Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 1 of 1
• 10 Total
Next
Next ››
Name
Audit Name
Plugin
Category
5.1.1 Ensure Image Vulnerability Scanning is enabled
CIS Google Kubernetes Engine (GKE) Autopilot v1.1.0 L2
GCP
RISK ASSESSMENT
5.1.1 Ensure Image Vulnerability Scanning is enabled
CIS Google Kubernetes Engine (GKE) v1.7.0 L2
GCP
RISK ASSESSMENT
5.1.3 Minimize cluster access to read-only for Container Image repositories
CIS Google Kubernetes Engine (GKE) Autopilot v1.1.0 L2
GCP
ACCESS CONTROL
,
MEDIA PROTECTION
5.1.3 Minimize cluster access to read-only for Container Image repositories
CIS Google Kubernetes Engine (GKE) v1.7.0 L2
GCP
ACCESS CONTROL
,
MEDIA PROTECTION
6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is available
CIS Palo Alto Firewall 11 v1.1.0 L1
Palo_Alto
RISK ASSESSMENT
6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is available
CIS Palo Alto Firewall 10 v1.2.0 L1
Palo_Alto
RISK ASSESSMENT
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'
CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS
Windows
RISK ASSESSMENT
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'
CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DC
Windows
RISK ASSESSMENT
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components'
CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DC
Windows
RISK ASSESSMENT
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components'
CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MS
Windows
RISK ASSESSMENT
‹‹ Previous
Previous
Page 1 of 1
• 10 Total
Next
Next ››