been used within the specified number of days.
ram-user-has-specified-policyRAM User Has Specified PolicyEnsures RAM users have the required policies attached, including those inherited from groups.
ram-user-login-checkRAM User Login Enabled CheckEnsures that RAM users who do not need console access have login disabled.
ram-user-no-has-specified-policyRAM User No Specified PolicyEnsures RAM users do not have specified risky policies attached.
ram-user-no-product-admin-accessRAM User No Product Administrative AccessEnsures that RAM users do not have full administrative access to cloud products unless necessary.
ram-user-role-no-product-admin-accessRAM User Role No Product Admin AccessEnsures RAM user-defined roles do not have product administrative permissions.
ram-user-specified-permission-boundRAM User Specified Permission BoundEnsures RAM users do not have specified high-risk permissions bound.
rds-instacne-delete-protection-enabledRDS Instance Deletion Protection EnabledEnsures that RDS instances have deletion protection enabled.
rds-instance-enabled-auditingRDS Instance Auditing EnabledEnsures RDS instances have SQL auditing enabled.
rds-instance-enabled-log-backupRDS Instance Log Backup EnabledEnsures RDS instances have log backup enabled.
rds-instance-enabled-sslRDS Instance SSL EnabledEnsures RDS instances have SSL encryption enabled.
rds-instance-enabled-tde-disk-encryptionRDS Instance Enabled TDE or Disk EncryptionRDS instance should have TDE (Transparent Data Encryption) or disk encryption enabled.
rds-instance-has-guard-instanceRDS Instance Has Guard InstanceEnsures production RDS instances have a corresponding guard (disaster recovery) instance.
rds-instances-in-vpcRDS Instance in VPCEnsures that the RDS instance is deployed within a VPC.
rds-multi-az-supportRDS Instance Multi-AZ DeploymentRDS instances should be deployed in multi-AZ configuration for high availability and automatic failover.
redis-architecturetype-cluster-checkRedis Architecture Type Cluster CheckEnsures Redis instance uses cluster architecture type.
redis-instance-backup-log-enabledRedis Instance Backup Log EnabledEnsures that log backup is enabled for the Redis instance.
redis-instance-double-node-typeRedis Instance Double Node TypeEnsures Redis instance uses double node type for high availability.
redis-instance-enabled-byok-tdeRedis Instance BYOK TDE EnabledEnsures that Redis instances have Transparent Data Encryption (TDE) enabled using Bring Your Own Key (BYOK).
redis-instance-enabled-sslRedis Instance SSL EnabledEnsures Redis instances have SSL encryption enabled.
redis-instance-in-vpcRedis Instance in VPCEnsures Redis instance is deployed in a VPC.
redis-instance-multi-zoneRedis Instance Multi-Zone DeploymentRedis instances should be deployed across multiple availability zones for high availability.
redis-instance-release-protectionRedis Instance Release Protection EnabledEnsures that Redis instances have release protection enabled.
redis-instance-tls-version-checkRedis Instance TLS Version CheckEnsures Redis instance has SSL enabled with acceptable TLS version.
redis-min-capacity-limitRedis Min Capacity LimitEnsures Redis instance has memory capacity meeting the minimum requirement.
rocketmq-v5-instance-multi-zoneRocketMQ 5.0 Instance Multi-Zone DeploymentRocketMQ 5.0 instances should be deployed in Cluster HA mode which supports multi-zone availability.
security-center-version-checkSecurity Center Version CheckSecurity Center should be at a version that provides sufficient protection features.
slb-all-listener-enabled-aclSLB All Listeners Have Access ControlAll running listeners of SLB instances should have access control lists (ACL) configured for security.
slb-all-listener-http-disabledSLB All Listeners HTTP DisabledEnsures no SLB listeners use the insecure HTTP protocol.
slb-all-listener-http-redirect-httpsSLB HTTP Redirect to HTTPS EnabledEnsures SLB HTTP listeners are configured to redirect traffic to HTTPS.
slb-all-listenter-has-serverSLB All Listeners Have Backend ServersAll listeners of SLB instances should have at least the specified number of backend servers attached.
slb-all-listenter-tls-policy-checkSLB Listener TLS Policy CheckEnsures SLB HTTPS listeners use secure TLS cipher policies.
slb-default-server-group-multi-serverSLB Default Server Group Has Multiple ServersThe default server group of SLB instances should have at least two servers to avoid single point of failure.
slb-instance-autorenewal-checkSLB Instance Auto-Renewal CheckPrepaid SLB instances should have auto-renewal enabled to avoid service interruption.
slb-instance-default-server-group-multi-zoneSLB Default Server Group Multi-ZoneThe default server group of SLB instances should have resources distributed across multiple availability zones.
slb-instance-log-enabledSLB Instance Logging EnabledEnsures that access logging is enabled for the SLB instance.
slb-instance-multi-zoneSLB Instance Multi-Zone DeploymentSLB instances should be deployed across multiple zones by configuring both master and slave zones for high availability.
slb-instance-spec-checkSLB Instance Specification CheckSLB instance specifications should meet the required performance criteria based on the specified list.
slb-listener-https-enabledSLB Listener HTTPS EnabledEnsures SLB listeners use HTTPS protocol for secure communication.
slb-loadbalancer-in-vpcSLB in VPC CheckEnsures SLB instances are deployed within a Virtual Private Cloud (VPC).
slb-master-slave-server-group-multi-zoneSLB Master-Slave Server Group Multi-ZoneThe master-slave server group of SLB instances should have resources distributed across multiple availability zones.
slb-no-public-ipSLB Instance No Public IPSLB instances should not have public IP addresses to reduce attack surface.
slb-vserver-group-multi-zoneSLB VServer Group Multi-Zone DeploymentEnsures that SLB virtual server groups contain instances from multiple availability zones.
sls-logstore-enabled-encryptSLS Logstore Encryption EnabledEnsures SLS Logstores have server-side encryption enabled.
sls-logstore-encrypt-key-origin-checkSLS Logstore Encryption Key Origin CheckEnsures SLS Logstores use externally imported key material (BYOK) for encryption, which provides better control over encryption keys.
sls-project-multi-zoneSLS Project Zone-Redundant StorageSLS projects should use zone-redundant storage (ZRS) for high availability and data durability.
vpc-flow-logs-enabledVPC Flow Logs EnabledEnsures VPC flow logs are enabled for monitoring network traffic.
vpc-network-acl-not-emptyVPC Network ACL Not EmptyEnsures VPC Network ACLs have at least one rule configured.
vpn-connection-master-slave-establishedVPN Connection Dual Tunnel EstablishedUse dual-tunnel VPN gateway and both master and slave tunnels are established with the peer.
vpn-gateway-multi-zoneVPN Gateway Multi-Zone DeploymentVPN Gateways should be configured with a disaster recovery VSwitch to support multi-zone availability.
vswitch-available-ip-countVSwitch Available IP Count CheckEnsures that the VSwitch has a sufficient number of available IP addresses.
waf-instance-logging-enabledWAF Instance Logging EnabledEnsures that logging is enabled for the WAF instance for auditing and security analysis.
waf3-defense-resource-logging-enabledWAF 3.0 Logging EnabledEnsures that logging is enabled for resources protected by WAF 3.0.

Low Severity (40 Rules)

Rule IDNameDescription
ack-cluster-spec-checkACK Cluster Spec CheckEnsures ACK clusters use approved specifications (e.g., ACK Pro).
alb-address-type-checkALB Address Type CheckEnsures ALB instances use the preferred address type (e.g., Intranet).
apig-group-custom-trace-enabledAPI Gateway Group Custom Trace EnabledEnsures API Gateway groups have custom tracing enabled.
cr-repository-immutablity-enableContainer Registry repository image version is immutableContainer Registry repository image version is immutable, considered compliant.
eci-container-group-volumn-mountsECI Volume Mounting CheckEnsures ECI container groups have volumes mounted for persistent data storage.
ecs-disk-auto-snapshot-policyECS disk has auto snapshot policy configuredECS disk has auto snapshot policy configured, considered compliant. Disks not in use, disks that do not support auto snapshot policy, and non-persistent disks mounted by ACK clusters are not applicable. After enabling auto snapshot policy, Alibaba Cloud will automatically create snapshots for cloud disks according to preset time points and cycles, enabling quick recovery from virus intrusion or ransomware attacks.
ecs-disk-idle-checkECS Disk Idle CheckEnsures that ECS disks are attached to an instance and not in an idle state.
ecs-disk-regional-auto-checkECS Disk Zone-Redundant ESSD StorageECS data disks should use zone-redundant ESSD storage for high availability. System disks are not applicable to this rule.
ecs-instance-chargetype-checkECS Instance Charge Type CheckEnsures ECS instances use the authorized charge type.
ecs-instance-multiple-eni-checkECS instance is bound to only one elastic network interfaceECS instances are bound to only one elastic network interface, considered compliant. This helps simplify network configuration and reduce complexity.
ecs-instance-ram-role-attachedECS Instance RAM Role AttachedEnsures that ECS instances have an IAM role attached for secure access to other cloud services.
ecs-internet-charge-type-checkECS Internet Charge Type CheckEnsures ECS instances use the preferred internet charge type.
ecs-security-group-description-checkSecurity Group Description Not EmptySecurity group description should not be empty. Having a description helps with management and auditing.
ecs-security-group-type-not-normalUse Enterprise Security Group TypeECS security group type should not be normal type. Using enterprise security group is considered compliant.
ecs-snapshot-retention-daysECS auto snapshot retention days meets requirementsECS auto snapshot policy retention days is greater than the specified number of days, considered compliant. Default value: 7 days.
ecs-system-disk-size-checkECS System Disk Size CheckEnsures ECS system disks meet the minimum required size.
eip-attachedEIP AttachedEnsures that EIP instances are associated with a resource.
eip-bandwidth-limitEIP Bandwidth LimitEnsures EIP bandwidth does not exceed a specified maximum value.
hbase-cluster-type-checkHBase Cluster Type CheckEnsures that the HBase cluster is of a specified or recommended type.
metadata-ros-composer-checkTemplate Metadata ALIYUN::ROS::Composer CheckTemplate must have Metadata.ALIYUN::ROS::Composer configured. The value must be a dictionary (object).
nas-filesystem-encrypt-type-checkNAS file system encryption configuredNAS file system has encryption configured, considered compliant.
oss-bucket-referer-limitOSS bucket referer hotlink protection configuredOSS bucket has referer hotlink protection enabled with a configured whitelist.
polardb-cluster-maintain-time-checkPolarDB Cluster Maintenance Window CheckEnsures that the PolarDB cluster has a maintenance window configured.
ram-group-has-member-checkRAM Group Has MemberEnsures RAM groups have at least one member.
ram-group-in-use-checkRAM Group In Use CheckEnsures RAM groups are not idle - must have at least one member and at least one attached policy.
ram-policy-in-use-checkRAM Policy In Use CheckEnsures RAM policies are attached to at least one RAM user, group, or role.
ram-user-group-membership-checkRAM User Group Membership CheckEnsures that RAM users belong to at least one group for easier permission management.
ram-user-last-login-expired-checkRAM User Last Login CheckChecks if RAM users have not logged in for a long time.
ram-user-no-policy-checkRAM User Has PolicyEnsures RAM users have at least one policy attached.
rds-instance-maintain-time-checkRDS Instance Maintenance Window CheckEnsures that the RDS instance has a maintenance window configured.
rds-instance-storage-autoscale-enableRDS Storage Autoscale EnabledEnsures RDS instances have storage autoscale enabled to prevent downtime due to full disks.
redis-instance-backup-time-checkRedis Instance Backup Window CheckEnsures that the Redis instance has a backup window configured.
root-has-specified-roleRoot Account Has Specified RoleEnsures that the root account has a specified RAM role for governance and management.
slb-backendserver-weight-checkSLB Backend Server Weight CheckEnsures SLB backend servers have reasonable weight configurations.
slb-instance-loadbalancerspec-checkSLB Instance Spec CheckEnsures SLB instances use approved performance specifications.
slb-loadbalancer-bandwidth-limitSLB Bandwidth LimitEnsures SLB instance bandwidth does not exceed a specified maximum value.
slb-modify-protection-checkSLB Modification Protection EnabledEnsures that SLB instances have modification protection enabled.
sls-logstore-hot-ttl-checkSLS Logstore Smart Tier Storage EnabledEnsures SLS Logstores have intelligent hot/cold tier storage enabled for cost optimization.
vpn-gateway-enabled-ssl-vpnVPN Gateway SSL-VPN EnabledEnsures the VPN gateway has SSL-VPN enabled for secure client access.
vpn-ipsec-connection-health-check-openVPN IPsec Health Check EnabledEnsures VPN IPsec connections have health checks enabled to detect tunnel failures.