2.3.10.6 Ensure 'Network access: Named Pipes that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 10 Enterprise (Release 1809) v1.6.1 L1 + BL | Windows | |
2.3.10.6 Ensure 'Network access: Named Pipes that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 10 Enterprise (Release 1903) v1.7.1 L1 + NG | Windows | |
2.3.10.6 Ensure 'Network access: Named Pipes that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 10 Enterprise (Release 1909) v1.8.1 L1 + NG | Windows | |
2.3.10.6 Ensure 'Network access: Named Pipes that can be accessed anonymously' is set to 'None' | CIS Microsoft Windows 10 Enterprise (Release 2004) v1.9.1 L1 + NG | Windows | |
2.3.10.7 Configure 'Network access: Named Pipes that can be accessed anonymously' (MS only) | CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.0 | Windows | |
2.3.10.8 Configure 'Network access: Named Pipes that can be accessed anonymously' | CIS Microsoft Windows Server 2016 STIG NG DC L3 v1.0.0 | Windows | |
2.3.10.8 Configure 'Network access: Named Pipes that can be accessed anonymously' | CIS Microsoft Windows Server 2016 STIG DC L1 v1.0.0 | Windows | |
2.3.10.9 Configure 'Network access: Named Pipes that can be accessed anonymously' (MS only) | CIS Microsoft Windows Server 2016 STIG MS L1 v1.0.0 | Windows | |
2.3.10.9 Configure 'Network access: Named Pipes that can be accessed anonymously' (MS only) | CIS Microsoft Windows Server 2016 STIG NG MS L3 v1.0.0 | Windows | |
3.10 Ensure Private Endpoints are used to access Storage Accounts | CIS Microsoft Azure Foundations v1.5.0 L1 | microsoft_azure | |
3.10 Ensure Private Endpoints are used to access Storage Accounts | CIS Microsoft Azure Foundations v2.0.0 L1 | microsoft_azure | |
4.3.2 Ensure that all Namespaces have Network Policies defined | CIS Google Kubernetes Engine (GKE) v1.4.0 L2 | GCP | |
4.3.2 Ensure that all Namespaces have Network Policies defined | CIS Google Kubernetes Engine (GKE) v1.3.0 L2 | GCP | |
4.3.2 Ensure that all Namespaces have Network Policies defined | CIS Google Kubernetes Engine (GKE) v1.5.0 L2 | GCP | |
4.5.1 Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks | CIS Microsoft Azure Foundations v1.5.0 L2 | microsoft_azure | |
4.5.1 Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks | CIS Microsoft Azure Foundations v2.0.0 L2 | microsoft_azure | |
4.5.2 Ensure That Private Endpoints Are Used Where Possible | CIS Microsoft Azure Foundations v1.5.0 L2 | microsoft_azure | |
4.5.2 Ensure That Private Endpoints Are Used Where Possible | CIS Microsoft Azure Foundations v2.0.0 L2 | microsoft_azure | |
5.2.3 Minimize the admission of containers wishing to share the host IPC namespace | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.4 Minimize the admission of containers wishing to share the host IPC namespace | CIS Kubernetes Benchmark v1.7.1 L1 Master | Unix | |
5.2.4 Minimize the admission of containers wishing to share the host IPC namespace | CIS Kubernetes Benchmark v1.8.0 L1 Master | Unix | |
5.2.4 Minimize the admission of containers wishing to share the host IPC namespace | CIS Kubernetes v1.23 Benchmark v1.0.1 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.4 Minimize the admission of containers wishing to share the host network namespace | CIS RedHat OpenShift Container Platform 4 v1.4.0 L1 | OpenShift | |
5.2.4 Minimize the admission of containers wishing to share the host network namespace | CIS RedHat OpenShift Container Platform 4 v1.5.0 L1 | OpenShift | |
5.2.4 Minimize the admission of containers wishing to share the host network namespace | CIS RedHat OpenShift Container Platform 4 v1.2.0 L1 | OpenShift | |
5.2.4 Minimize the admission of containers wishing to share the host network namespace | CIS RedHat OpenShift Container Platform 4 v1.3.0 L1 | OpenShift | |
5.2.5 Minimize the admission of containers wishing to share the host network namespace | CIS Kubernetes Benchmark v1.7.1 L1 Master | Unix | |
5.2.5 Minimize the admission of containers wishing to share the host network namespace | CIS Kubernetes Benchmark v1.8.0 L1 Master | Unix | |
5.2.5 Minimize the admission of containers wishing to share the host network namespace | CIS Kubernetes v1.24 Benchmark v1.0.0 L1 Master | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.3.2 Ensure that all Namespaces have Network Policies defined | CIS Kubernetes Benchmark v1.6.1 L2 Master | Unix | |
5.6.2 Ensure use of VPC-native clusters | CIS Google Kubernetes Engine (GKE) v1.5.0 L1 | GCP | |
5.6.2 Ensure use of VPC-native clusters | CIS Google Kubernetes Engine (GKE) v1.4.0 L1 | GCP | |
5.6.2 Ensure use of VPC-native clusters | CIS Google Kubernetes Engine (GKE) v1.3.0 L1 | GCP | |
5.6.2 Ensure use of VPC-native clusters | CIS Google Kubernetes Engine (GKE) v1.1.0 L1 Master | GCP | |
5.15 Ensure that the host's process namespace is not shared | CIS Docker v1.5.0 L1 Docker Linux | Unix | |
5.15 Ensure that the host's process namespace is not shared | CIS Docker v1.3.1 L1 Docker Linux | Unix | |
5.16 Ensure that the host's IPC namespace is not shared | CIS Docker v1.5.0 L1 Docker Linux | Unix | |
5.16 Ensure that the host's IPC namespace is not shared | CIS Docker v1.3.1 L1 Docker Linux | Unix | |
5.20 Ensure that the host's UTS namespace is not shared | CIS Docker v1.5.0 L1 Docker Linux | Unix | |
5.20 Ensure that the host's UTS namespace is not shared | CIS Docker v1.3.1 L1 Docker Linux | Unix | |
5.30 Ensure that the host's user namespaces are not shared | CIS Docker v1.5.0 L1 Docker Linux | Unix | |
6.3 Ensure storage area network (SAN) resources are segregated properly | CIS VMware ESXi 7.0 v1.2.0 Level 1 | VMware | |
6.3 Ensure storage area network (SAN) resources are segregated properly | CIS VMware ESXi 7.0 v1.3.0 Level 1 | VMware | |
6.3 Ensure storage area network (SAN) resources are segregated properly | CIS VMware ESXi 6.7 v1.2.0 Level 1 | VMware | |
6.3 Ensure storage area network (SAN) resources are segregated properly | CIS VMware ESXi 7.0 v1.1.0 Level 1 | VMware | |
7.10 Ensure that management plane traffic is separated from data plane traffic | CIS Docker v1.5.0 L2 Docker Linux | Unix | |
7.10 Ensure that management plane traffic is separated from data plane traffic | CIS Docker v1.3.1 L2 Docker Linux | Unix | |
8.7 Ensure that Private Endpoints are Used for Azure Key Vault | CIS Microsoft Azure Foundations v1.5.0 L2 | microsoft_azure | |
8.7 Ensure that Private Endpoints are Used for Azure Key Vault | CIS Microsoft Azure Foundations v2.0.0 L2 | microsoft_azure | |
18.9.35.1 Ensure 'Prevent the computer from joining a homegroup' is set to 'Enabled' | CIS Microsoft Windows 10 Enterprise (Release 1909) v1.8.1 L1 + NG | Windows | |