Control reports that provide visibility to users who have access to critical, high-privileged VMs. It is recommended to monitor the access to high privileged VMs...
The control reports list all of the files related to American Express Credit Card sensitive content. All American Express documents are considered as High Risk...
Amazon Machine Image (AMI) is a template that might consist of a snapshot of server OS, proprietary applications, personal data, application data, configuration information etc....
Amazon Machine Image (AMI) is a template which is snapshot of server OS, proprietary applications, personal & application data, configurations etc. When an AMI is...
Detects Application Gateways with Diagnostic logging disabled. Diagnostic logging provides insight into operations resources performed. Logs help you troubleshoot past problems or prevent potential ones.
Detects Application Gateways with WAF disabled. It is recommended to utilize the Web Application Firewall (WAF) provided with Application Gateway to safeguard the application tier...
Detects Application Gateways with WAF in detection mode. It is recommended to enable Web Application Firewall (WAF) provided with Application Gateway in Prevention mode to...
Detects application gateways not in WAF tier. A centralized web application firewall (WAF) helps make security management straight forward and gives better assurance to application...
Purchase to Pay related risk where access to Approve Invoices conflicts with Create Payments whereby an individual could potentially modify and approve accounts payable invoices...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Approve Invoices) could lead to an individual creating a fictitious supplier and altering...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Approve Invoices) could lead to an individual creating a fictitious supplier and altering...
Purchase to Pay related risk where access to Approve Invoices conflicts with Payables Invoices whereby an individual should not be able to create an invoice and...
Purchase to Pay related risk where access to Approve Invoices conflicts with Payables Invoices whereby an individual should not be able to create an invoice and...
Purchase to Pay related risk where access to Approve Invoices conflicts with Payables Invoices whereby an individual should not be able to create an invoice and...
Purchase to Pay related risk where access to Approve Invoices conflicts with Payables Invoices whereby an individual that is creating an invoice should not have access...
Purchase to Pay related risk where access to Approve Invoices conflicts with Payables Payments whereby an individual could potentially modify and approve accounts payable invoices...
Purchase to Pay related risk where access to Approve Invoices conflicts with Payables Payments whereby an individual could potentially modify and approve accounts payable invoices...
Purchase to Pay related risk where access to Approve Invoices conflicts with Payables Payments whereby an individual could potentially modify and approve accounts payable invoices...
Purchase to Pay related risk where access to Approve Invoices conflicts with Payables Payments whereby an individual could potentially modify and approve accounts payable invoices...
Purchase to Pay related risk where access to Approve Purchase Order conflicts with Payables Payments whereby an individual could approve purchase of unauthorized items and...
Purchase to Pay related risk where access to Approve Purchase Orders conflicts with Payables Invoices whereby an individual could approve purchase of unauthorized items and...
Purchase to Pay related risk where access to Approve Purchase Orders conflicts with Approve Invoices whereby an individual can create a fictitious purchase order or also match...
Purchase to Pay related risk where access to Approve Purchase Orders conflicts with Payables Invoices whereby an individual can create a fictitious purchase order and...
Purchase to Pay related risk where access to Approve Purchase Orders conflicts with Purchase Orders whereby an individual could create a purchase order and subsequently approve...
Purchase to Pay related risk where access to Approve Purchase Orders conflicts with Receive Goods and Services whereby an individual could approve purchases of unauthorized...
Order to Cash related risk where access to Customer Account Maintenance conflicts with Receivables Transactions whereby AR transactions can be changed to hide inconsistencies a...
The control reports list all file attachments with Credit Card related sensitive content that are accessible by external users. All the violated documents are considered...
The control reports list all of the file attachments with Passport related sensitive content that are accessible by external users. All the violated documents are...
The control reports list all of the file attachments with PCI related sensitive content that are accessible by external users. All the violated documents are...
The control reports list all of the file Attachments with PII related sensitive content that are accessible by external users. All the violated documents are...
The control reports list all of the file Attachments with Credit Card related sensitive content. These documents are considered as High Risk and access to...
The control reports list all of the file attachments with PCI related sensitive content. All documents with PCI related content are considered High Risk and...
The control reports list all of the file attachments with PII related sensitive content. All documents containing PII are considered High Risk and access to...
The control reports list all of the file Attachments with SSN related sensitive content. All documents with SSN content are considered High Risk and access...
The control reports list all of the file Attachments with US Drivers License related sensitive content. All documents with Drivers License data is considered High...
The control reports list all of the file Attachments with SSN related sensitive content that are accessible to external users. All documents with SSN related...
The control reports list all of the file attachments with UK National Insurance related sensitive content that are accessible by external users. All documents with...
The control reports list all of the file attachments with US Drivers License related sensitive content that are accessible by external users. All documents with...
Amazon Redshift is a fully managed, petabyte-scale data warehouse service in the cloud. A set of data warehouse nodes are called an Amazon Redshift cluster....
The Report contains information about the audit log trimming retention period of SharePoint Sites. The report will be sent to IT security admin and managers...
AWS CloudTrail enables for governance, compliance and auditing of AWS account. With this service enabled, we can log and monitor actions across AWS infrastructure. It...
AWS security groups are associated with EC2 instances (Cloud Virtual Server), Redshift Cluster, VPC etc., and provide security at the protocol and port access level....
AWS security groups are associated with EC2 instances (Cloud Virtual Server) and provide security at the protocol and port access level. Each security group –...
AWS “Well-Architected Tool” framework components includes “workload”, which is a collection of AWS resources and code that delivers business value, such as a customer-facing application...
AWS security groups are associated with EC2 instances (Cloud Virtual Server) and provide security at the protocol and port access level. Each security group –...
AWS security groups are associated with EC2 instances (Cloud Virtual Server) and provide security at the protocol and port access level. Each security group –...
AWS security groups are associated with EC2 instances (Cloud Virtual Server) and provide security at the protocol and port access level. Each security group –...
AWS security groups are associated with EC2 instances (Cloud Virtual Server) and provide security at the protocol and port access level. Each security group –...
An Amazon Machine Image (AMI) is a template that consists of a snapshot of server OS, proprietary applications, personal data, application data, configuration information etc....
Detects Azure Storage account with Disabled Encryption. It ensures that the content is fully unrecoverable without a key and thus protects the volume from unwarranted...
Cash Management and Payables related risk where access to Bank Reconciliations conflicts with Create Payments whereby an individual could create payments to a fictitious vendor and...
Cash Management and Payables related risk where access to Bank Reconciliations conflicts with Payables Payments whereby an individual could create payments to a fictitious vendor and...
Cash Management and Payables related risk where access to Bank Reconciliations conflicts with Payables Payments. An individual could create payments to a fictitious vendor and conceal...
Cash Management and Payables related risk where access to Bank Reconciliations conflicts with Payables Payments. An individual could create payments to a fictitious vendor and conceal...
This control report details those users that have access to Basis archiving actions within SAP. This level of access has significant risk and should be...
This control report details those users that have access to Basis configuration actions within SAP. This level of access has significant risk and should be...
This control report details those users that have access to Basis critical actions within SAP. This level of access has significant risk and should be...
A developer could modify an existing program in production, perform traces to the program and configure the production environment to limit monitoring of the program...
A developer could create or modify a program in production and force the transport of these changes after the fact to conceal irregular development practices....
This control report details those users that have access to Basis performance actions within SAP. This level of access has significant risk and should be...
An individual could modify data in tables or change valid configuration and replicate these changes to other clients. This is particularly sensitive if client administration...
An individual could modify data in tables or modify valid configuration values and setup the production environment to run transactions and programs using the inappropriately...
A developer could modify program components (menus, screen layout, messages, queries) and configure the production environment to limit monitoring of the program runs using the...
A developer could modify program components (menus, screen layout, messages, queries) and force the transport of these changes after the fact to conceal irregular development...
The report provides the list of all documents labeled as Most Confidential. Access to these files should be highly restricted and should be reviewed on...
The report provides the list of External Collaborators having permission on Box files. External collaborators having access is considered high risk as permissions should be...
The control reports list of all the file Attachments with PCI related sensitive content. PCI is an information security standard for organizations that handle branded...
The control reports lists all file Attachments with PII related sensitive content. PII is an information security standard for organizations that handle personally identifying information. ...
Sensitive files should be protected with a password so there is no leak of information. The control detects sensitive files with no password associated with...
The organization monitors unsuccessful login attempts and escalates priority in the event unsuccessful logins may be due to brute force attack. Typically these reports are...
This is an operational control to monitor the access review process. SSM provides a report presenting all details of a completed certification, which can be...
AWS CloudFormation provides a common language for us to describe and provision all the infrastructure resources in cloud. We can create templates for the service...
AWS CloudFormation provides a common language for us to describe and provision all the infrastructure resources in cloud. We can create templates for the service...
AWS CloudFormation provides a common language for us to describe and provision all the infrastructure resources in cloud. We can create templates for the service...
AWS CloudFormation provides a common language for us to describe and provision all the infrastructure resources in cloud. We can create templates for the service...
AWS CloudTrail enables for governance, compliance and auditing of AWS account. With this service enabled, we can log and monitor actions across AWS infrastructure. It...
Acquire to Retire related risk where access to Create Asset Accounting conflicts with Define FA Setup whereby an individual can modify the set up (e.g. depreciation methods),...
Acquire to Retire related risk where access to Create Assets conflicts with Perform Mass Retirements whereby an individual can create assets and subsequently perform mass retirements for...
Acquire to Retire related risk where access to Create Assets conflicts with Run Depreciation whereby an individual can create assets and charge depreciation on the assets. This...
Inventory related risk where access to Create Inventory conflicts with Cycle Counts whereby an individual can confirm short/excess receipt of inventory in an attempt to...
Inventory and Payables related risk where access to Create Inventory conflicts with Receive Goods and Services whereby an individual can enter goods receipt as well as create...
Supply Chain Management (SCM) related risk where access to Create Items conflicts with Create Item Costs whereby an individual can create/modify items and change their costs which,...
Purchase to Pay related risk where access to Payables Setup conflicts with Create Payments whereby an individual could alter payables setup configuration to circumvent controls related...
Purchase to Pay related risk where access to Create Payments conflicts with Purchase Orders whereby an individual could create a fictitious purchase order and direct...
Purchase to Pay related risk where access to Create Payments conflicts with Purchasing Setup whereby an individual could make changes to critical Purchasing configurations in...
Procurement related risk where access to Create Procurement Agent conflicts with Purchase Orders whereby an individual could activate themselves as buyer circumventing controls that allow...
Source to Pay related risk where access to Create Requisition conflicts with Approve Requisition whereby an individual could create a requisition and subsequently approve the requisition...
Purchase to Pay related risk where access to Create Requisition conflicts with Create Suppliers whereby an individual could create a fictitious supplier and create bogus requisitions...
Purchase to Pay related risk where access to Create Requisition conflicts with Create Suppliers whereby an individual could create a fictitious supplier and create bogus requisitions...
Purchase to Pay related risk where access to Create Requisition conflicts with Create Suppliers whereby an individual could create a fictitious supplier and create bogus requisitions...
Purchase to Pay related risk where access to Create Requisition conflicts with Create Suppliers whereby an individual could create a fictitious supplier and create bogus requisitions...
Puchase to Pay risk where access to Create Requisition conflicts with Payables Invoices whereby an individual could circumvent workflow controls in order to process invoices on...
Puchase to Pay risk where access to Create Requisition conflicts with Payables Invoices whereby an individual could circumvent workflow controls in order to process invoices on...
Purchase to Pay related risk where access to Create Requisition conflicts with Purchase Orders whereby an individual could enter a requisition and process a purchase order from...
Purchase to Pay related risk where access to Create Requisition conflicts with Purchase Orders whereby an individual could enter a requisition and process a purchase order from...
Purchase to Pay related risk where access to Create Requisition conflicts with Create Suppliers whereby an individual could create a fictitious supplier and create bogus requisitions...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Approve Invoices) could lead to an individual creating a fictitious supplier and altering...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Approve Invoices) could lead to an individual creating a fictitious supplier and altering...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Approve Purchase Orders) could lead to an individual creating an unapproved supplier and...
Vendor/Supplier Master related risk where access to Create Suppliers conflicts with Approve Suppliers whereby an individual could create a supplier and subsequently approve that same supplier...
Vendor/Supplier Master related risk where access to Create Suppliers conflicts with Approve Suppliers whereby an individual could create a supplier and subsequently approve that same supplier...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Create Payments) could lead to an individual creating a fictitious supplier or changing...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Enter Purchase Order Release) could lead to an individual creating an unapproved supplier...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Payables Invoices) could lead to an individual creating a fictitious supplier or changing...
Purchase to Pay related risk where access to Create Suppliers conflicts with Payables Invoices whereby an individual could create a fictitious supplier or change the...
Purchase to Pay related risk where access to Create Suppliers conflicts with Payables Invoices whereby an individual could create a fictitious supplier or change the...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Payables Invoices) could lead to an individual creating a fictitious supplier or changing...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Payables Invoices) could lead to an individual creating a fictitious supplier or changing...
Purchase to Pay related risk where access to Create Suppliers conflicts with Payables Payments whereby an individual could create a fictitious supplier or change the...
Purchase to Pay related risk where access to Create Suppliers conflicts with Payables Payments whereby an individual could create a fictitious supplier or change the...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Payables Payments) could lead to an individual creating a fictitious supplier or changing...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Payables Payments) could lead to an individual creating a fictitious supplier or changing...
Purchase to Pay related risk where excessive access (Create Suppliers conflicts with Purchase Orders) could lead to an individual creating fictitious purchases or creating an...