1.1 Create a separate partition for containers | CIS Docker 1.11.0 v1.0.0 L1 Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Create a separate partition for containers | CIS Docker 1.12.0 v1.0.0 L1 Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Ensure a separate partition for containers has been created | CIS Docker Community Edition v1.1.0 L1 Linux Host OS | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.6 Enterprise Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.7 Enterprise Linux OS L1 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.6 Community Linux OS L1 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.7 Community Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 8.0 Community Linux OS L1 v1.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1 Place Databases on Non-System Partitions | CIS MySQL 5.7 Enterprise Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.1.1 Ensure a separate partition for containers has been created | CIS Docker v1.7.0 L1 Docker - Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS SQL Server 2017 Database L1 OS v1.3.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS SQL Server 2022 Database L1 DB v1.1.0 | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS Microsoft SQL Server 2019 v1.4.0 L1 Database Engine | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.2 Ensure Single-Function Member Servers are Used | CIS SQL Server 2022 Database L1 AWS RDS v1.1.0 | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
1.7 Ensure MariaDB is Run Under a Sandbox Environment | CIS MariaDB 10.6 on Linux L2 v1.1.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
1.7 Ensure MySQL is Run Under a Sandbox Environment | CIS MySQL 8.0 Enterprise Linux OS L2 v1.3.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MariaDB | CIS MariaDB 10.6 Database L1 v1.1.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.6 Enterprise Windows OS L1 v2.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.6 Enterprise Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.6 Community Database L1 v2.0.0 | MySQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.6 Enterprise Linux OS L1 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2 Dedicate the Machine Running MySQL | CIS MySQL 5.7 Community Linux OS L1 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
2.3 Dedicate the Machine Running MySQL | CIS MySQL 8.0 Enterprise Linux OS L1 v1.3.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.2 Minimize access to secrets | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.4 Minimize the admission of containers wishing to share the host IPC namespace | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.4 Minimize the admission of containers wishing to share the host network namespace | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.5 Minimize the admission of containers wishing to share the host network namespace | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.4.2 Consider external secret storage | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
5.11 Ensure that the memory usage for containers is limited | CIS Docker v1.7.0 L1 Docker - Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.12 Ensure that CPU priority is set appropriately on containers | CIS Docker v1.7.0 L1 Docker - Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.16 Ensure that the host's process namespace is not shared | CIS Docker v1.7.0 L1 Docker - Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.17 Do not directly expose host devices to containers | CIS Docker 1.12.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.17 Do not directly expose host devices to containers | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.17 Do not directly expose host devices to containers | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.19 Ensure that the default ulimit is overwritten at runtime if needed | CIS Docker v1.7.0 L1 Docker - Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.31 Ensure that the host's user namespaces are not shared | CIS Docker v1.7.0 L1 Docker - Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
6.2 Ensure that container sprawl is avoided | CIS Docker v1.7.0 L1 Docker - Linux | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
8.7.3 Do not send host information to guests | CIS VMware ESXi 5.1 v1.0.1 Level 1 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
8.7.3 Do not send host information to guests | CIS VMware ESXi 5.5 v1.2.0 Level 2 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
8.7.3 Ensure host information is not sent to guests | CIS VMware ESXi 6.5 v1.0.0 Level 2 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
20.15 Ensure 'Data files owned by users must be on a different logical partition from the directory server data files' (STIG DC only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DC | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
20.15 Ensure 'Data files owned by users must be on a different logical partition from the directory server data files' (STIG DC only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DC | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
20.15 Ensure 'Data files owned by users must be on a different logical partition from the directory server data files' (STIG DC only) | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MS | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
20.15 Ensure 'Data files owned by users must be on a different logical partition from the directory server data files' (STIG DC only) | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
VM : restrict-host-info | VMWare vSphere 6.5 Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VM : restrict-host-info | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VM : restrict-host-info | VMWare vSphere 6.0 Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |