Item Search

NameAudit NamePluginCategory
2.2.1 Ensure Firewall Is EnabledCIS Apple macOS 13.0 Ventura v1.0.0 L1Unix
2.5.2.1 Ensure Firewall Is EnabledCIS Apple macOS 11.0 Big Sur v3.0.0 L1Unix
2.5.2.1 Ensure Firewall Is EnabledCIS Apple macOS 12.0 Monterey v2.1.0 L1Unix
2.5.2.1 Ensure Firewall Is EnabledCIS Apple macOS 12.0 Monterey v1.1.0 L1Unix
2.5.2.1 Ensure Firewall Is EnabledCIS Apple macOS 10.15 v2.1.0 L1Unix
2.5.2.1 Ensure Firewall Is EnabledCIS Apple macOS 11 v2.1.0 L1Unix
2.5.2.1 Ensure Firewall Is EnabledCIS Apple macOS 12.0 Monterey v2.0.0 L1Unix
2.5.2.2 Ensure Firewall Is EnabledCIS Apple macOS 12.0 Monterey v1.0.0 L1Unix
2.5.2.2 Ensure Firewall Is EnabledCIS Apple macOS 10.15 v2.0.0 L1Unix
2.5.2.2 Ensure Firewall Is EnabledCIS Apple macOS 11 v2.0.0 L1Unix
4.3.8 Ensure 'Allow access to Azure services' for PostgreSQL Database Server is disabledCIS Microsoft Azure Foundations v1.3.1 L1microsoft_azure
4.4.4 Apply Application Control Security Profile to PoliciesCIS Fortigate 7.0.x Level 1 v1.2.0FortiGate
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - Deny By Concurrent RequestsCIS IIS 10 v1.1.1 Level 1Windows
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - Deny By Concurrent RequestsCIS IIS 10 v1.1.0 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - Deny By Concurrent RequestsCIS IIS 10 v1.2.0 Level 1Windows
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - Deny By Concurrent RequestsCIS IIS 10 v1.2.1 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - maxConcurrentRequestsCIS IIS 10 v1.2.0 Level 1Windows
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - maxConcurrentRequestsCIS IIS 10 v1.1.1 Level 1Windows
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - maxConcurrentRequestsCIS IIS 10 v1.1.0 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - maxConcurrentRequestsCIS IIS 10 v1.2.1 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v2.0.0 L2 ProxyUnix
5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v2.0.0 L2 LoadbalancerUnix
5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v2.0.0 L2 WebserverUnix
5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v1.0.0 L2 ProxyUnix
5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v1.0.0 L2 LoadbalancerUnix
5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v1.0.0 L2 WebserverUnix
5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v2.0.1 L2 WebserverUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v2.0.1 L2 LoadbalancerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.1.1 Ensure allow and deny filters limit access to specific IP addressesCIS NGINX Benchmark v2.0.1 L2 ProxyUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.1 Ensure that the CNI in use supports Network PoliciesCIS RedHat OpenShift Container Platform 4 v1.4.0 L1OpenShift
5.3.1 Ensure that the CNI in use supports Network PoliciesCIS RedHat OpenShift Container Platform 4 v1.2.0 L1OpenShift
5.3.1 Ensure that the CNI in use supports Network PoliciesCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift
5.3.1 Ensure that the CNI in use supports Network PoliciesCIS Kubernetes Benchmark v1.7.1 L1 MasterUnix
5.3.1 Ensure that the CNI in use supports Network PoliciesCIS Kubernetes Benchmark v1.8.0 L1 MasterUnix
5.3.1 Ensure that the CNI in use supports Network PoliciesCIS RedHat OpenShift Container Platform 4 v1.3.0 L1OpenShift
5.3.1 Ensure that the CNI in use supports Network PoliciesCIS Kubernetes v1.20 Benchmark v1.0.0 L1 MasterUnix

SECURITY ASSESSMENT AND AUTHORIZATION

5.3.1 Ensure that the CNI in use supports Network PoliciesCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.1 Ensure that the CNI in use supports Network PoliciesCIS Kubernetes Benchmark v1.9.0 L1 MasterUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.1 Ensure that the CNI in use supports Network PoliciesCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.6.6 Consider firewalling GKE worker nodesCIS Google Kubernetes Engine (GKE) v1.1.0 L2 MasterGCP
5.6.6 Consider firewalling GKE worker nodesCIS Google Kubernetes Engine (GKE) v1.4.0 L2GCP
5.6.6 Consider firewalling GKE worker nodesCIS Google Kubernetes Engine (GKE) v1.3.0 L2GCP
5.7.1 Create administrative boundaries between resources using namespacesCIS RedHat OpenShift Container Platform 4 v1.4.0 L1OpenShift
5.7.1 Create administrative boundaries between resources using namespacesCIS RedHat OpenShift Container Platform 4 v1.3.0 L1OpenShift
5.7.1 Create administrative boundaries between resources using namespacesCIS RedHat OpenShift Container Platform 4 v1.2.0 L1OpenShift
5.7.1 Create administrative boundaries between resources using namespacesCIS RedHat OpenShift Container Platform 4 v1.5.0 L1OpenShift
5.7.1 Create administrative boundaries between resources using namespacesCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.21 Ensure the default seccomp profile is not DisabledCIS Docker v1.5.0 L1 Docker LinuxUnix
5.21 Ensure the default seccomp profile is not DisabledCIS Docker v1.3.1 L1 Docker LinuxUnix
6.2.9 Ensure Instance IP assignment is set to privateCIS Google Cloud Platform v2.0.0 L1GCP