Item Search

NameAudit NamePluginCategory
1.1 Verify all Apple provided software is currentCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.1.16 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.1.17 Ensure that the --audit-log-maxsize argument is set to 100 or as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.1.18 Ensure that the --authorization-mode argument is not set to AlwaysAllowCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

ACCESS CONTROL

1.1.20 Ensure that the --kubelet-https argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.1.23 Ensure that the --service-account-lookup argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.25 Ensure that the --service-account-key-file argument is set as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.26 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate - etcd-keyfileCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.33 Ensure that the --experimental-encryption-provider-config argument is set as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix
1.1.35 Ensure that the admission control policy is set to EventRateLimitCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

ACCESS CONTROL

1.4 Enable system data files and security update installs - 'ConfigDataInstall'CIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.8 (L2) Host integrated hardware management controller must secure authenticationCIS VMware ESXi 8.0 v1.2.0 L2VMware

ACCESS CONTROL

1.10 (L2) Host hardware must enable Intel SGX, if availableCIS VMware ESXi 8.0 v1.2.0 L2VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.12 (L2) Host integrated hardware management controller must deactivate internal networkingCIS VMware ESXi 8.0 v1.2.0 L2VMware

CONFIGURATION MANAGEMENT

2.1.1 Turn off Bluetooth, if no paired devices existCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.2.1 Enable 'Set time and date automatically' - Set time and date automaticallyCIS Apple macOS 10.12 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

2.3.1 Set an inactivity interval of 20 minutes or less for the screen saverCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

2.3.2 Secure screen saver corners - top left cornerCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

2.4.7 Disable Bluetooth SharingCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.4.8 Disable File Sharing - AppleFileServerCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.4.9 Disable Remote ManagementCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.6.3 Enable FirewallCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.7 Monitor Location Services Access - evaluate applicationCIS Apple macOS 10.12 L2 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

2.6.8 Disable sending diagnostic and usage data to AppleCIS Apple macOS 10.12 L2 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.7.5 iCloud Drive Desktop syncCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.10 Enable Secure Keyboard Entry in terminal.appCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

3.4 Control access to audit records - /etc/security/audit_controlCIS Apple macOS 10.12 L1 v1.2.0Unix
3.4 Control access to audit records - /var/auditCIS Apple macOS 10.12 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.5 Retain install.log for 365 or more daysCIS Apple macOS 10.12 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

5.4 Use a separate timestamp for each user/tty comboCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

5.7 Enable OCSP and CRL certificate checking - OCSPStyleCIS Apple macOS 10.12 L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.8 (L1) Host should reject promiscuous mode requests on standard virtual switches and port groupsCIS VMware ESXi 8.0 v1.2.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.8 Do not enable the 'root' account - root accountCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

5.9 (L1) Host must restrict access to a default or native VLAN on standard virtual switchesCIS VMware ESXi 8.0 v1.2.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.13 Disable ability to login to another user's active and locked sessionCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

5.17 Disable Fast User SwitchingCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

6.1.4 Disable 'Allow guests to connect to shared folders' - SMB SharingCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

6.2.1 (L1) Host must isolate storage communicationsCIS VMware ESXi 8.0 v1.2.0 L1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

6.4 Safari disable Internet Plugins for global useCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.2 iSight Camera Privacy and Confidentiality ConcernsCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.5 Firewall ConsiderationCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.6 Automatic Actions for Optical MediaCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

7.7 (L1) Virtual machines must limit PCI/PCIe device passthrough functionalityCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

7.9 FileVault and Local Account Password Reset using AppleIDCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

7.10 Repairing permissions is no longer neededCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.11 (L1) Virtual machines must remove unnecessary AHCI devicesCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

7.19 (L1) Virtual machines must deactivate console paste operationsCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

8.4 (L2) VMware Tools on deployed virtual machines must prevent being recustomizedCIS VMware ESXi 8.0 v1.2.0 L2VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

8.12 (L1) VMware Tools must limit the use of MSI transforms when reconfiguring VMware ToolsCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

8.13 (L1) VMware Tools must enable VMware Tools loggingCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY