Item Search

NameAudit NamePluginCategory
1.3.1 Ensure that the --terminated-pod-gc-threshold argument is set as appropriateCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.2 Ensure that the API server pod specification file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.3 Ensure that the controller manager pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.5 Ensure that the scheduler pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.5 Ensure that the scheduler pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.7 Ensure that the etcd pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.8 Ensure that the etcd pod specification file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.13 Ensure that the admin.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.14 Ensure that the admin.conf file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.15 Ensure that the scheduler.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.6.1 Ensure that the cluster-admin role is only used where requiredCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - pspCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix

CONFIGURATION MANAGEMENT

1.7.1 Do not admit privileged containersCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.7.3 Do not admit containers wishing to share the host IPC namespaceCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.7.4 Do not admit containers wishing to share the host network namespaceCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.7.6 Do not admit root containersCIS Kubernetes 1.11 Benchmark v1.3.0 L2Unix

CONFIGURATION MANAGEMENT

1.7.6 Do not admit root containersCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix

CONFIGURATION MANAGEMENT

1.7.7 Do not admit containers with dangerous capabilitiesCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix

CONFIGURATION MANAGEMENT

2.1.6 Ensure that the --protect-kernel-defaults argument is set to trueCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.1.10 Ensure that the --event-qps argument is set to 0CIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.1 Ensure that the kubelet.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure that the kubelet.conf file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.3 Ensure that the kubelet service file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.2.5 Ensure that the proxy kubeconfig file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.2.6 Ensure that the proxy kubeconfig file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.6 Ensure that the proxy kubeconfig file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.2.8 Ensure that the client certificate authorities file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.4 Configure TCP Wrappers - Make sure that /etc/hosts.allow does exist.CIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

3.1 Verify that docker.service file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.2 Verify that docker.service file permissions are set to 644 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.4 Ensure that docker.socket file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.10 Ensure that TLS CA certificate file permissions are set to 444 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.14 Verify that docker-storage environment file permissions are set to 644 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.17 Ensure that daemon.json file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.20 Ensure that /etc/default/docker file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.22 Verify that Docker server certificate file permissions are set to 444 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

6.1.3 Disable SSH X11 Forwarding - Check if X11Forwarding is set to no and not commented for the server.CIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

7.1 (L1) Ensure 'Cookies and website data' is set to 'Allow from websites I visit'CIS MacOS Safari v2.0.0 L1Unix

CONFIGURATION MANAGEMENT

9.1.2 Set User/Group Owner and Permission on /etc/crontabCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.1.3 Set User/Group Owner and Permission on /etc/cron.hourlyCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.1.6 Set User/Group Owner and Permission on /etc/cron.monthlyCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.7 Check Permissions on User Home Directories - Should Be Mode 750 or More RestrictiveCIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

9.12 Check That Users Are Assigned Home DirectoriesCIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

9.13 Check That Defined Home Directories ExistCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.14 Check User Home Directory OwnershipCIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

11.1 Set Warning Banner for Standard Login Services - /etc/issue permissionsCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

IBM i : Automatic Device Configuration (QAUTOCFG) - '0'IBM System i Security Reference for V7R3AS/400

CONFIGURATION MANAGEMENT

IBM i : Force Conversion on Restore (QFRCCVNRST) - '>=3'IBM System i Security Reference for V7R2AS/400

CONFIGURATION MANAGEMENT

IBM i : Remote Service Attribute (QRMTSRVATR) - '0'IBM System i Security Reference for V7R2AS/400

CONFIGURATION MANAGEMENT