FINDING ID
TITAN-BANKING-20260419-F0001
✔ FIXED + VERIFIED ON PROD (PCI-SCOPED)
Azure
TITAN SCOUT
CRITICAL
Public Blob Access Enabled
Azure Storage account 'titanlive8909pub' has allowBlobPublicAccess=true. Any container in this account can be made publicly rea...
■ SECTION 1 · RESOURCE / PCI SCOPE
| SUBSCRIPTION (CDE) | 4f29d094-1079-44c9-acb0-4d73a7a2dd34 |
| RESOURCE GROUP | titan-live-20260419 |
| PCI SCOPE | cardholder-data-environment (CDE) |
| RESOURCE NAME | titanlive8909pub |
| RESOURCE TYPE | Microsoft.Storage/storageAccounts |
| REGION | East US |
| FULL RESOURCE ID | /subscriptions/4f29d094-1079-44c9-acb0-4d73a7a2dd34/resourceGroups/titan-live-20260419/providers/Microsoft.Storage/storageAccounts/titanlive8909pub |
■ SECTION 2 · FINDING DETAILS
Azure Storage account 'titanlive8909pub' has allowBlobPublicAccess=true. Any container in this account can be made publicly readable.
■ SECTION 3 · BANKING REGULATORY MAPPING
PCI DSS 1.2.1 + 3.4 Cardholder Data Protection + GLBA 16 CFR 314.4 | original: HIPAA 164.312(a)(1) + NIST 800-53 AC-3
■ SECTION 4 · DETECTED VALUES
{
"allowBlobPublicAccess": true
}
■ SECTION 5 · TARGET COMPLIANT STATE
{
"allowBlobPublicAccess": false
}
■ SECTION 6 · AI-GENERATED REMEDIATION (Claude Sonnet 4, April 19, 2026)
REMEDIATION ACTION
az storage account update -n titanlive8909pub -g titan-live-20260419 --allow-blob-public-access false
ROLLBACK / REVERSAL
az storage account update -n titanlive8909pub -g titan-live-20260419 --allow-blob-public-access true
RISK ASSESSMENT
LOW
■ SECTION 7 · AUDIT TRAIL (QSA / EXAMINER READY)
Scan ID: TITAN-BANKING-20260419
Detected by: TITAN SCOUT
Detected at: April 19, 2026
Engagement: BANKING / PCI-SCOPED
■ SECTION 8 · FIX APPLIED + VERIFIED ON PCI-SCOPED INFRA (April 19, 2026)
FIX APPLIED AT
2026-04-19T20:39:35+00:00
DURATION
3.44s
EXIT CODE
0
POST-FIX
✔ RESOLVED — POST-FIX RESCAN CONFIRMS COMPLIANT
FIX STDOUT (from live run)
{
"accessTier": "Hot",
"accountMigrationInProgress": null,
"allowBlobPublicAccess": false,
"allowCrossTenantReplication": false,
"allowSharedKeyAccess": null,
"allowedCopyScope": null,
"azureFilesIdentityBasedAuthentication": null,
"blobRestoreStatus": null,
"creationTime": "2026-04-19T20:35:23.561469+00:00",
"customDomain": null,
"defaultToOAuthAuthentication": null,
"dnsEndpointType": null,
"dualStackEndpointPreference"
■ SECTION 9 · EXCEPTION RECORDING & APPROVER
NO EXCEPTION ON RECORD — RISK IS ACTIVE