2.2.1 Ensure Firewall Is Enabled | CIS Apple macOS 13.0 Ventura v1.0.0 L1 | Unix | |
2.5.2.1 Ensure Firewall Is Enabled | CIS Apple macOS 11.0 Big Sur v3.0.0 L1 | Unix | |
2.5.2.1 Ensure Firewall Is Enabled | CIS Apple macOS 12.0 Monterey v2.1.0 L1 | Unix | |
2.5.2.1 Ensure Firewall Is Enabled | CIS Apple macOS 12.0 Monterey v1.1.0 L1 | Unix | |
2.5.2.1 Ensure Firewall Is Enabled | CIS Apple macOS 10.15 v2.1.0 L1 | Unix | |
2.5.2.1 Ensure Firewall Is Enabled | CIS Apple macOS 11 v2.1.0 L1 | Unix | |
2.5.2.1 Ensure Firewall Is Enabled | CIS Apple macOS 12.0 Monterey v2.0.0 L1 | Unix | |
2.5.2.2 Ensure Firewall Is Enabled | CIS Apple macOS 12.0 Monterey v1.0.0 L1 | Unix | |
2.5.2.2 Ensure Firewall Is Enabled | CIS Apple macOS 10.15 v2.0.0 L1 | Unix | |
2.5.2.2 Ensure Firewall Is Enabled | CIS Apple macOS 11 v2.0.0 L1 | Unix | |
4.3.8 Ensure 'Allow access to Azure services' for PostgreSQL Database Server is disabled | CIS Microsoft Azure Foundations v1.3.1 L1 | microsoft_azure | |
4.4.4 Apply Application Control Security Profile to Policies | CIS Fortigate 7.0.x Level 1 v1.2.0 | FortiGate | |
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - Deny By Concurrent Requests | CIS IIS 10 v1.1.1 Level 1 | Windows | |
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - Deny By Concurrent Requests | CIS IIS 10 v1.1.0 Level 1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - Deny By Concurrent Requests | CIS IIS 10 v1.2.0 Level 1 | Windows | |
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - Deny By Concurrent Requests | CIS IIS 10 v1.2.1 Level 1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - maxConcurrentRequests | CIS IIS 10 v1.2.0 Level 1 | Windows | |
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - maxConcurrentRequests | CIS IIS 10 v1.1.1 Level 1 | Windows | |
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - maxConcurrentRequests | CIS IIS 10 v1.1.0 Level 1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.11 Ensure 'Dynamic IP Address Restrictions' is enabled - maxConcurrentRequests | CIS IIS 10 v1.2.1 Level 1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.1 Ensure allow and deny filters limit access to specific IP addresses | CIS NGINX Benchmark v2.0.0 L2 Proxy | Unix | |
5.1.1 Ensure allow and deny filters limit access to specific IP addresses | CIS NGINX Benchmark v2.0.0 L2 Loadbalancer | Unix | |
5.1.1 Ensure allow and deny filters limit access to specific IP addresses | CIS NGINX Benchmark v2.0.0 L2 Webserver | Unix | |
5.1.1 Ensure allow and deny filters limit access to specific IP addresses | CIS NGINX Benchmark v1.0.0 L2 Proxy | Unix | |
5.1.1 Ensure allow and deny filters limit access to specific IP addresses | CIS NGINX Benchmark v1.0.0 L2 Loadbalancer | Unix | |
5.1.1 Ensure allow and deny filters limit access to specific IP addresses | CIS NGINX Benchmark v1.0.0 L2 Webserver | Unix | |
5.1.1 Ensure allow and deny filters limit access to specific IP addresses | CIS NGINX Benchmark v2.0.1 L2 Webserver | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.1 Ensure allow and deny filters limit access to specific IP addresses | CIS NGINX Benchmark v2.0.1 L2 Loadbalancer | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.1 Ensure allow and deny filters limit access to specific IP addresses | CIS NGINX Benchmark v2.0.1 L2 Proxy | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS RedHat OpenShift Container Platform 4 v1.4.0 L1 | OpenShift | |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS RedHat OpenShift Container Platform 4 v1.2.0 L1 | OpenShift | |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS RedHat OpenShift Container Platform 4 v1.5.0 L1 | OpenShift | |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS Kubernetes Benchmark v1.7.1 L1 Master | Unix | |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS Kubernetes Benchmark v1.8.0 L1 Master | Unix | |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS RedHat OpenShift Container Platform 4 v1.3.0 L1 | OpenShift | |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS Kubernetes v1.20 Benchmark v1.0.0 L1 Master | Unix | SECURITY ASSESSMENT AND AUTHORIZATION |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS Kubernetes Benchmark v1.9.0 L1 Master | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.3.1 Ensure that the CNI in use supports Network Policies | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.6.6 Consider firewalling GKE worker nodes | CIS Google Kubernetes Engine (GKE) v1.1.0 L2 Master | GCP | |
5.6.6 Consider firewalling GKE worker nodes | CIS Google Kubernetes Engine (GKE) v1.4.0 L2 | GCP | |
5.6.6 Consider firewalling GKE worker nodes | CIS Google Kubernetes Engine (GKE) v1.3.0 L2 | GCP | |
5.7.1 Create administrative boundaries between resources using namespaces | CIS RedHat OpenShift Container Platform 4 v1.4.0 L1 | OpenShift | |
5.7.1 Create administrative boundaries between resources using namespaces | CIS RedHat OpenShift Container Platform 4 v1.3.0 L1 | OpenShift | |
5.7.1 Create administrative boundaries between resources using namespaces | CIS RedHat OpenShift Container Platform 4 v1.2.0 L1 | OpenShift | |
5.7.1 Create administrative boundaries between resources using namespaces | CIS RedHat OpenShift Container Platform 4 v1.5.0 L1 | OpenShift | |
5.7.1 Create administrative boundaries between resources using namespaces | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.21 Ensure the default seccomp profile is not Disabled | CIS Docker v1.5.0 L1 Docker Linux | Unix | |
5.21 Ensure the default seccomp profile is not Disabled | CIS Docker v1.3.1 L1 Docker Linux | Unix | |
6.2.9 Ensure Instance IP assignment is set to private | CIS Google Cloud Platform v2.0.0 L1 | GCP | |