1.3.10 Ensure 'Password Profiles' do not exist | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION, PLANNING, PROGRAM MANAGEMENT, RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
4.1.9 Minimize access to create persistent volumes | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
4.1.10 Minimize access to the proxy sub-resource of nodes | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
4.1.11 Minimize access to the approval sub-resource of certificatesigningrequests objects | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
4.1.12 Minimize access to webhook configuration objects | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
4.1.13 Minimize access to the service account token creation | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
4.2 Ensure 'Applications and Threats Update Schedule' is set to download and install updates at daily or shorter intervals | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
4.2 Ensure 'Applications and Threats Update Schedule' is set to download and install updates at daily or shorter intervals | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION, RISK ASSESSMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
5.1.3 Minimize wildcard use in Roles and ClusterRoles | CIS Kubernetes Benchmark v1.9.0 L1 Worker | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.3 Minimize wildcard use in Roles and ClusterRoles - clusterroles | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Worker | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.3 Minimize wildcard use in Roles and ClusterRoles - clusterroles | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Worker | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.3 Minimize wildcard use in Roles and ClusterRoles - clusterroles | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Worker | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.3 Minimize wildcard use in Roles and ClusterRoles - roles | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Worker | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.3 Minimize wildcard use in Roles and ClusterRoles - roles | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Worker | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.4 Minimize access to create pods | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.4 Minimize access to create pods | CIS Kubernetes Benchmark v1.9.0 L1 Master | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.9 Minimize access to create persistent volumes | CIS Kubernetes Benchmark v1.9.0 L1 Master | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.10 Minimize access to the proxy sub-resource of nodes | CIS Kubernetes Benchmark v1.9.0 L1 Master | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.11 Minimize access to the approval sub-resource of certificatesigningrequests objects | CIS Kubernetes Benchmark v1.9.0 L1 Master | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.12 Minimize access to webhook configuration objects | CIS Kubernetes Benchmark v1.9.0 L1 Master | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.1.13 Minimize access to the service account token creation | CIS Kubernetes Benchmark v1.9.0 L1 Master | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |