Item Search

NameAudit NamePluginCategory
1.2 Use the updated Linux KernelCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

1.4 Remove all non-essential services from the host - DPKGCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.4 Remove all non-essential services from the host - DPKGCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.4 Remove all non-essential services from the host - RPMCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.4 Remove all non-essential services from the host - RPMCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.4 Remove all non-essential services from the host - Running ProcessesCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.4 Remove all non-essential services from the host - Running ProcessesCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.4 Remove all non-essential services from the host - SocketsCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.4 Remove all non-essential services from the host - SocketsCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.5 Remove all non-essential services from the host - DPKGCIS Docker 1.6 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.5 Remove all non-essential services from the host - RPMCIS Docker 1.6 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.5 Remove all non-essential services from the host - running processesCIS Docker 1.6 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

1.5 Remove all non-essential services from the host - socketsCIS Docker 1.6 v1.0.0 L1 LinuxUnix

CONFIGURATION MANAGEMENT

2.15 Ensure Userland Proxy is DisabledCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

2.16 Ensure daemon-wide custom seccomp profile is applied, if neededCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Ensure that docker.socket file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.4 Ensure that docker.socket file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.6 Implement DNSSEC 'INCLUDE'CIS ISC BIND 9.0/9.5 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.9 Ensure that TLS CA certificate file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.10 Ensure that TLS CA certificate file permissions are set to 444 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.17 Ensure that daemon.json file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.1 Ensure a user for the container has been createdCIS Docker Community Edition v1.1.0 L1 DockerUnix

ACCESS CONTROL

4.2 Enable Auditing of Incoming Network Connections - AUE_inetd_connect : cisCIS Solaris 11 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2 Enable Auditing of Incoming Network Connections - AUE_SOCKCONNECT : cisCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.3 Enable Auditing of File Metadata Modification Events - AUE_FACLSET : cisCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.3 Enable Auditing of File Metadata Modification Events - AUE_FCHOWN : cisCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.5 Ensure Content trust for Docker is EnabledCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND INFORMATION INTEGRITY

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes v1.23 Benchmark v1.0.1 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes v1.24 Benchmark v1.0.0 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitionsCIS Kubernetes v1.20 Benchmark v1.0.1 L2 MasterUnix

CONFIGURATION MANAGEMENT

5.10 Ensure memory usage for container is limitedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.15 Ensure the host's process namespace is not sharedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.16 Ensure the host's IPC namespace is not sharedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.18 Ensure the default ulimit is overwritten at runtime, only if neededCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.21 Ensure the default seccomp profile is not DisabledCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.26 Ensure container health is checked at runtimeCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.30 Ensure the host's user namespaces is not sharedCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.8 Disable Host-based Authentication for Login-based Services - rlogin auth sufficient pam_rhosts_auth.so.1CIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.8 Disable Host-based Authentication for Login-based Services - rlogin auth sufficient pam_rhosts_auth.so.1CIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.8 Disable Host-based Authentication for Login-based Services - rsh auth sufficient pam_rhosts_auth.so.1CIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.8 Disable Host-based Authentication for Login-based Services - rsh auth sufficient pam_rhosts_auth.so.1CIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

7.3 Ensure swarm services are binded to a specific host interfaceCIS Docker Community Edition v1.1.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Ensure management plane traffic has been separated from data plane trafficCIS Docker Community Edition v1.1.0 L2 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Check if this is a Docker Vessel/HostCIS Docker Community Edition v1.1.0 L2 DockerUnix
DKER-EE-002660 - Docker Secrets must be used to store configuration files and small amounts of user-generated data (up to 500 kb in size) in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

DKER-EE-003920 - Universal Control Plane (UCP) must be integrated with a trusted certificate authority (CA) in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

DKER-EE-004040 - The Docker Enterprise default ulimit must not be overwritten at runtime unless approved in the System Security Plan (SSP).DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

DKER-EE-005080 - Docker Enterprise node certificates must be rotated as defined in the System Security Plan (SSP).DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

TCAT-AS-000390 - $CATALINA_HOME/bin folder permissions must be set to 750.DISA STIG Apache Tomcat Application Server 9 v3r1 MiddlewareUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

Ubuntu is installedCIS Docker Community Edition v1.1.0 L1 DockerUnix