Item Search

NameAudit NamePluginCategory
5.1.1 Ensure Image Vulnerability Scanning is enabledCIS Google Kubernetes Engine (GKE) Autopilot v1.1.0 L2GCP

RISK ASSESSMENT

5.1.1 Ensure Image Vulnerability Scanning is enabledCIS Google Kubernetes Engine (GKE) v1.7.0 L2GCP

RISK ASSESSMENT

5.5.2 Ensure Node Auto-Repair is enabled for GKE nodesCIS Google Kubernetes Engine (GKE) v1.7.0 L2GCP

RISK ASSESSMENT

5.27 Ensure that container health is checked at runtimeCIS Docker v1.7.0 L1 Docker - LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

6.7 Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing trafficCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

RISK ASSESSMENT

6.7 Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing trafficCIS Palo Alto Firewall 11 v1.1.0 L1Palo_Alto

RISK ASSESSMENT

6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is availableCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

RISK ASSESSMENT

6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is availableCIS Palo Alto Firewall 11 v1.1.0 L1Palo_Alto

RISK ASSESSMENT

9.1.3.1 Ensure that Defender for Servers is set to 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

9.1.3.2 Ensure that 'Vulnerability assessment for machines' component status is set to 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT

9.1.3.3 Ensure that 'Endpoint protection' component status is set to 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

9.1.3.4 Ensure that 'Agentless scanning for machines' component status is set to 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT

9.1.3.5 Ensure that 'File Integrity Monitoring' component status is set to 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT

9.1.4.1 Ensure That Microsoft Defender for Containers Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT

9.1.5.1 Ensure That Microsoft Defender for Storage Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT

9.1.6.1 Ensure That Microsoft Defender for App Services Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.7.1 Ensure That Microsoft Defender for Azure Cosmos DB Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.7.2 Ensure That Microsoft Defender for Open-Source Relational Databases Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.7.3 Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.7.4 Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.8.1 Ensure That Microsoft Defender for Key Vault Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT

9.1.9.1 Ensure That Microsoft Defender for Resource Manager Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

ACCESS CONTROL, RISK ASSESSMENT

9.1.16 Ensure that Microsoft Defender External Attack Surface Monitoring (EASM) is enabledCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT

9.1.17 [LEGACY] Ensure That Microsoft Defender for DNS Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION

9.2.1 Ensure That Microsoft Defender for IoT Hub Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.5.14.1 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGONCIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

RISK ASSESSMENT

18.5.14.1 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOLCIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

RISK ASSESSMENT

18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGONCIS Microsoft Windows 8.1 v2.4.1 L1Windows

RISK ASSESSMENT

18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOLCIS Microsoft Windows 8.1 v2.4.1 L1Windows

RISK ASSESSMENT

20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

RISK ASSESSMENT

20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

RISK ASSESSMENT

20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

RISK ASSESSMENT

20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

RISK ASSESSMENT