1.1.5 Ensure that the scheduler pod specification file permissions are set to 600 or more restrictive | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.7 Ensure that the etcd pod specification file permissions are set to 600 or more restrictive | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.9 Ensure that the Container Network Interface file permissions are set to 600 or more restrictive | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.11 Ensure that the etcd data directory permissions are set to 700 or more restrictive | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.1.13 Ensure that the admin.conf file permissions are set to 600 | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.2.7 Ensure that the --authorization-mode argument includes Node | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.2.13 Ensure that the admission control plugin ServiceAccount is set | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, MEDIA PROTECTION |
1.2.23 Ensure that the --service-account-lookup argument is set to true | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.1 Ensure the file permissions mask is correct | CIS PostgreSQL 13 OS v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.3.1 Ensure NGINX directories and files are owned by root | CIS NGINX Benchmark v2.0.1 L1 Webserver | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.3.2 Ensure access to NGINX directories and files is restricted - Files | CIS NGINX Benchmark v2.0.1 L1 Webserver | Unix | ACCESS CONTROL, MEDIA PROTECTION |
2.5 Ensure that the --peer-client-cert-auth argument is set to true | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.1 Ensure 'datadir' Has Appropriate Permissions | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.2 Ensure 'log_bin_basename' Files Have Appropriate Permissions | CIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
3.3 Ensure 'log_error' Has Appropriate Permissions | CIS MySQL 5.6 Community Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
3.3 Ensure 'log_error' Has Appropriate Permissions | CIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
3.3 Ensure 'log_error' Has Appropriate Permissions | CIS MySQL 5.6 Community Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.4 Ensure 'slow_query_log' Has Appropriate Permissions | CIS MySQL 5.6 Community Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
3.4 Ensure 'slow_query_log' Has Appropriate Permissions | CIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
3.5 Ensure 'relay_log_basename' Files Have Appropriate Permissions | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.5 Ensure Access to Audit Records Is Controlled - /etc/security/audit_control | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.6 Ensure 'general_log_file' Has Appropriate Permissions | CIS MySQL 5.6 Community Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
3.6 Ensure 'general_log_file' Has Appropriate Permissions | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.9 Ensure 'audit_log_file' Has Appropriate Permissions | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.10 Secure MySQL Keyring - keyring_encrypted_file_data_path | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.10 Secure MySQL Keyring - keyring_file_data_path | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
3.10 Secure MySQL Keyring - keyring_okv_path | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.1 Ensure that the kubelet service file permissions are set to 600 or more restrictive | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Worker | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.3 Ensure permissions on all logfiles are configured | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.3 If proxy kubeconfig file exists ensure permissions are set to 600 or more restrictive | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Worker | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.1.7 Ensure that the certificate authorities file permissions are set to 600 or more restrictive | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Worker | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.2.1 Ensure that the --anonymous-auth argument is set to false | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Worker | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started With '--skip-grant-tables' - /etc/my.cnf | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - /etc/my.cnf | CIS MySQL 5.6 Community Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - /etc/mysql/my.cnf | CIS MySQL 5.6 Community Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - %PROGRAMDATA%\MySQL\MySQL Server 5.6\my.cnf | CIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - %WINDIR%\my.cnf | CIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - %WINDIR%\my.ini | CIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - C:\my.cnf | CIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0 | Windows | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started With '--skip-grant-tables' - SYSCONFDIR/my.cnf | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
4.5 Ensure 'mysqld' is Not Started with '--skip-grant-tables' - SYSCONFDIR/my.cnf | CIS MySQL 5.6 Community Linux OS L1 v2.0.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.1 Ensure Home Folders Are Secure | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.1.4 Ensure Appropriate Permissions Are Enabled for System Wide Applications | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.3.4 Ensure default user umask is 027 or more restrictive - /etc/bash/bashrc | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.3.4 Ensure default user umask is 027 or more restrictive - /etc/profile /etc/profile.d | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.4 Ensure Guest Access to Shared Folders Is Disabled | CIS Apple macOS 10.15 Catalina v3.0.0 L1 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.1.5 Ensure permissions on /etc/passwd- are configured | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.8 Ensure users' home directories permissions are 750 or more restrictive | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
6.2.13 Ensure users' .netrc Files are not group or world accessible | CIS Google Container-Optimized OS L2 Server v1.1.0 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
18.9.4.1 Ensure 'Allow a Windows app to share application data between users' is set to 'Disabled' | CIS Microsoft Windows Server 2019 STIG DC L2 v1.0.1 | Windows | ACCESS CONTROL, MEDIA PROTECTION |