Item Search

NameAudit NamePluginCategory
2.4.1 Ensure 'System Backup' is set.CIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.1.1 Ensure that the proxy kubeconfig file permissions are set to 644 or more restrictiveCIS Google Kubernetes Engine (GKE) v1.5.0 L1 NodeUnix

ACCESS CONTROL, MEDIA PROTECTION

3.1.2 Ensure that the proxy kubeconfig file ownership is set to root:rootCIS Google Kubernetes Engine (GKE) v1.5.0 L1 NodeUnix

ACCESS CONTROL, MEDIA PROTECTION

3.1.3 Ensure that the kubelet configuration file has permissions set to 600CIS Google Kubernetes Engine (GKE) v1.5.0 L1 NodeUnix

ACCESS CONTROL, MEDIA PROTECTION

3.1.4 Ensure that the kubelet configuration file ownership is set to root:rootCIS Google Kubernetes Engine (GKE) v1.5.0 L1 NodeUnix

ACCESS CONTROL, MEDIA PROTECTION

4.1.2 Minimize access to secretsCIS Google Kubernetes Engine (GKE) v1.5.0 L1GCP

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.1.5 Ensure that default service accounts are not actively usedCIS Google Kubernetes Engine (GKE) v1.5.0 L1GCP

ACCESS CONTROL

4.1.9 Ensure that the kubelet --config configuration file has permissions set to 600 or more restrictiveCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift

ACCESS CONTROL

4.2.1 Ensure that the cluster enforces Pod Security Standard Baseline profile or stricter for all namespaces.CIS Google Kubernetes Engine (GKE) v1.5.0 L1GCP

CONFIGURATION MANAGEMENT

5.1.4 Minimize access to create podsCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.4 Minimize Container Registries to only those approvedCIS Google Kubernetes Engine (GKE) v1.5.0 L1GCP

CONFIGURATION MANAGEMENT

5.2.2 Minimize the admission of containers wishing to share the host process ID namespaceCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift

ACCESS CONTROL

5.5.1 Ensure Container-Optimized OS (cos_containerd) is used for GKE node imagesCIS Google Kubernetes Engine (GKE) v1.5.0 L2GCP

CONFIGURATION MANAGEMENT

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS RedHat OpenShift Container Platform 4 v1.5.0 L2OpenShift

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.10.4 Ensure use of Binary AuthorizationCIS Google Kubernetes Engine (GKE) v1.5.0 L2GCP

CONFIGURATION MANAGEMENT

8.3.4 Ensure standard processes are used for VM deploymentCIS VMware ESXi 7.0 v1.3.0 Level 1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.3.4 Ensure standard processes are used for VM deploymentCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

8.3.4 Ensure templates are used whenever possible to deploy VMsCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

CONFIGURATION MANAGEMENT