Item Search

NameAudit NamePluginCategory
1.1.1.3 Ensure mounting of jffs2 filesystems is disabled - modprobeCIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.1.3 Ensure that the --insecure-allow-any-token argument is not setCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.5 Ensure that the --insecure-bind-address argument is not setCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.1.6 Ensure that the --insecure-port argument is set to 0CIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.1.13 Ensure that the admission control plugin SecurityContextDeny is setCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

ACCESS CONTROL

1.1.17 Ensure noexec option set on /dev/shm partitionCIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.1.18 Ensure nodev option set on removable media partitionsCIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.1.18 Ensure that the --audit-log-maxsize argument is set to 100 or as appropriateCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

AUDIT AND ACCOUNTABILITY

1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - certificateCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.33 Ensure that the admission control plugin NodeRestriction is setCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

ACCESS CONTROL

1.1.37 Ensure that the AdvancedAuditing argument is not set to false - audit-policy-file contentsCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.1.39 Ensure that the API Server only makes use of Strong Cryptographic CiphersCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.2 Ensure GPG keys are configuredCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.1 Ensure sudo is installedCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

1.3.2 Ensure sudo commands use ptyCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

1.3.2 Ensure that the --profiling argument is set to falseCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.3.5 Ensure that the --root-ca-file argument is set as appropriateCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.4.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.3 Ensure that the controller manager pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.4 Ensure that the controller manager pod specification file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.8 Ensure that the etcd pod specification file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.10 Ensure that the Container Network Interface file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.13 Ensure that the admin.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.15 Ensure that the scheduler.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.16 Ensure that the scheduler.conf file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.17 Ensure that the controller-manager.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.5.1 Ensure that the --cert-file and --key-file arguments are set as appropriate - ca-fileCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.5.1 Ensure that the --cert-file and --key-file arguments are set as appropriate - keyCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.2 Ensure that the --client-cert-auth argument is set to trueCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.6.4 Ensure core dumps are restricted - storageCIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

1.6.7 Configure Network policies as appropriateCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix
1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - clusterrolebindingCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix

CONFIGURATION MANAGEMENT

1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - rolebindingCIS Kubernetes 1.11 Benchmark v1.3.0 L2Unix

CONFIGURATION MANAGEMENT

1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - rolebindingCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix

CONFIGURATION MANAGEMENT

1.7.2 Do not admit containers wishing to share the host process ID namespaceCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.7.3 Do not admit containers wishing to share the host IPC namespaceCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.10 Ensure updates, patches, and additional security software are installedCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.1.1 Ensure that the --allow-privileged argument is set to falseCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

ACCESS CONTROL

2.1.2 Ensure that the --anonymous-auth argument is set to falseCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

2.1.4 Ensure that the --client-ca-file argument is set as appropriateCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

2.1.8 Ensure that the --make-iptables-util-chains argument is set to trueCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.10 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - certCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.11 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - tls-cert-fileCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

2.1.11 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - tls-private-key-fileCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

2.1.12 Ensure that the --rotate-certificates argument is not set to falseCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.8 Ensure that the client certificate authorities file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.9 Ensure that the kubelet configuration file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT