1.1.7 Set 'aaa accounting' to log all privileged use commands using 'commands 15' | CIS Cisco IOS 15 L2 v4.1.1 | Cisco | ACCESS CONTROL |
1.2.1 Ensure the container host has been Hardened | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
1.2.1 Ensure the container host has been Hardened | CIS Docker v1.6.0 L2 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
3.2.7 Ensure that the --hostname-override argument is not set | CIS Google Kubernetes Engine (GKE) v1.4.0 L1 Node | Unix | CONFIGURATION MANAGEMENT |
4.2.7 Ensure that the --hostname-override argument is not set | CIS Kubernetes Benchmark v1.7.1 L1 Worker | Unix | CONFIGURATION MANAGEMENT |
4.2.8 Ensure that the --hostname-override argument is not set | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Worker | Unix | CONFIGURATION MANAGEMENT |
4.2.8 Ensure that the --hostname-override argument is not set | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Worker | Unix | CONFIGURATION MANAGEMENT |
4.2.8 Ensure that the --hostname-override argument is not set | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Worker | Unix | CONFIGURATION MANAGEMENT |
4.6.3 Apply Security Context to Your Pods and Containers | CIS Google Kubernetes Engine (GKE) v1.4.0 L2 | GCP | CONFIGURATION MANAGEMENT, MAINTENANCE |
5.7.4 The default namespace should not be used - BuildConfigs | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - Builds | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - CronJobs | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - DaemonSets | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - DeploymentConfigs | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - Deployments | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - HorizontalPodAutoScalers | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - ImageStreams | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - Jobs | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - Pods | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - ReplicaSets | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - ReplicationControllers | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - Routes | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - Services | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used - StatefulSets | CIS RedHat OpenShift Container Platform 4 v1.3.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
7.2 iSight Camera Privacy and Confidentiality Concerns | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.2 iSight Camera Privacy and Confidentiality Concerns | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
7.3 Computer Name Considerations | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
7.3 Computer Name Considerations | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.7 Ensure devices lock after a period of inactivity to prevent unauthorized access | CIS Microsoft 365 Foundations E3 L1 v1.5.0 | microsoft_azure | ACCESS CONTROL |
7.8 Ensure that mobile device encryption is enabled to prevent unauthorized access to mobile data | CIS Microsoft 365 Foundations E3 L1 v1.5.0 | microsoft_azure | SYSTEM AND COMMUNICATIONS PROTECTION |
7.9 Ensure that mobile devices require complex passwords (Type = Alphanumeric) | CIS Microsoft 365 Foundations E3 L1 v1.5.0 | microsoft_azure | IDENTIFICATION AND AUTHENTICATION |
7.12 Siri on macOS | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |