Item Search

NameAudit NamePluginCategory
1.6.3 Create network segmentation using Network PoliciesCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.16 Ensure a support role has been created to manage incidents with AWS SupportCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

INCIDENT RESPONSE

1.17 Ensure IAM instance roles are used for AWS resource access from instancesCIS Amazon Web Services Foundations v5.0.0 L2amazon_aws

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.21 Ensure access to AWSCloudShellFullAccess is restrictedCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.2.2.1 Ensure Private Endpoints are used to access {service}CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.10.6 (L1) Ensure 'Network access: Named Pipes that can be accessed anonymously' is set to 'None'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.3.10.6 Ensure 'Network access: Named Pipes that can be accessed anonymously' is set to 'None'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.1.1 Ensure that Azure Databricks is deployed in a customer-managed virtual network (VNet)CIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

4.3.1 Ensure that all Namespaces have Network Policies definedCIS Google Kubernetes Engine (GKE) Autopilot v1.1.0 L2GCP

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.3.2 Ensure that all Namespaces have Network Policies definedCIS Google Kubernetes Engine (GKE) v1.7.0 L2GCP

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.3 Minimize the admission of containers wishing to share the host IPC namespaceCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Minimize the admission of containers wishing to share the host IPC namespaceCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Minimize the admission of containers wishing to share the host IPC namespaceCIS Kubernetes v1.10.0 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Minimize the admission of containers wishing to share the host IPC namespaceCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Minimize the admission of containers wishing to share the host network namespaceCIS Red Hat OpenShift Container Platform v1.7.0 L1OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Minimize the admission of containers wishing to share the host network namespaceCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.5 Minimize the admission of containers wishing to share the host network namespaceCIS Kubernetes v1.10.0 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.5 Minimize the admission of containers wishing to share the host network namespaceCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.5 Minimize the admission of containers wishing to share the host network namespaceCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.6.2 Ensure use of VPC-native clustersCIS Google Kubernetes Engine (GKE) v1.7.0 L1GCP

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.16 Ensure that the host's process namespace is not sharedCIS Docker v1.7.0 L1 Docker - LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.17 Ensure that the host's IPC namespace is not sharedCIS Docker v1.7.0 L1 Docker - LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.21 Ensure that the host's UTS namespace is not sharedCIS Docker v1.7.0 L1 Docker - LinuxUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.31 Ensure that the host's user namespaces are not sharedCIS Docker v1.7.0 L1 Docker - LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.2.1 (L1) Host must isolate storage communicationsCIS VMware ESXi 8.0 v1.1.0 L1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 (L1) Ensure storage area network (SAN) resources are segregated properlyCIS VMware ESXi 7.0 v1.4.0 L1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure storage area network (SAN) resources are segregated properlyCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure storage area network (SAN) resources are segregated properlyCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

7.9 Ensure that management plane traffic is separated from data plane trafficCIS Docker v1.7.0 L1 Docker SwarmUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

9.3.8 Ensure that Private Endpoints are Used for Azure Key VaultCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

10.3.2.1 Ensure Private Endpoints are used to access Storage AccountsCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.35.1 (L1) Ensure 'Prevent the computer from joining a homegroup' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.35.1 Ensure 'Prevent the computer from joining a homegroup' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY