Item Search

NameAudit NamePluginCategory
1.1.12 Ensure auditing is configured for Docker files and directories - /etc/containerd/config.tomlCIS Docker v1.8.0 L2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

1.3 Do not use development tools in productionCIS Docker 1.6 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.6.4 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix
1.7 Ensure MariaDB is Run Under a Sandbox EnvironmentCIS MariaDB 10.11 v1.0.0 L2 MariaDB RDBMS UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure MariaDB is Run Under a Sandbox EnvironmentCIS MariaDB 10.6 on Linux L2 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure MySQL is Run Under a Sandbox EnvironmentCIS Oracle MySQL Community Server 8.0 v1.2.0 L2 MySQL RDBMS UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure MySQL is Run Under a Sandbox EnvironmentCIS Oracle MySQL Enterprise Edition 8.0 v1.5.0 L2 MySQL RDBMS UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure MySQL is Run Under a Sandbox EnvironmentCIS Oracle MySQL Enterprise Edition 8.4 v1.1.0 L2 MySQL RDBMS UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure MySQL is Run Under a Sandbox EnvironmentCIS Oracle MySQL Community Server 8.4 v1.1.0 L2 MySQL RDBMS UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure MySQL is Run Under a Sandbox EnvironmentCIS Oracle MySQL Community Server 8.0 v1.2.0 L2 MySQL RDBMS on Linux UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure MySQL is Run Under a Sandbox EnvironmentCIS Oracle MySQL Community Server 8.4 v1.1.0 L2 MySQL RDBMS on Linux UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Ensure MySQL is Run Under a Sandbox EnvironmentCIS Oracle MySQL Enterprise Edition 8.4 v1.1.0 L2 MySQL RDBMS on Linux UnixUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.9 Ensure the default ulimit is configured appropriatelyCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

2.11 Ensure the default cgroup usage has been confirmedCIS Docker v1.8.0 L2 OS LinuxUnix

SYSTEM AND SERVICES ACQUISITION

2.12 Ensure base device size is not changed until neededCIS Docker v1.8.0 L2 OS LinuxUnix

CONFIGURATION MANAGEMENT

2.18 Ensure that a daemon-wide custom seccomp profile is applied if appropriateCIS Docker v1.8.0 L2 OS LinuxUnix

SYSTEM AND SERVICES ACQUISITION

3.9 Ensure that TLS CA certificate file ownership is set to root:rootCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL

3.10 Ensure that TLS CA certificate file permissions are set to 444 or more restrictivelyCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL, MEDIA PROTECTION

3.24 Ensure that the Containerd socket file permissions are set to 660 or more restrictivelyCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL, MEDIA PROTECTION

4.1 Ensure that a user for the container has been createdCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL

4.3 Ensure that unnecessary packages are not installed in the containerCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

4.3.2.7 Ensure mrouted is not in useCIS IBM AIX 7 v1.1.0 L2Unix

CONFIGURATION MANAGEMENT

4.4 Ensure images are scanned and rebuilt to include security patchesCIS Docker v1.8.0 L1 OS LinuxUnix

RISK ASSESSMENT

4.5 Configure Solaris Auditing - active audit policiesCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - active user default audit flagsCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - configured audit policiesCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - configured user default audit flagsCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - not_terminatedCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - p_minfreeCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - PluginCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Configure Solaris Auditing - userattr audit_flags rootCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.7 Ensure update instructions are not used alone in DockerfilesCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

4.8 Ensure setuid and setgid permissions are removedCIS Docker v1.8.0 L2 OS LinuxUnix

ACCESS CONTROL

4.9 Ensure that COPY is used instead of ADD in DockerfilesCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

4.11 Ensure only verified packages are installedCIS Docker v1.8.0 L2 OS LinuxUnix

SYSTEM AND SERVICES ACQUISITION

4.12 Ensure all signed artifacts are validatedCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.5.1 Ensure Container-Optimized OS (cos_containerd) is used for GKE Node imagesCIS Google Kubernetes Engine GKE v1.9.0 L1 GCPGCP

CONFIGURATION MANAGEMENT

5.6 Ensure sensitive host system directories are not mounted on containersCIS Docker v1.8.0 L1 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.9 Ensure that only needed ports are open on the containerCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

5.14 Ensure that incoming container traffic is bound to a specific host interfaceCIS Docker v1.8.0 L1 OS LinuxUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.16 Ensure that the host's process namespace is not sharedCIS Docker v1.8.0 L1 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.17 Ensure that the host's IPC namespace is not sharedCIS Docker v1.8.0 L1 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.2 Ensure that container sprawl is avoidedCIS Docker v1.8.0 L1 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

CIS_Docker_1.6_v1.0.0_L1_Docker.audit Level 1CIS Docker 1.6 v1.0.0 L1 DockerUnix
CIS_Docker_1.11.0_v1.0.0_L2.audit Level 2CIS Docker 1.11.0 v1.0.0 L2 DockerUnix
CIS_Docker_1.12.0_v1.0.0_L1.audit Level 1CIS Docker 1.12.0 v1.0.0 L1 DockerUnix
CIS_Docker_1.13.0_L1_v1.0.0.audit Level 1CIS Docker 1.13.0 v1.0.0 L1 DockerUnix
CIS_Docker_1.13.0_L2_v1.0.0.audit Level 2CIS Docker 1.13.0 v1.0.0 L2 DockerUnix
DKER-EE-002970 - The Docker Enterprise per user limit login session control must be set per the requirements in the System Security Plan (SSP).DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2Unix

ACCESS CONTROL

DKER-EE-006280 - Docker Enterprise Universal Control Plane (UCP) must be configured to use TLS 1.2.DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2Unix

ACCESS CONTROL