Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 1 of 6
• 254 Total
Next
Next ››
Name
Audit Name
Plugin
Category
3.1.1 Ensure that the proxy kubeconfig file permissions are set to 644 or more restrictive
CIS Google Kubernetes Engine (GKE) v1.3.0 L1 Node
Unix
3.1.1 Ensure that the proxy kubeconfig file permissions are set to 644 or more restrictive
CIS Google Kubernetes Engine (GKE) v1.4.0 L1 Node
Unix
3.1.2 Ensure that the proxy kubeconfig file ownership is set to root:root
CIS Google Kubernetes Engine (GKE) v1.4.0 L1 Node
Unix
3.1.2 Ensure that the proxy kubeconfig file ownership is set to root:root
CIS Google Kubernetes Engine (GKE) v1.3.0 L1 Node
Unix
3.1.3 Ensure that the kubelet configuration file has permissions set to 644 or more restrictive
CIS Google Kubernetes Engine (GKE) v1.3.0 L1 Node
Unix
3.1.4 Ensure that the kubelet configuration file ownership is set to root:root
CIS Google Kubernetes Engine (GKE) v1.3.0 L1 Node
Unix
3.1.4 Ensure that the kubelet configuration file ownership is set to root:root
CIS Google Kubernetes Engine (GKE) v1.4.0 L1 Node
Unix
4.1.2 Minimize access to secrets
CIS Google Kubernetes Engine (GKE) v1.4.0 L1
GCP
4.1.9 Ensure that the kubelet --config configuration file has permissions set to 600 or more restrictive
CIS RedHat OpenShift Container Platform 4 v1.3.0 L1
OpenShift
4.1.9 Ensure that the kubelet --config configuration file has permissions set to 600 or more restrictive
CIS RedHat OpenShift Container Platform 4 v1.4.0 L1
OpenShift
4.2 Ensure that containers use only trusted base images
CIS Docker v1.5.0 L1 Docker Linux
Unix
4.3 Ensure that unnecessary packages are not installed in the container
CIS Docker v1.5.0 L1 Docker Linux
Unix
4.6 Ensure that HEALTHCHECK instructions have been added to container images
CIS Docker v1.5.0 L1 Docker Linux
Unix
4.7 Ensure update instructions are not used alone in Dockerfiles
CIS Docker v1.5.0 L1 Docker Linux
Unix
4.8 Ensure Compute Instances Are Launched With Shielded VM Enabled
CIS Google Cloud Platform v1.3.0 L2
GCP
4.8 Ensure Compute Instances Are Launched With Shielded VM Enabled
CIS Google Cloud Platform v2.0.0 L2
GCP
4.9 Ensure that COPY is used instead of ADD in Dockerfiles
CIS Docker v1.5.0 L1 Docker Linux
Unix
5.1 Ensure that, if applicable, an AppArmor Profile is enabled
CIS Docker v1.5.0 L1 Docker Linux
Unix
5.1.4 Minimize access to create pods
CIS RedHat OpenShift Container Platform 4 v1.4.0 L1
OpenShift
5.1.4 Minimize access to create pods
CIS RedHat OpenShift Container Platform 4 v1.2.0 L1
OpenShift
5.1.4 Minimize access to create pods
CIS RedHat OpenShift Container Platform 4 v1.3.0 L1
OpenShift
5.1.4 Minimize access to create pods
CIS RedHat OpenShift Container Platform 4 v1.5.0 L1
OpenShift
5.2 Ensure that, if applicable, SELinux security options are set
CIS Docker v1.5.0 L2 Docker Linux
Unix
5.2.2 Minimize the admission of containers wishing to share the host process ID namespace
CIS RedHat OpenShift Container Platform 4 v1.4.0 L1
OpenShift
5.2.2 Minimize the admission of containers wishing to share the host process ID namespace
CIS RedHat OpenShift Container Platform 4 v1.5.0 L1
OpenShift
5.2.7 Minimize the admission of containers with the NET_RAW capability
CIS RedHat OpenShift Container Platform 4 v1.2.0 L1
OpenShift
5.2.8 Minimize the admission of containers with added capabilities - allowedCapabilities
CIS RedHat OpenShift Container Platform 4 v1.2.0 L1
OpenShift
5.2.8 Minimize the admission of containers with added capabilities - allowedCapabilities
CIS RedHat OpenShift Container Platform 4 v1.5.0 L1
OpenShift
5.2.8 Minimize the admission of containers with added capabilities - allowedCapabilities
CIS RedHat OpenShift Container Platform 4 v1.3.0 L1
OpenShift
5.2.8 Minimize the admission of containers with added capabilities - allowedCapabilities
CIS RedHat OpenShift Container Platform 4 v1.4.0 L1
OpenShift
5.2.8 Minimize the admission of containers with added capabilities - defaultAddCapabilities
CIS RedHat OpenShift Container Platform 4 v1.5.0 L1
OpenShift
5.2.8 Minimize the admission of containers with added capabilities - defaultAddCapabilities
CIS RedHat OpenShift Container Platform 4 v1.2.0 L1
OpenShift
5.2.8 Minimize the admission of containers with the NET_RAW capability
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.2.9 Minimize the admission of containers with added capabilities
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.2.9 Minimize the admission of containers with added capabilities
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.2.9 Minimize the admission of containers with capabilities assigned
CIS RedHat OpenShift Container Platform 4 v1.4.0 L2
OpenShift
5.2.10 Minimize the admission of containers with capabilities assigned
CIS Kubernetes Benchmark v1.8.0 L2 Master
Unix
5.2.10 Minimize the admission of containers with capabilities assigned
CIS Kubernetes Benchmark v1.7.1 L2 Master
Unix
5.3 Ensure that Linux kernel capabilities are restricted within containers
CIS Docker v1.5.0 L1 Docker Linux
Unix
5.4.1 Ensure legacy Compute Engine instance metadata APIs are Disabled
CIS Google Kubernetes Engine (GKE) v1.3.0 L1
GCP
5.4.1 Ensure legacy Compute Engine instance metadata APIs are Disabled
CIS Google Kubernetes Engine (GKE) v1.4.0 L1
GCP
5.4.2 Ensure the GKE Metadata Server is Enabled
CIS Google Kubernetes Engine (GKE) v1.4.0 L2
GCP
5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controller
CIS Kubernetes Benchmark v1.7.1 L2 Master
Unix
5.5.1 Configure Image Provenance using ImagePolicyWebhook admission controller
CIS Kubernetes Benchmark v1.8.0 L2 Master
Unix
5.5.1 Ensure Container-Optimized OS (cos_containerd) is used for GKE node images
CIS Google Kubernetes Engine (GKE) v1.3.0 L2
GCP
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS RedHat OpenShift Container Platform 4 v1.3.0 L2
OpenShift
5.10.5 Ensure use of Binary Authorization
CIS Google Kubernetes Engine (GKE) v1.4.0 L2
GCP
5.10.5 Ensure use of Binary Authorization
CIS Google Kubernetes Engine (GKE) v1.3.0 L2
GCP
5.14 Ensure that the 'on-failure' container restart policy is set to '5'
CIS Docker v1.5.0 L1 Docker Linux
Unix
5.27 Ensure that Docker commands always make use of the latest version of their image
CIS Docker v1.5.0 L1 Docker Linux
Unix
‹‹ Previous
Previous
Page 1 of 6
• 254 Total
Next
Next ››