2.1.4 Ensure Config-state is saved | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | CONFIGURATION MANAGEMENT |
4.2 Ensure that containers use only trusted base images | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
4.2.6 Ensure that the --protect-kernel-defaults argument is set to true | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Worker | Unix | CONFIGURATION MANAGEMENT |
4.2.6 Ensure that the --protect-kernel-defaults argument is set to true | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Worker | Unix | CONFIGURATION MANAGEMENT |
4.2.6 Ensure that the --protect-kernel-defaults argument is set to true | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Worker | Unix | CONFIGURATION MANAGEMENT |
4.3 Ensure that unnecessary packages are not installed in the container | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
4.6 Ensure that HEALTHCHECK instructions have been added to container images | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND SERVICES ACQUISITION |
4.6.2 Ensure that the seccomp profile is set to RuntimeDefault in the pod definitions | CIS Google Kubernetes Engine (GKE) v1.5.0 L2 | GCP | CONFIGURATION MANAGEMENT |
4.7 Ensure update instructions are not used alone in Dockerfiles | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
4.8 Ensure Compute Instances Are Launched With Shielded VM Enabled | CIS Google Cloud Platform v3.0.0 L2 | GCP | CONFIGURATION MANAGEMENT |
4.9 Ensure that COPY is used instead of ADD in Dockerfiles | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
5.2 Ensure that, if applicable, an AppArmor Profile is enabled | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.2.7 Minimize the admission of containers with the NET_RAW capability | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.7 Minimize the admission of containers with the NET_RAW capability | CIS RedHat OpenShift Container Platform 4 v1.5.0 L1 | OpenShift | CONFIGURATION MANAGEMENT |
5.2.8 Minimize the admission of containers with added capabilities | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.8 Minimize the admission of containers with added capabilities - allowedCapabilities | CIS RedHat OpenShift Container Platform 4 v1.5.0 L1 | OpenShift | CONFIGURATION MANAGEMENT |
5.2.8 Minimize the admission of containers with added capabilities - defaultAddCapabilities | CIS RedHat OpenShift Container Platform 4 v1.5.0 L1 | OpenShift | CONFIGURATION MANAGEMENT |
5.2.8 Minimize the admission of containers with the NET_RAW capability | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.8 Minimize the admission of containers with the NET_RAW capability | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.8 Minimize the admission of containers with the NET_RAW capability | CIS Kubernetes Benchmark v1.8.0 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.9 Minimize the admission of containers with added capabilities | CIS Kubernetes Benchmark v1.8.0 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.9 Minimize the admission of containers with added capabilities | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.9 Minimize the admission of containers with added capabilities | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.9 Minimize the admission of containers with capabilities assigned | CIS Kubernetes v1.20 Benchmark v1.0.1 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.9 Minimize the admission of containers with capabilities assigned | CIS RedHat OpenShift Container Platform 4 v1.5.0 L2 | OpenShift | CONFIGURATION MANAGEMENT |
5.2.10 Minimize the admission of containers with capabilities assigned | CIS Kubernetes v1.24 Benchmark v1.0.0 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.10 Minimize the admission of containers with capabilities assigned | CIS Kubernetes v1.23 Benchmark v1.0.1 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.10 Minimize the admission of containers with capabilities assigned | CIS Kubernetes Benchmark v1.8.0 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.11 Minimize the admission of Windows HostProcess Containers | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.11 Minimize the admission of Windows HostProcess Containers | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.12 Minimize the admission of HostPath volumes | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.12 Minimize the admission of HostPath volumes | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.13 Minimize the admission of containers which use HostPorts | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.2.13 Minimize the admission of containers which use HostPorts | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | CONFIGURATION MANAGEMENT |
5.3 Ensure that, if applicable, SELinux security options are set | CIS Docker v1.6.0 L2 Docker Linux | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.4 Ensure that Linux kernel capabilities are restricted within containers | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
5.4.1 Ensure legacy Compute Engine instance metadata APIs are Disabled | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | CONFIGURATION MANAGEMENT |
5.4.2 Ensure the GKE Metadata Server is Enabled | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | CONFIGURATION MANAGEMENT |
5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controller | CIS Kubernetes v1.24 Benchmark v1.0.0 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controller | CIS Kubernetes v1.23 Benchmark v1.0.1 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controller | CIS Kubernetes v1.20 Benchmark v1.0.1 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controller | CIS Kubernetes Benchmark v1.8.0 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions | CIS Kubernetes v1.23 Benchmark v1.0.1 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions | CIS Kubernetes v1.20 Benchmark v1.0.1 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions | CIS Kubernetes v1.24 Benchmark v1.0.0 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions | CIS Kubernetes Benchmark v1.8.0 L2 Master | Unix | CONFIGURATION MANAGEMENT |
5.15 Ensure that the 'on-failure' container restart policy is set to '5' | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
5.19 Ensure that the default ulimit is overwritten at runtime if needed | CIS Docker v1.6.0 L1 Docker Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.28 Ensure that Docker commands always make use of the latest version of their image | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |
5.29 Ensure that the PIDs cgroup limit is used | CIS Docker v1.6.0 L1 Docker Linux | Unix | CONFIGURATION MANAGEMENT |