Item Search

NameAudit NamePluginCategory
2.1.4 Ensure Config-state is savedCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

4.2 Ensure that containers use only trusted base imagesCIS Docker v1.6.0 L1 Docker LinuxUnix

CONFIGURATION MANAGEMENT

4.2.6 Ensure that the --protect-kernel-defaults argument is set to trueCIS Kubernetes v1.24 Benchmark v1.0.0 L1 WorkerUnix

CONFIGURATION MANAGEMENT

4.2.6 Ensure that the --protect-kernel-defaults argument is set to trueCIS Kubernetes v1.20 Benchmark v1.0.1 L1 WorkerUnix

CONFIGURATION MANAGEMENT

4.2.6 Ensure that the --protect-kernel-defaults argument is set to trueCIS Kubernetes v1.23 Benchmark v1.0.1 L1 WorkerUnix

CONFIGURATION MANAGEMENT

4.3 Ensure that unnecessary packages are not installed in the containerCIS Docker v1.6.0 L1 Docker LinuxUnix

CONFIGURATION MANAGEMENT

4.6 Ensure that HEALTHCHECK instructions have been added to container imagesCIS Docker v1.6.0 L1 Docker LinuxUnix

SYSTEM AND SERVICES ACQUISITION

4.6.2 Ensure that the seccomp profile is set to RuntimeDefault in the pod definitionsCIS Google Kubernetes Engine (GKE) v1.5.0 L2GCP

CONFIGURATION MANAGEMENT

4.7 Ensure update instructions are not used alone in DockerfilesCIS Docker v1.6.0 L1 Docker LinuxUnix

CONFIGURATION MANAGEMENT

4.8 Ensure Compute Instances Are Launched With Shielded VM EnabledCIS Google Cloud Platform v3.0.0 L2GCP

CONFIGURATION MANAGEMENT

4.9 Ensure that COPY is used instead of ADD in DockerfilesCIS Docker v1.6.0 L1 Docker LinuxUnix

CONFIGURATION MANAGEMENT

5.2 Ensure that, if applicable, an AppArmor Profile is enabledCIS Docker v1.6.0 L1 Docker LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

5.2.7 Minimize the admission of containers with the NET_RAW capabilityCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.7 Minimize the admission of containers with the NET_RAW capabilityCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift

CONFIGURATION MANAGEMENT

5.2.8 Minimize the admission of containers with added capabilitiesCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.8 Minimize the admission of containers with added capabilities - allowedCapabilitiesCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift

CONFIGURATION MANAGEMENT

5.2.8 Minimize the admission of containers with added capabilities - defaultAddCapabilitiesCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift

CONFIGURATION MANAGEMENT

5.2.8 Minimize the admission of containers with the NET_RAW capabilityCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.8 Minimize the admission of containers with the NET_RAW capabilityCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.8 Minimize the admission of containers with the NET_RAW capabilityCIS Kubernetes Benchmark v1.8.0 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.9 Minimize the admission of containers with added capabilitiesCIS Kubernetes Benchmark v1.8.0 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.9 Minimize the admission of containers with added capabilitiesCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.9 Minimize the admission of containers with added capabilitiesCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.9 Minimize the admission of containers with capabilities assignedCIS Kubernetes v1.20 Benchmark v1.0.1 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.2.9 Minimize the admission of containers with capabilities assignedCIS RedHat OpenShift Container Platform 4 v1.5.0 L2OpenShift

CONFIGURATION MANAGEMENT

5.2.10 Minimize the admission of containers with capabilities assignedCIS Kubernetes v1.24 Benchmark v1.0.0 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.2.10 Minimize the admission of containers with capabilities assignedCIS Kubernetes v1.23 Benchmark v1.0.1 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.2.10 Minimize the admission of containers with capabilities assignedCIS Kubernetes Benchmark v1.8.0 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.2.11 Minimize the admission of Windows HostProcess ContainersCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.11 Minimize the admission of Windows HostProcess ContainersCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.12 Minimize the admission of HostPath volumesCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.12 Minimize the admission of HostPath volumesCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.13 Minimize the admission of containers which use HostPortsCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.2.13 Minimize the admission of containers which use HostPortsCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

CONFIGURATION MANAGEMENT

5.3 Ensure that, if applicable, SELinux security options are setCIS Docker v1.6.0 L2 Docker LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

5.4 Ensure that Linux kernel capabilities are restricted within containersCIS Docker v1.6.0 L1 Docker LinuxUnix

CONFIGURATION MANAGEMENT

5.4.1 Ensure legacy Compute Engine instance metadata APIs are DisabledCIS Google Kubernetes Engine (GKE) v1.5.0 L1GCP

CONFIGURATION MANAGEMENT

5.4.2 Ensure the GKE Metadata Server is EnabledCIS Google Kubernetes Engine (GKE) v1.5.0 L1GCP

CONFIGURATION MANAGEMENT

5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controllerCIS Kubernetes v1.24 Benchmark v1.0.0 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controllerCIS Kubernetes v1.23 Benchmark v1.0.1 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controllerCIS Kubernetes v1.20 Benchmark v1.0.1 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controllerCIS Kubernetes Benchmark v1.8.0 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes v1.23 Benchmark v1.0.1 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes v1.20 Benchmark v1.0.1 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes v1.24 Benchmark v1.0.0 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes Benchmark v1.8.0 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.15 Ensure that the 'on-failure' container restart policy is set to '5'CIS Docker v1.6.0 L1 Docker LinuxUnix

CONFIGURATION MANAGEMENT

5.19 Ensure that the default ulimit is overwritten at runtime if neededCIS Docker v1.6.0 L1 Docker LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.28 Ensure that Docker commands always make use of the latest version of their imageCIS Docker v1.6.0 L1 Docker LinuxUnix

CONFIGURATION MANAGEMENT

5.29 Ensure that the PIDs cgroup limit is usedCIS Docker v1.6.0 L1 Docker LinuxUnix

CONFIGURATION MANAGEMENT