Item Search

NameAudit NamePluginCategory
1.1.2 Ensure that the --basic-auth-file argument is not setCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.10 Ensure that the admission control policy is set to AlwaysPullImagesCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

ACCESS CONTROL

1.1.14 Ensure that the --audit-log-path argument is set as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.1.15 Ensure that the --audit-log-maxage argument is set to 30 or as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

1.1.22 Ensure that the --kubelet-client-certificate and --kubelet-client-key arguments are set as appropriate - kubelet-client-keyCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.1.24 Ensure that the admission control policy is set to PodSecurityPolicyCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

ACCESS CONTROL

1.1.31 Ensure that the --authorization-mode argument is set to NodeCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

ACCESS CONTROL

1.4.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.16 Ensure that the scheduler.conf file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.5.3 Ensure that the --auto-tls argument is not set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.6.8 Configure Network policies as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix
1.6.9 Place compensating controls in the form of PSP and RBAC for privileged containers usage - clusterrolebindingCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix

CONFIGURATION MANAGEMENT

1.6.9 Place compensating controls in the form of PSP and RBAC for privileged containers usage - pspCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix

CONFIGURATION MANAGEMENT

1.6.9 Place compensating controls in the form of PSP and RBAC for privileged containers usage - rolebindingCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix

CONFIGURATION MANAGEMENT

1.9 (L2) Host hardware must enable AMD SEV-ES, if availableCIS VMware ESXi 8.0 v1.2.0 L2VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

2.1.6 Ensure that the --streaming-connection-idle-timeout argument is not set to 0CIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.7 Ensure that the --protect-kernel-defaults argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.1.8 Ensure that the --make-iptables-util-chains argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.12 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate - tls-private-key-fileCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

2.3.2 Ensure timezone is properly configuredCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.4.2 Disable Internet SharingCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.4.3 Disable Screen SharingCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.5.1 Disable 'Wake for network access' - Wake for network accessCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

3.1.12 Ensure that the --audit-log-maxbackup argument is set to 10 or as appropriateCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

AUDIT AND ACCOUNTABILITY

3.1.18 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate - etcd-certfileCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

3.3.1.3 Set 'key-string'CIS Cisco IOS XE 17.x v2.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.23 (L2) Host must deny shell access for the vpxuser accountCIS VMware ESXi 8.0 v1.2.0 L2VMware

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.2 (L1) Host must block network traffic by defaultCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.11 (L1) Host must isolate management communicationsCIS VMware ESXi 8.0 v1.2.0 L1VMware

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

6.3.2 (L1) Host iSCSI client, if enabled, must employ unique CHAP authentication secretsCIS VMware ESXi 8.0 v1.2.0 L1VMware

IDENTIFICATION AND AUTHENTICATION

7.1 (L2) Virtual machines must enable Secure BootCIS VMware ESXi 8.0 v1.2.0 L2VMware

CONFIGURATION MANAGEMENT, MAINTENANCE

7.4 (L2) Virtual machines should deactivate 3D graphics features when not requiredCIS VMware ESXi 8.0 v1.2.0 L2VMware

CONFIGURATION MANAGEMENT

7.5 (L1) Virtual machines must be configured to lock when the last console connection is closedCIS VMware ESXi 8.0 v1.2.0 L1VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

7.9 (L1) Virtual machines must prevent unauthorized connection of devicesCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

7.12 (L1) Virtual machines must remove unnecessary USB/XHCI devicesCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

7.13 (L1) Virtual machines must remove unnecessary serial port devicesCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

7.18 (L1) Virtual machines must deactivate console copy operationsCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

7.21 (L1) Virtual machines must deactivate virtual disk shrinking operationsCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

7.25 (L1) Virtual machines must enable diagnostic loggingCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

8.5 (L1) VMware Tools must limit the automatic addition of featuresCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT

8.8 (L2) VMware Tools must deactivate ContainerInfo unless requiredCIS VMware ESXi 8.0 v1.2.0 L2VMware

CONFIGURATION MANAGEMENT

DKER-EE-002060 - The Docker Enterprise hosts UTS namespace must not be shared.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

MADB-10-009400 - MariaDB must be able to generate audit records when security objects are accessed.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-010000 - MariaDB must generate audit records when privileges/permissions are modified.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-010400 - MariaDB must generate audit records when categories of information (e.g., classification levels/security levels) are modified.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MS.AAD.5.4v1 - Group owners SHALL NOT be allowed to consent to applications.CISA SCuBA Microsoft 365 Entra ID v1.5.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

O112-P2-012800 - The DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

IDENTIFICATION AND AUTHENTICATION

WN22-MS-000080 - Windows Server 2022 Deny access to this computer from the network user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and local accounts and from unauthenticated access on all systems.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL