Item Search

NameAudit NamePluginCategory
1.2.2 Ensure that the --basic-auth-file argument is not set - openshift-kube-apiserverCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.2 Ensure that the --token-auth-file parameter is not setCIS Kubernetes Benchmark v1.9.0 L1 MasterUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.2 Ensure that the --token-auth-file parameter is not setCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.3 Ensure that the --DenyServiceExternalIPs is not setCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.3 Ensure that the --DenyServiceExternalIPs is not setCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.3 Ensure that the --token-auth-file parameter is not set - KubeApiServersCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.3 Ensure that the --token-auth-file parameter is not set - openshift-apiserverCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.3 Ensure that the DenyServiceExternalIPs is setCIS Kubernetes Benchmark v1.9.0 L1 MasterUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

1.3 (L1) Host hardware must enable Intel TXT, if availableCIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.4 (L1) Host hardware must enable and configure a TPM 2.0CIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.5 (L1) Host integrated hardware management controller must be secureCIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.6 (L1) Host integrated hardware management controller must enable time synchronizationCIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.9 (L2) Host hardware must enable AMD SEV-ES, if availableCIS VMware ESXi 8.0 v1.1.0 L2VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.10 (L2) Host hardware must enable Intel SGX, if availableCIS VMware ESXi 8.0 v1.1.0 L2VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

2.6.7 Audit Lockdown ModeCIS Apple macOS 13.0 Ventura v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

2.11 (L1) Host must use sufficient entropy for cryptographic operationsCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

2.12 (L2) Host must enable volatile key destructionCIS VMware ESXi 8.0 v1.1.0 L2VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

3.24 (L1) Host must display a login banner for the DCUI and Host ClientCIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

3.25 (L1) Host must display a login banner for SSH connectionsCIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

4.3.3 daemonCIS IBM AIX 7.1 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

4.5.1 Configure Image Provenance using ImagePolicyWebhook admission controllerCIS Google Kubernetes Engine (GKE) v1.5.0 L2GCP

CONFIGURATION MANAGEMENT, MAINTENANCE

4.5.3.1 OpenSSH: Minimum version is 8.1CIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

4.5.3.4 sshd_config: Restrict users and groups allowed access via OpenSSHCIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

4.5.3.6 sshd_config: Banner exists and message contains 'Only authorized users allowed'CIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

4.5.3.10 sshd_config: LogLevel is 'INFO' or 'VERBOSE'CIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

4.5.3.11 sshd_config: sftp-server arguments include '-u 027 -f AUTH -l INFO'CIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

4.5.3.12 sshd_config: MaxAuthTries is '4'CIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

4.5.3.13 sshd_config: PermitUserEnvironment is 'no'CIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

4.5.3.16 sshd_config, ssh_config: CiphersCIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.2.10 Ensure no users have .netrc filesCIS SUSE Linux Enterprise Server 12 L1 v3.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.2.10 Ensure no users have .netrc filesCIS SUSE Linux Enterprise Workstation 12 L1 v3.1.0Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.2.10 Ensure no users have .netrc filesCIS SUSE Linux Enterprise 15 Workstation L1 v1.1.1Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.2.10 Ensure no users have .netrc filesCIS SUSE Linux Enterprise 15 Server L1 v1.1.1Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.4 (L1) Host SSH daemon, if enabled, must not allow host-based authenticationCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.5 (L1) Host SSH daemon, if enabled, must set a timeout count on idle sessionsCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.6 (L1) Host SSH daemon, if enabled, must set a timeout interval on idle sessionsCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.7 (L1) Host SSH daemon, if enabled, must display the system login banner before granting accessCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.8 (L1) Host SSH daemon, if enabled, must ignore .rhosts filesCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.9 (L1) Host SSH daemon, if enabled, must disable stream local forwardingCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.10 (L1) Host SSH daemon, if enabled, must disable TCP forwardingCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.11 (L1) Host SSH daemon, if enabled, must not permit tunnelsCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

6.5.12 (L1) Host SSH daemon, if enabled, must not permit user environment settingsCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

7.1 (L1) Virtual machines must enable Secure BootCIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

8.3.3 (L1) Ensure secure protocols are used for virtual serial port accessCIS VMware ESXi 7.0 v1.4.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

8.3.3 Ensure secure protocols are used for virtual serial port accessCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

8.4 (L1) VMware Tools on deployed virtual machines must prevent being recustomizedCIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

8.6 (L1) VMware Tools must limit the automatic removal of featuresCIS VMware ESXi 8.0 v1.1.0 L1VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

Big Sur - Verify remote disconnection of sessionsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

MAINTENANCE

Catalina - Verify remote disconnection of sessionsNIST macOS Catalina v1.5.0 - All ProfilesUnix

MAINTENANCE

Monterey - Verify remote disconnection of sessionsNIST macOS Monterey v1.0.0 - All ProfilesUnix

MAINTENANCE