Skip to main content

Compliance Policies

note

Click the link in the Policy Name column to access the corresponding policy template.

Enterprises typically have multiple compliance requirements but struggle to automate them which leads to downtime as well as resource waste. By having a strong compliance strategy but also ability to quickly automate it provides peace of mind and avoids business interruption.

Policy NameDescription
AWS Disallowed RegionsChecks for instances that are in a disallowed region with the option to terminate them.
AWS EC2 Instances not running FlexNet Inventory AgentChecks for instances that are not running the IT Asset Management Agent.
AWS IAM Role AuditVerifies whether the provided roles exist in an account.
AWS Long-Stopped EC2 InstancesChecks for EC2 instances that have been stopped for a long time with the option to terminate them after approval.
AWS Service Control Policy AuditVerifies whether the provided service control policy is applied across all accounts in an AWS organization.
AWS Untagged ResourcesFinds all taggable AWS resources missing any of the user provided tags with the option to update the tags.
AWS Unused ECS ClustersReports and remediates any ECS clusters that are not currently in use.
Azure AHUB Utilization with Manual EntryReports when AHUB usage in Azure falls outside or inside the number of licenses specified by the user.
Azure Disallowed RegionsCheck for instances that are in a disallowed region with the option to power off or delete them.
Azure Instances not running FlexNet Inventory AgentChecks for instances that are not running the IT Asset Management Inventory Agent.
Azure Long Stopped Compute InstancesChecks for virtual machines that have been stopped for a long time with the option to terminates them after approval.
Azure Policy AuditChecks for policies applied to Azure Subscriptions.
Azure Regulatory ComplianceProvides an overview for the various Regulatory Compliance controls and generates an email with the results.
Azure Subscription AccessLists anyone who has been granted Owner or Contributor access to an Azure subscription.
Azure Tag Resources with Resource Group NameScans all resources in an Azure Subscription, raises an incident if any resources are not tagged with the name of their Resource Group, and remediates by tagging the resource.
Azure Untagged ResourcesFinds all taggable Azure resources missing any of the user-provided tags with the option to update the tags.
Azure Untagged Virtual MachinesChecks for Azure virtual machines missing the user-specified tags. An incident is raised containing the untagged virtual machines, and the user has the option to power off, delete, or tag the virtual machines. This policy is specific to virtual machines (Microsoft.Compute/virtualMachines). The Azure Untagged Resources policy is recommended for finding untagged resources that are not virtual machines.
Billing Center Access ReportGenerates an access report by Billing Center.
Flexera IAM Explicit User RolesIdentifies users in Flexera IAM that have explicit user roles assigned.
GitHub.com Available Seats ReportGets the number of available seats for a licensed GitHub Org and creates an incident if they are out of the policy range.
GitHub.com Repositories without Admin TeamGets the repositories under a GitHub.com Organization and creates incidents for any that do not have at least 1 Team assigned with the “admin” role.
GitHub.com Repository Branches without ProtectionGets the repositories and branches under a GitHub.com Organization and creates incidents for any that do not have protection enabled for their default branch.
GitHub.com Unpermitted Outside CollaboratorsGets all the Outside Collaborators (Users that have been granted access to a repository, but are not Members of the repository owner's Organization) under GitHub.com Organization(s) and creates an incident for each user that is not included in the specified username safelist.
GitHub.com Unpermitted Repository NamesGets the names of all repositories under GitHub.com Organization(s) and creates incidents for any that do not match any of the safelisted regex strings.
GitHub.com Unpermitted Sized RepositoriesGets all repositories under GitHub.com Organization(s) and creates incidents for any that were created longer than a specified number of days ago, and are smaller than a specified size.
GitHub.com Unpermitted Top-Level TeamsGets the top-level / parent Teams for a GitHub.com Org and creates an incident if any do not match the safelisted values.
Google Long-Stopped VM instancesReports on any Google VM instances that have been stopped for a long time with the option to delete them.
Google Unlabeled ResourcesFinds all Google Cloud resources (disks, images, instances, snapshots, buckets, vpn Gateways) missing any of the user-provided labels with the option to update the resources with the missing labels.
ITAM Expiring LicensesLooks up active IT Asset Management Licenses expiring within a defined time period and sends the result as an email.
ITAM Ignored Recent Inventory DatesLooks for machines that are ignored but have been inventoried recently and sends the result as an email.
ITAM Missing Active MachinesLooks for machines that are active but haven't checked in and sends the result as an email.
ITAM Overused LicensesLooks up software licenses and reports in an email any licenses that are overused.
ITAM VMs Missing Host IDLooks for virtual machines that are active but are missing a Host ID.