Item Search

NameAudit NamePluginCategory
1.1.9 Ensure that the admission control policy is not set to AlwaysAdmitCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

ACCESS CONTROL

1.1.16 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.1.17 Ensure that the --audit-log-maxsize argument is set to 100 or as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.1.18 Ensure that the --authorization-mode argument is not set to AlwaysAllowCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

ACCESS CONTROL

1.1.20 Ensure that the --kubelet-https argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.23 Ensure that the --service-account-lookup argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.25 Ensure that the --service-account-key-file argument is set as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.26 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate - etcd-keyfileCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.33 Ensure that the --experimental-encryption-provider-config argument is set as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix
1.1.35 Ensure that the admission control policy is set to EventRateLimitCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

ACCESS CONTROL

1.4.13 Ensure that the admin.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.5.1 Ensure that the --cert-file and --key-file arguments are set as appropriate - key-fileCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.5.4 Ensure that the --peer-cert-file and --peer-key-file arguments are set as appropriate - peer-cert-fileCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.5.5 Ensure that the --peer-client-cert-auth argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.5.8 Ensure that the --max-wals argument is set to 0CIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.6.1 Ensure that the cluster-admin role is only used where requiredCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.6.4 Create network segmentation using Network PoliciesCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 Ensure that the --client-ca-file argument is set as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

2.1.10 Ensure that the --hostname-override argument is not setCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.1.11 Ensure that the --event-qps argument is set to 0CIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.1.12 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - tls-cert-fileCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

2.1.15 Ensure that the RotateKubeletServerCertificate argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

2.2.3 Ensure that the kubelet service file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.4 Ensure that the kubelet service file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.3.2 Secure screen saver corners - top left cornerCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

2.6.7 Monitor Location Services Access - evaluate applicationCIS Apple macOS 10.12 L2 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

2.6.8 Disable sending diagnostic and usage data to AppleCIS Apple macOS 10.12 L2 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.7.5 iCloud Drive Desktop syncCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

3.1.2 Ensure that the --basic-auth-file argument is not setCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

3.1.4 Ensure that the --insecure-bind-address argument is not setCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

3.1.18 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate - etcd-keyfileCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

3.1.19 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - tls-private-key-fileCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

3.4 Control access to audit records - /var/auditCIS Apple macOS 10.12 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.5 Retain install.log for 365 or more daysCIS Apple macOS 10.12 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

4.1 Restrict access to $CATALINA_HOMECIS Apache Tomcat 9 L1 v1.2.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.4 Use a separate timestamp for each user/tty comboCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

5.7 Enable OCSP and CRL certificate checking - OCSPStyleCIS Apple macOS 10.12 L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.8 Do not enable the 'root' account - root accountCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

5.13 Disable ability to login to another user's active and locked sessionCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

5.17 Disable Fast User SwitchingCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

6.1.4 Disable 'Allow guests to connect to shared folders' - SMB SharingCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

6.4 Safari disable Internet Plugins for global useCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.2 iSight Camera Privacy and Confidentiality ConcernsCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.5 Firewall ConsiderationCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.6 Automatic Actions for Optical MediaCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

7.9 FileVault and Local Account Password Reset using AppleIDCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

7.10 Repairing permissions is no longer neededCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

10.7 Turn off session facade recyclingCIS Apache Tomcat 9 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

10.14 Do not allow cross context requestsCIS Apache Tomcat 9 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

10.18 Use the logEffectiveWebXml and metadata-complete settings for deploying applications in productionCIS Apache Tomcat 9 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY