Item Search

NameAudit NamePluginCategory
1.2.3 Set 'seconds' for 'ssh timeout' for 60 seconds or lessCIS Cisco IOS XR 7.x v1.0.1 L1Cisco

IDENTIFICATION AND AUTHENTICATION

1.3.1 Ensure 'Minimum Password Complexity' is enabledCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.6.4 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes 1.11 Benchmark v1.3.0 L2Unix
1.6.5 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes 1.7.0 Benchmark v1.1.0 L2Unix
1.6.5 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix
1.7 Ensure MariaDB is Run Under a Sandbox EnvironmentCIS MariaDB 10.11 v1.0.0 L2 MariaDB RDBMS on Linux UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure MySQL is Run Under a Sandbox EnvironmentCIS Oracle MySQL Enterprise Edition 8.0 v1.5.0 L2 MySQL RDBMS on Linux UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 (L2) Ensure Safe Attachments policy is enabledCIS Microsoft 365 Foundations v6.0.1 L2 E5microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

2.3.3 Verify Display Sleep is set to a value larger than the Screen SaverCIS Apple OSX 10.11 El Capitan L1 v1.1.0Unix

ACCESS CONTROL

2.3.3 Verify Display Sleep is set to a value larger than the Screen SaverCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

3.1 Ensure that the docker.service file ownership is set to root:rootCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL

3.2 Ensure that docker.service file permissions are appropriately setCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL, MEDIA PROTECTION

3.3 Ensure that docker.socket file ownership is set to root:rootCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL

3.4 Ensure that docker.socket file permissions are set to 644 or more restrictiveCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL, MEDIA PROTECTION

3.17 Ensure that the daemon.json file ownership is set to root:rootCIS Docker v1.8.0 L2 OS LinuxUnix

ACCESS CONTROL

3.18 Ensure that daemon.json file permissions are set to 644 or more restrictiveCIS Docker v1.8.0 L2 OS LinuxUnix

ACCESS CONTROL, MEDIA PROTECTION

4.4 Enable Auditing of Process and Privilege Events - AUE_SETEUID : cisCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Enable Auditing of Process and Privilege Events - AUE_SETGID : cisCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Enable Auditing of Process and Privilege Events - AUE_SETREUID : cisCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Enable Auditing of Process and Privilege Events - AUE_SETSID : cisCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.4 Enable Auditing of Process and Privilege Events - AUE_SETUID : cisCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Ensure Content trust for Docker is EnabledCIS Docker v1.8.0 L2 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

4.6.3 Apply Security Context to Pods and ContainersCIS Google Kubernetes Engine GKE Autopilot v1.3.0 L2GCP

CONFIGURATION MANAGEMENT

4.6.3 Apply Security Context to Pods and ContainersCIS Google Kubernetes Engine GKE v1.9.0 L2 GCPGCP

CONFIGURATION MANAGEMENT

5.1.4.5 (L1) Ensure Local Administrator Password Solution is enabledCIS Microsoft 365 Foundations v6.0.1 L1 E3microsoft_azure

IDENTIFICATION AND AUTHENTICATION

5.15 Ensure that the 'on-failure' container restart policy is set to '5'CIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

5.18 Ensure HTTP Header Permissions-Policy is set appropriatelyCIS Apache HTTP Server 2.4 v2.3.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

5.18 Ensure that host devices are not directly exposed to containersCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL

5.19 Ensure that the default ulimit is overwritten at runtime if neededCIS Docker v1.8.0 L1 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.20 Ensure mount propagation mode is not set to sharedCIS Docker v1.8.0 L1 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.21 Ensure that the host's UTS namespace is not sharedCIS Docker v1.8.0 L1 OS LinuxUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.26 Ensure that the container is restricted from acquiring additional privilegesCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL

5.30 Ensure that Docker's default bridge "docker0" is not usedCIS Docker v1.8.0 L2 OS LinuxUnix

CONFIGURATION MANAGEMENT

6.4 Avoid image sprawlCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

18.11.1 Ensure 'Disable HTTP proxy features: Disable WPAD' is set to 'Enabled: Checked'CIS Microsoft Windows Server 2022 v5.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.11.1 Ensure 'Disable HTTP proxy features: Disable WPAD' is set to 'Enabled: Checked'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.11.1 Ensure 'Disable HTTP proxy features: Disable WPAD' is set to 'Enabled: Checked'CIS Microsoft Windows Server 2022 v5.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.11.1 Ensure 'Disable HTTP proxy features: Disable WPAD' is set to 'Enabled: Checked'CIS Microsoft Windows Server 2025 v2.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.11.1 Ensure 'Disable HTTP proxy features: Disable WPAD' is set to 'Enabled: Checked'CIS Microsoft Windows 11 Enterprise v5.0.1 L1Windows

CONFIGURATION MANAGEMENT

18.11.1 Ensure 'Disable HTTP proxy features: Disable WPAD' is set to 'Enabled: Checked'CIS Microsoft Windows 11 Enterprise v5.0.1 L1 BLWindows

CONFIGURATION MANAGEMENT

20.13 (L1) Ensure 'Web browser is supported and secured'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

CIS VMware ESXi 5.5 v1.2.0 Level 1CIS VMware ESXi 5.5 v1.2.0 Level 1VMware
CIS VMware ESXi 5.5 v1.2.0 Level 2CIS VMware ESXi 5.5 v1.2.0 Level 2VMware
CIS VMware ESXi 6.5 v1.0.0 Level 2CIS VMware ESXi 6.5 v1.0.0 Level 2VMware
DKER-EE-001050 - TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

DKER-EE-002070 - The Docker Enterprise default seccomp profile must not be disabled.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002160 - Docker Enterprise incoming container traffic must be bound to a specific host interface.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002770 - Docker Enterprise container health must be checked at runtime.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

DKER-EE-005060 - Docker Swarm must have the minimum number of manager nodes.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005070 - Docker Enterprise Swarm manager auto-lock key must be rotated periodically.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT