Item Search

NameAudit NamePluginCategory
1.1.1 (L1) Ensure Administrative accounts are cloud-onlyCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

ACCESS CONTROL

1.1.1 (L1) Ensure Administrative accounts are cloud-onlyCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

ACCESS CONTROL

1.1.2 Ensure that the API server pod specification file ownership is set to root:rootCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.1.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.1.12 Ensure that the etcd data directory ownership is set to etcd:etcdCIS Red Hat OpenShift Container Platform v1.7.0 L1OpenShift

ACCESS CONTROL

1.1.16 Ensure that the Scheduler kubeconfig file ownership is set to root:rootCIS Red Hat OpenShift Container Platform v1.7.0 L1OpenShift

ACCESS CONTROL

1.1.18 Ensure that the Controller Manager kubeconfig file ownership is set to root:rootCIS Red Hat OpenShift Container Platform v1.7.0 L1OpenShift

ACCESS CONTROL

1.4 Ensure that only one user ID has write access to the WebSphere Liberty configuration filesCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL

1.4.1 Set 'password' for 'enable secret'CIS Cisco IOS XE 17.x v2.1.1 L1Cisco

ACCESS CONTROL

1.5 Ensure Interactive Login is DisabledCIS MariaDB 10.6 on Linux L2 v1.1.0Unix

ACCESS CONTROL

1.6 Eliminate use of the 'root' user for administrative and daily tasksCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL

3.6 Ensure the SQL Server's SQLAgent Service Account is Not an AdministratorCIS Microsoft SQL Server 2019 v1.5.0 L1 Database EngineMS_SQLDB

ACCESS CONTROL

3.7 Ensure the SQL Server's Full-Text Service Account is Not an AdministratorCIS Microsoft SQL Server 2019 v1.5.0 L1 Database EngineMS_SQLDB

ACCESS CONTROL

4.1.1 Ensure that the cluster-admin role is only used where requiredCIS Google Kubernetes Engine (GKE) v1.7.0 L1GCP

ACCESS CONTROL

4.1.6 Ensure that the --kubeconfig kubelet.conf file ownership is set to root:rootCIS Kubernetes v1.20 Benchmark v1.0.1 L1 WorkerUnix

ACCESS CONTROL

4.1.8 Ensure that the client certificate authorities file ownership is set to root:rootCIS Kubernetes v1.20 Benchmark v1.0.1 L1 WorkerUnix

ACCESS CONTROL

4.1.9 Ensure that the kubelet --config configuration file has permissions set to 600 or more restrictiveCIS Red Hat OpenShift Container Platform v1.7.0 L1OpenShift

ACCESS CONTROL

4.3.4 Ensure users must provide password for escalationCIS AlmaLinux OS 8 Server L2 v3.0.0Unix

ACCESS CONTROL

4.3.4 Ensure users must provide password for escalationCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL

4.3.4 Ensure users must provide password for privilege escalationCIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1Unix

ACCESS CONTROL

4.07 init.ora - 'os_authent_prefix = NULL String'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows

ACCESS CONTROL

5.1.10 Ensure SSH root login is disabledCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.2.1 Ensure sudo is installedCIS SUSE Linux Enterprise 15 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.2.1 Ensure sudo is installedCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.1 Ensure sudo is installedCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.2 Ensure sudo commands use ptyCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.2 Ensure sudo commands use ptyCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.2 Ensure sudo commands use ptyCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.2.2 Minimize the admission of containers wishing to share the host process ID namespaceCIS Red Hat OpenShift Container Platform v1.7.0 L1OpenShift

ACCESS CONTROL

5.2.2 Minimize the admission of privileged containersCIS Kubernetes v1.10.0 L1 MasterUnix

ACCESS CONTROL

5.2.4 Ensure users must provide password for escalationCIS Rocky Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL

5.2.4 Ensure users must provide password for escalationCIS Rocky Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL

5.2.4 Ensure users must provide password for privilege escalationCIS Debian Linux 12 v1.1.0 L2 ServerUnix

ACCESS CONTROL

5.2.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL

5.2.6 Ensure sudo authentication timeout is configured correctlyCIS Debian Linux 11 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.6 Minimize the admission of root containersCIS Kubernetes v1.20 Benchmark v1.0.1 L2 MasterUnix

ACCESS CONTROL

5.3.1 Ensure sudo is installedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.4 Ensure users must provide password for escalationCIS Fedora 28 Family Linux Server L2 v2.0.0Unix

ACCESS CONTROL

7.0.2 Establish system control group - 'sysctrl_group value'CIS IBM DB2 OS L2 v1.2.0Unix

ACCESS CONTROL

9.4 Ensure 'super_priv' is Not Set to 'Y' for Replication UsersCIS Oracle MySQL Community Server 8.4 v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL

9.4 Ensure 'super_priv' is Not Set to 'Y' for Replication UsersCIS MySQL 8.4 Enterprise v1.0.0 L1 DatabaseMySQLDB

ACCESS CONTROL

10.13 Do not run applications as privilegedCIS Apache Tomcat 10.1 v1.1.0 L1Unix

ACCESS CONTROL

18.10.81.2 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

19.7.40.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

19.7.43.1 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

20.36 Ensure 'Members of the Backup Operators group have separate accounts for backup duties and normal operational tasks'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL