Lambda Function Exposes AWS Secret
AWS lambda function {AwsLambdaFunction} was detected with environment variables exposing AWS access key or secret.
AWS lambda function {AwsLambdaFunction} was detected with environment variables exposing AWS access key or secret.
Administrative permissions ({PolicyBindings.Role}) have been granted to the Service Account {GcpIamServiceAccount} at the project level; these rights allow the User...
Orca has detected that the user {AwsUser} was granted full administrative privileges on the account. These privileges grant them the...
It is recommended to configure your instance to not use the default Compute Engine service account because it has the...
Orca has detected a IAM Role which can be assumed by an entity which is not a member of the...
We found that your Amazon Machine Image (AMI) {AwsEc2Image} is public. A public AMI is available for use by all...
Ensure that your S3 buckets content cannot be publicly listed in order to protect against unauthorized access. An S3 bucket...
AWS IAM users can access AWS resources using different types of credentials, such as passwords or access keys. It is...
Ensure that Amazon IAM roles used to establish a trusted relationship between your AWS account and a third-party entity (also...