1.1 Create a separate partition for containers | CIS Docker 1.13.0 v1.0.0 L1 Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Create a separate partition for containers | CIS Docker 1.11.0 v1.0.0 L1 Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Ensure a separate partition for containers has been created | CIS Docker Community Edition v1.1.0 L1 Linux Host OS | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.7 Community Linux OS L1 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.7 Community Windows OS L1 v2.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.6 Community Windows OS L1 v2.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.7 Community Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.6 Community Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.7 Enterprise Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MariaDB 10.6 on Linux L1 v1.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.6 Enterprise Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1.1 Ensure a separate partition for containers has been created | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS SQL Server 2019 Database L1 DB v1.3.0 | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS SQL Server 2022 Database L1 DB v1.0.0 | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.7 Ensure MariaDB is Run Under a Sandbox Environment | CIS MariaDB 10.6 on Linux L2 v1.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.7 Ensure MariaDB is Run Under a Sandbox Environment | CIS MariaDB 10.6 Database L2 v1.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.7 Ensure MySQL is Run Under a Sandbox Environment | CIS MySQL 8.0 Enterprise Linux OS L2 v1.3.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MariaDB | CIS MariaDB 10.6 Database L1 v1.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.6 Community Windows OS L1 v2.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.7 Enterprise Windows OS L1 v2.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.6 Enterprise Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.7 Community Linux OS L1 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.7 Community Windows OS L1 v2.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
2.3 Dedicate the Machine Running MySQL | CIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.2 Minimize access to secrets | CIS RedHat OpenShift Container Platform 4 v1.5.0 L1 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.3 Minimize the admission of containers wishing to share the host IPC namespace | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.4 Minimize the admission of containers wishing to share the host IPC namespace | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.4 Minimize the admission of containers wishing to share the host IPC namespace | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.4 Minimize the admission of containers wishing to share the host network namespace | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.5 Minimize the admission of containers wishing to share the host network namespace | CIS Kubernetes Benchmark v1.8.0 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.5 Minimize the admission of containers wishing to share the host network namespace | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.11 Ensure that the memory usage for containers is limited | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.12 Ensure that CPU priority is set appropriately on containers | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.16 Ensure that the host's process namespace is not shared | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.17 Do not directly expose host devices to containers | CIS Docker 1.12.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.17 Do not directly expose host devices to containers | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.17 Do not directly expose host devices to containers | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.19 Ensure that the default ulimit is overwritten at runtime if needed | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
6.2 Ensure that container sprawl is avoided | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
6.2.2 (L1) Host must ensure all datastores have unique names | CIS VMware ESXi 8.0 v1.1.0 L1 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
6.3 Mask and zone SAN resources appropriately | CIS VMware ESXi 5.5 v1.2.0 Level 1 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
8.7.3 Do not send host information to guests | CIS VMware ESXi 5.5 v1.2.0 Level 2 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
8.7.3 Do not send host information to guests | CIS VMware ESXi 5.1 v1.0.1 Level 1 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
8.7.3 Ensure host information is not sent to guests | CIS VMware ESXi 6.5 v1.0.0 Level 2 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VM : restrict-host-info | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VM : restrict-host-info | VMWare vSphere 6.5 Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VM : restrict-host-info | VMWare vSphere 6.0 Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |