Aws fixes
005 – Privilege escalation016 – Insecure encryption algorithm - SSL/TLS024 – Unrestricted access between network segments - AWS031 – Excessive privileges - AWS047 – Automatic information enumeration050 – Guessed weak credentials070 – Insecure service configuration - ELB073 – Improper authorization control for web services - RDS099 – Non-encrypted confidential information - S3 Server Side Encryption109 – Unrestricted access between network segments - RDS165 – Insecure service configuration - AWS177 – Insecure service configuration - Security Groups181 – Insecure service configuration - DynamoDB202 – Unauthorized access to files - Debug APK203 – Unauthorized access to files - S3 Bucket214 – Business information leak - Credentials224 – Business information leak - AWS241 – Authentication mechanism absence or evasion - AWS246 – Non-encrypted confidential information - DB247 – Non-encrypted confidential information - AWS250 – Non-encrypted hard drives252 – Automatic information enumeration - Open ports253 – Automatic information enumeration - AWS256 – Lack of protection against deletion - RDS257 – Lack of protection against deletion - EC2258 – Lack of protection against deletion - ELB259 – Lack of protection against deletion - DynamoDB277 – Weak credential policy - Password Expiration281 – Use of an insecure channel - AWS325 – Excessive privileges - Wildcards333 – Insecure service configuration - EC2334 – Insecure service configuration - IAM335 – Insecure service configuration - Bucket363 – Weak credential policy - Password strength364 – Weak credential policy - Temporary passwords372 – Use of an insecure channel - HTTP378 – Non-encrypted confidential information - Hexadecimal394 – Insufficient data authenticity validation - Cloudtrail Logs396 – Insecure service configuration - KMS399 – Security controls absence - Monitoring400 – Traceability Loss - AWS406 – Non-encrypted confidential information - EFS407 – Non-encrypted confidential information - EBS Volumes408 – Traceability Loss - API Gateway409 – Non-encrypted confidential information - DynamoDB411 – Insecure encryption algorithm - Default encryption430 – Serverless - one dedicated IAM role per function433 – Non-encrypted confidential information - Redshift Cluster