Item Search

NameAudit NamePluginCategory
1.1.11 Ensure separate partition exists for /var/logCIS Debian 9 Workstation L2 v1.0.1Unix

AUDIT AND ACCOUNTABILITY

1.4 Remove all non-essential services from the host - DPKGCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.4 Remove all non-essential services from the host - RPMCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.6.1.2 Ensure the SELinux state is enforcing - sestatusCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.6.1.3 Ensure SELinux policy is configuredCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.6.2.1 Ensure AppArmor is enabled in the bootloader configuration - security=apparmorCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfinedCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

1.10 Audit Docker files and directories - docker.serviceCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

2.1 Restrict network traffic between containersCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.2 Set the logging levelCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

AUDIT AND ACCOUNTABILITY

2.2.4 Ensure CUPS is not enabledCIS Debian 9 Workstation L2 v1.0.1Unix

SYSTEM AND INFORMATION INTEGRITY

2.3 Allow Docker to make changes to iptablesCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Configure TLS authentication for Docker daemon - tlskeyCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.11 Use authorization pluginCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

IDENTIFICATION AND AUTHENTICATION

3.1 Verify that docker.service file ownership is set to root:rootCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.8 Verify that registry certificate file permissions are set to 444 or more restrictiveCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.13 Verify that Docker server certificate key file ownership is set to root:rootCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.14 Verify that Docker server certificate key file permissions are set to 400CIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.15 Verify that Docker socket file ownership is set to root:dockerCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.16 Verify that Docker socket file permissions are set to 660 or more restrictiveCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.19 Verify that /etc/default/docker file ownership is set to root:rootCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.1 Create a user for the containerCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

4.1.4 Ensure events that modify date and time information are collected - auditctl adjtimexCIS Debian 9 Workstation L2 v1.0.1Unix

CONFIGURATION MANAGEMENT

4.1.4 Ensure events that modify date and time information are collected - clock_settimeCIS Debian 9 Workstation L2 v1.0.1Unix

CONFIGURATION MANAGEMENT

4.1.4 Ensure events that modify date and time information are collected - settimeofday,adjtimex x64CIS Debian 9 Workstation L2 v1.0.1Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify user/group information are collected - auditctl /etc/passwdCIS Debian 9 Workstation L2 v1.0.1Unix

AUDIT AND ACCOUNTABILITY

4.1.5 Ensure events that modify user/group information are collected - auditctl /etc/security/opasswdCIS Debian 9 Workstation L2 v1.0.1Unix

AUDIT AND ACCOUNTABILITY

4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/apparmorCIS Debian 9 Workstation L2 v1.0.1Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - /usr/share/selinuxCIS Debian 9 Workstation L2 v1.0.1Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/selinuxCIS Debian 9 Workstation L2 v1.0.1Unix

CONFIGURATION MANAGEMENT

4.1.8 Ensure login and logout events are collected - auditctl lastlogCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - /var/log/wtmpCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - auditctl /var/log/wtmpCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.10 Ensure discretionary access control permission modification events are collected - auditctl chmod fchmod fchmodatCIS Debian 9 Workstation L2 v1.0.1Unix

CONFIGURATION MANAGEMENT

4.1.15 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d/CIS Debian 9 Workstation L2 v1.0.1Unix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure system administrator actions (sudolog) are collected - /var/log/sudo.logCIS Debian 9 Workstation L2 v1.0.1Unix

AUDIT AND ACCOUNTABILITY

4.1.17 Ensure kernel module loading and unloading is collected - auditctl init_moduleCIS Debian 9 Workstation L2 v1.0.1Unix

CONFIGURATION MANAGEMENT

5.4.5 Ensure default user shell timeout is 900 seconds or less - /etc/profileCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

5.4.5 Ensure default user shell timeout is 900 seconds or less - /etc/profile.d/*.shCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL

5.5 Do not mount sensitive host system directories on containersCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.6 Do not run ssh within containersCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.8 Open only needed ports on containerCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.9 Do not share the host's network namespaceCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.19 Do not set mount propagation mode to sharedCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.22 Do not docker exec commands with privileged optionCIS Docker 1.11.0 v1.0.0 L2 DockerUnix
5.24 Confirm cgroup usageCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.2.6 Ensure root PATH IntegrityCIS Debian 9 Workstation L1 v1.0.1Unix

CONFIGURATION MANAGEMENT

6.2.7 Ensure all users' home directories existCIS Debian 9 Workstation L1 v1.0.1Unix

CONFIGURATION MANAGEMENT

6.2.14 Ensure no users have .rhosts filesCIS Debian 9 Workstation L1 v1.0.1Unix

IDENTIFICATION AND AUTHENTICATION

6.5 Avoid container sprawlCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY