Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 1 of 8
• 386 Total
Next
Next ››
Name
Audit Name
Plugin
Category
1.1.4 Ensure that the controller manager pod specification file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.6 Ensure that the scheduler pod specification file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.8 Ensure that the etcd pod specification file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.8 Ensure that the etcd pod specification file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.10 Ensure that the Container Network Interface file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.10 Ensure that the Container Network Interface file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.14 Ensure that the admin.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.14 Ensure that the admin.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.16 Ensure that the scheduler.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.16 Ensure that the scheduler.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.18 Ensure that the controller-manager.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.18 Ensure that the controller-manager.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictive
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.13 Ensure there is only one active access key available for any single IAM user
CIS Amazon Web Services Foundations L1 1.5.0
amazon_aws
1.13 Ensure there is only one active access key available for any single IAM user
CIS Amazon Web Services Foundations L1 2.0.0
amazon_aws
2.1 Run the Docker daemon as a non-root user, if possible
CIS Docker v1.3.1 L2 Linux Host OS
Unix
2.6 Ensure that the User-ID service account does not have interactive logon rights
CIS Palo Alto Firewall 11 v1.0.0 L1
Palo_Alto
2.6 Ensure that the User-ID service account does not have interactive logon rights
CIS Palo Alto Firewall 9 v1.0.1 L1
Palo_Alto
2.6 Ensure that the User-ID service account does not have interactive logon rights
CIS Palo Alto Firewall 10 v1.0.0 L1
Palo_Alto
2.7 Ensure remote access capabilities for the User-ID service account are forbidden.
CIS Palo Alto Firewall 11 v1.0.0 L1
Palo_Alto
2.7 Ensure remote access capabilities for the User-ID service account are forbidden.
CIS Palo Alto Firewall 10 v1.1.0 L1
Palo_Alto
3.1 Ensure that the docker.service file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.7 Ensure that registry certificate file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.9 Ensure that TLS CA certificate file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.15 Ensure that the Docker socket file ownership is set to root:docker
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.19 Ensure that the /etc/default/docker file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.23 Ensure that the Containerd socket file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.23 Ensure that the Containerd socket file ownership is set to root:root
CIS Docker v1.3.1 L1 Docker Linux
Unix
4.1.6 Ensure that the --kubeconfig kubelet.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Worker
Unix
4.1.8 Ensure that the client certificate authorities file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Worker
Unix
4.1.8 Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster
CIS Google Kubernetes Engine (GKE) v1.5.0 L1
GCP
4.1.10 If the kubelet config.yaml configuration file is being used validate file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Worker
Unix
4.1.10 If the kubelet config.yaml configuration file is being used validate file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Worker
Unix
5.1.2 Ensure sudo commands use pty
CIS SUSE Linux Enterprise Workstation 12 L1 v3.0.0
Unix
5.1.8 Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.2.1 Ensure sudo is installed
CIS Amazon Linux 2 v2.0.0 L1
Unix
5.2.2 Ensure sudo commands use pty
CIS Amazon Linux 2 v2.0.0 L1
Unix
5.2.6 Minimize the admission of containers with allowPrivilegeEscalation
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.2.7 Minimize the admission of root containers
CIS Kubernetes Benchmark v1.8.0 L2 Master
Unix
5.4 Ensure that privileged containers are not used
CIS Docker v1.5.0 L1 Docker Linux
Unix
5.22 Ensure that docker exec commands are not used with the privileged option
CIS Docker v1.5.0 L2 Docker Linux
Unix
5.25 Ensure that the container is restricted from acquiring additional privileges
CIS Docker v1.5.0 L1 Docker Linux
Unix
6.1.1 Create baseline of executables that elevate to a different GUID (Not scored)
CIS IBM AIX 7.2 L2 v1.0.0
Unix
6.1.2 Create baseline of executables that require a specific group for elevation to a different EUID (not scored)
CIS IBM AIX 7.2 L2 v1.0.0
Unix
6.1.3 Create baseline of executables that elevate directly to a new EUID (not scored)
CIS IBM AIX 7.2 L2 v1.0.0
Unix
10.2 Restrict access to the web administration application
CIS Apache Tomcat 10 L1 v1.0.0 Middleware
Unix
10.2 Restrict access to the web administration application
CIS Apache Tomcat 10 L1 v1.0.0
Unix
10.3 Restrict manager application
CIS Apache Tomcat 10 L2 v1.0.0
Unix
10.3 Restrict manager application
CIS Apache Tomcat 10 L2 v1.0.0 Middleware
Unix
10.13 Do not run applications as privileged
CIS Apache Tomcat 10 L1 v1.0.0 Middleware
Unix
‹‹ Previous
Previous
Page 1 of 8
• 386 Total
Next
Next ››