Item Search

NameAudit NamePluginCategory
1.1.7 Set 'aaa accounting' to log all privileged use commands using 'commands 15'CIS Cisco IOS 15 L2 v4.1.1Cisco

ACCESS CONTROL

1.2.1 Ensure the container host has been HardenedCIS Docker v1.5.0 L1 Linux Host OSUnix

CONFIGURATION MANAGEMENT

1.2.28 Ensure that the --service-account-key-file argument is set as appropriateCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix

CONFIGURATION MANAGEMENT

3.2.8 Ensure that the --hostname-override argument is not setCIS Google Kubernetes Engine (GKE) v1.3.0 L1 NodeUnix

CONFIGURATION MANAGEMENT

4.2.8 Ensure that the --hostname-override argument is not setCIS Kubernetes v1.20 Benchmark v1.0.1 L1 WorkerUnix

CONFIGURATION MANAGEMENT

4.2.8 Ensure that the --hostname-override argument is not setCIS Kubernetes v1.24 Benchmark v1.0.0 L1 WorkerUnix

CONFIGURATION MANAGEMENT

4.2.8 Ensure that the --hostname-override argument is not setCIS Kubernetes v1.23 Benchmark v1.0.1 L1 WorkerUnix

CONFIGURATION MANAGEMENT

4.6.3 Apply Security Context to Your Pods and ContainersCIS Google Kubernetes Engine (GKE) v1.3.0 L2GCP

CONFIGURATION MANAGEMENT, MAINTENANCE

5.7.4 The default namespace should not be used - BuildConfigsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - BuildsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - CronJobsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - DaemonSetsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - DeploymentConfigsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - DeploymentsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - HorizontalPodAutoScalersCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - ImageStreamsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - JobsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - PodsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - ReplicaSetsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - ReplicationControllersCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - RoutesCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - ServicesCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be used - StatefulSetsCIS RedHat OpenShift Container Platform 4 v1.3.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 iSight Camera Privacy and Confidentiality ConcernsCIS Apple macOS 10.13 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

7.2 iSight Camera Privacy and Confidentiality ConcernsCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.3 Computer Name ConsiderationsCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.3 Computer Name ConsiderationsCIS Apple macOS 10.13 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

7.7 Ensure devices lock after a period of inactivity to prevent unauthorized accessCIS Microsoft 365 Foundations E3 L1 v1.5.0microsoft_azure

ACCESS CONTROL

7.8 Ensure that mobile device encryption is enabled to prevent unauthorized access to mobile dataCIS Microsoft 365 Foundations E3 L1 v1.5.0microsoft_azure

SYSTEM AND COMMUNICATIONS PROTECTION

7.9 Ensure that mobile devices require complex passwords (Type = Alphanumeric)CIS Microsoft 365 Foundations E3 L1 v1.5.0microsoft_azure

IDENTIFICATION AND AUTHENTICATION

7.12 Siri on macOSCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT