Apache Spark configuration without authentication
We have detected an Apache Spark configuration file on the system which doesn't support authentication. This could allow unwanted users...
We have detected an Apache Spark configuration file on the system which doesn't support authentication. This could allow unwanted users...
If TLS is not enabled and configured correctly, this increases the risk of data being compromised in transit.
Automated backups are disabled for the RDS instance {AwsRdsDbInstance}. Backups help protect against human error, ransomware attacks, and downtime. If...
Setting up an appropriate log level, configures the Docker daemon to log events that you would want to review later....
As well as auditing the normal Linux file system and system calls, you should audit all Docker related files and...
A VMware virtual machine is a software-based emulation of a physical computer. VMware Unity Interlock feature should be disabled if...
An important file ({ConfigurationFile.Path}) has been identified with permission mask against best practices. Permission mask is set to {ConfigurationFile.PermissionMask} instead...
A Dependency Confusion attack occurs when a software installer script is tricked into pulling a malicious package from a public...
Docker Socket '{DockerSocket}' was found to have mounted sockets. Docker socket is the UNIX socket that Docker is listening to....