Item Search

NameAudit NamePluginCategory
1.1.4 Ensure that the controller manager pod specification file ownership is set to root:rootCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.1.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

1.1.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.1.10 Ensure that the Container Network Interface file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

1.1.14 Ensure that the admin.conf file ownership is set to root:rootCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.1.14 Ensure that the admin.conf file ownership is set to root:rootCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

1.1.14 Ensure that the default administrative credential file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

1.1.16 Ensure that the scheduler.conf file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

1.1.16 Ensure that the scheduler.conf file ownership is set to root:rootCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.1.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

1.1.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictiveCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictiveCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.2.1 Set 'privilege 1' for local users - 'All users have encrypted passwords'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

2.4.3 Ensure admin accounts with different privileges have their correct profiles assignedCIS Fortigate 7.0.x v1.3.0 L1FortiGate

ACCESS CONTROL

3.1 Ensure that the docker.service file ownership is set to root:rootCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL

3.5 Ensure that the /etc/docker directory ownership is set to root:rootCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL

3.7 Ensure that registry certificate file ownership is set to root:rootCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL

3.7 Ensure the SQL Server's Full-Text Service Account is Not an AdministratorCIS SQL Server 2016 Database L1 OS v1.4.0Windows

ACCESS CONTROL

3.7 Ensure the SQL Server's Full-Text Service Account is Not an AdministratorCIS SQL Server 2017 Database L1 OS v1.3.0Windows

ACCESS CONTROL

3.9 Ensure that TLS CA certificate file ownership is set to root:rootCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL

3.12 Ensure the 'SYSADMIN' Role is Limited to Administrative or Built-in AccountsCIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL

3.23 Ensure that the Containerd socket file ownership is set to root:rootCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 13 OS v1.2.0Unix

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 14 OS v 1.2.0Unix

ACCESS CONTROL

4.1 Ensure Interactive Login is DisabledCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLUnix

ACCESS CONTROL

4.1.2 Ensure that the kubelet service file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 WorkerUnix

ACCESS CONTROL

4.1.6 Avoid use of system:masters groupCIS Google Kubernetes Engine (GKE) Autopilot v1.1.0 L1GCP

ACCESS CONTROL

4.1.6 Avoid use of system:masters groupCIS Google Kubernetes Engine (GKE) v1.7.0 L1GCP

ACCESS CONTROL

4.1.6 Ensure that the --kubeconfig kubelet.conf file ownership is set to root:rootCIS Kubernetes v1.10.0 L1 WorkerUnix

ACCESS CONTROL

4.1.10 Ensure that the kubelet --config configuration file ownership is set to root:rootCIS Kubernetes v1.20 Benchmark v1.0.1 L1 WorkerUnix

ACCESS CONTROL

5.1.8 Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes clusterCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

5.2.2 Minimize the admission of privileged containersCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

5.2.7 Minimize the admission of root containersCIS Kubernetes v1.10.0 L2 MasterUnix

ACCESS CONTROL

5.6 Adding authorised users in cron.allowCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL

5.6 Ensure 'CREATE USER' is Not Granted to Non-Administrative UsersCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB

ACCESS CONTROL

5.18 Ensure that host devices are not directly exposed to containersCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL

5.23 Ensure that docker exec commands are not used with the privileged optionCIS Docker v1.7.0 L2 Docker - LinuxUnix

ACCESS CONTROL

5.26 Ensure that the container is restricted from acquiring additional privilegesCIS Docker v1.7.0 L1 Docker - LinuxUnix

ACCESS CONTROL

6.1.1 Ensure sudo is installedCIS IBM AIX 7 v1.0.0 L2Unix

ACCESS CONTROL

6.2.4 Ensure cron.allow is configuredCIS IBM AIX 7 v1.0.0 L1Unix

ACCESS CONTROL

10.3 Restrict manager applicationCIS Apache Tomcat 10 L2 v1.1.0Unix

ACCESS CONTROL

10.17 Setting Security Lifecycle Listener - check for config componentCIS Apache Tomcat 10 L1 v1.1.0Unix

ACCESS CONTROL

10.17 Setting Security Lifecycle Listener - check for umask uncommented in startupCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

10.17 Setting Security Lifecycle Listener - check for umask uncommented in startupCIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL

Monterey - Require Administrator Password to Modify System-Wide PreferencesNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL