Cloudformation fixes
005 – Privilege escalation016 – Insecure encryption algorithm - SSL/TLS024 – Unrestricted access between network segments - AWS031 – Excessive privileges - AWS044 – Insecure HTTP methods enabled073 – Improper authorization control for web services - RDS081 – Lack of multi-factor authentication099 – Non-encrypted confidential information - S3 Server Side Encryption109 – Unrestricted access between network segments - RDS165 – Insecure service configuration - AWS Security Groups177 – Insecure service configuration - Security Groups203 – Unauthorized access to files - Cloud Storage Services246 – Non-encrypted confidential information - DB250 – Non-encrypted hard drives256 – Lack of protection against deletion - RDS258 – Lack of protection against deletion - ELB259 – Lack of protection against deletion - DynamoDB281 – Use of an insecure channel - Cloud Infrastructure313 – Insecure service configuration - Certificates325 – Excessive privileges - Wildcards332 – Insecure protocol allowed in security group333 – Insecure service configuration - EC2335 – Insecure service configuration - Bucket363 – Weak credential policy - Password strength372 – Use of an insecure channel - HTTP394 – Insufficient data authenticity validation - CloudTrail Logs396 – Insecure service configuration - KMS400 – Traceability Loss - AWS406 – Non-encrypted confidential information - EFS407 – Non-encrypted confidential information - EBS Volumes408 – Traceability Loss - API Gateway433 – Non-encrypted confidential information - Redshift Cluster