Item Search

NameAudit NamePluginCategory
1.1.1 Ensure that the --allow-privileged argument is set to falseCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

ACCESS CONTROL

1.1.14 Ensure auditing is configured for Docker files and directories - /usr/bin/containerdCIS Docker v1.8.0 L2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

1.1.15 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shimCIS Docker v1.8.0 L2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

1.1.17 Ensure auditing is configured for Docker files and directories - /usr/bin/containerd-shim-runc-v2CIS Docker v1.8.0 L2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

1.2 Use the updated Linux KernelCIS Docker 1.6 v1.0.0 L1 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

2.3 Allow Docker to make changes to iptablesCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.3 Allow Docker to make changes to iptablesCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Configure TCP Wrappers - Deny access to this server from all networksCIS Solaris 10 L1 v5.2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Configure TCP Wrappers - Make sure that /etc/hosts.deny does exist.CIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

2.7 Set default ulimit as appropriate - default-ulimitCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.8 Enable user namespace supportCIS Docker 1.12.0 v1.0.0 L2 DockerUnix
2.9 Confirm default cgroup usageCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.9 Confirm default cgroup usageCIS Docker 1.13.0 v1.0.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.12 Configure centralized and remote loggingCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

AUDIT AND ACCOUNTABILITY

2.12 Ensure centralized and remote logging is configuredCIS Docker Community Edition v1.1.0 L2 DockerUnix

AUDIT AND ACCOUNTABILITY

2.14 Ensure centralized and remote logging is configuredCIS Docker v1.8.0 L2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

3.3 Enable Stack Protection - Makes sure 'noexec_user_stack_log' is set to 1 in /etc/system. Note: Only applicable if NX bit is set.CIS Solaris 10 L1 v5.2Unix

AUDIT AND ACCOUNTABILITY

3.3 Enable Stack Protection - Makes sure 'noexec_user_stack' is set to 1 in /etc/system. Note: Only applicable if NX bit is set.CIS Solaris 10 L1 v5.2Unix

SYSTEM AND INFORMATION INTEGRITY

3.5 Ensure that the /etc/docker directory ownership is set to root:rootCIS Docker v1.8.0 L1 OS LinuxUnix

ACCESS CONTROL

3.10 Verify that TLS CA certificate file permissions are set to 444 or more restrictiveCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.17 Verify that daemon.json file ownership is set to root:rootCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.3 Enable Debug Level Daemon Logging - Check if daemon.debug is set to /var/log/connlogCIS Solaris 10 L1 v5.2Unix

AUDIT AND ACCOUNTABILITY

4.3 Enable Debug Level Daemon Logging/4.4 Capture syslog AUTH Messages - Check if svc:/system/system-log is onlineCIS Solaris 10 L1 v5.2Unix

AUDIT AND ACCOUNTABILITY

5.1 Do not disable AppArmorCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

ACCESS CONTROL

5.1 Ensure AppArmor Profile is EnabledCIS Docker Community Edition v1.1.0 L1 DockerUnix

ACCESS CONTROL

5.3 Ensure that, if applicable, SELinux security options are setCIS Docker v1.8.0 L2 OS LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

5.3 Restrict Linux Kernel Capabilities within containersCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

ACCESS CONTROL

5.10 Limit memory usage for containerCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.21 Do not disable default seccomp profileCIS Docker 1.11.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.22 Do not docker exec commands with privileged optionCIS Docker 1.12.0 v1.0.0 L2 DockerUnix
5.22 Do not docker exec commands with privileged optionCIS Docker 1.13.0 v1.0.0 L2 DockerUnix
5.22 Do not docker exec commands with privileged optionCIS Docker 1.11.0 v1.0.0 L2 DockerUnix
5.22 Ensure docker exec commands are not used with privileged optionCIS Docker Community Edition v1.1.0 L2 DockerUnix
6.7 Avoid container sprawlCIS Docker 1.6 v1.0.0 L1 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

7.2 Set Password Expiration Parameters on Active Accounts - Check MAXWEEKS is set to 13CIS Solaris 10 L1 v5.2Unix

IDENTIFICATION AND AUTHENTICATION

7.3 Set Strong Password Creation Policies - Check DICTIONDBDIR is set to /var/passwdCIS Solaris 10 L1 v5.2Unix

IDENTIFICATION AND AUTHENTICATION

7.3 Set Strong Password Creation Policies - Check MINLOWER is set to 1CIS Solaris 10 L1 v5.2Unix

IDENTIFICATION AND AUTHENTICATION

7.3 Set Strong Password Creation Policies - Check MINUPPER is set to 1CIS Solaris 10 L1 v5.2Unix

IDENTIFICATION AND AUTHENTICATION

7.3 Set Strong Password Creation Policies - Check NAMECHECK is set to YESCIS Solaris 10 L1 v5.2Unix

IDENTIFICATION AND AUTHENTICATION

7.5 Ensure that swarm manager is run in auto-lock modeCIS Docker v1.8.0 L1 Docker SwarmUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.6 Set Default umask for Users - Check if 'umask' is set to 077 - Check /etc/profile.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.6 Set Default umask for Users, Check if 'UMASK' is set to 077.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.8 Set 'mesg n' as Default for All Users in /etc/profileCIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

8.2 Create Warning Banner for CDE Users - CDE package was not foundCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

8.2 Create Warning Banner for CDE Users - Check if 'Dtlogin*greeting.labelString' is not set to default string.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

8.2 Create Warning Banner for CDE Users - Check if 'Dtlogin*greeting.labelString' is set appropriately.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

DKER-EE-001950 - Linux Kernel capabilities must be restricted within containers as defined in the System Security Plan (SSP) for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-001960 - Privileged Linux containers must not be used for Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005210 - Docker Enterprise /etc/docker directory ownership must be set to root:root - CentOS/RHELDISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-005220 - Docker Enterprise /etc/docker directory permissions must be set to 755 or more restrictive - UbuntuDISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT