Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 2 of 8
• 386 Total
Next
Next ››
Name
Audit Name
Plugin
Category
1.1.2 Ensure only trusted users are allowed to control Docker daemon
CIS Docker v1.3.1 L1 Linux Host OS
Unix
1.1.2 Ensure that the API server pod specification file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.2 Ensure that the API server pod specification file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.6 Ensure that the scheduler pod specification file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.6 Ensure that the scheduler pod specification file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.8 Ensure that the etcd pod specification file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.10 Ensure that the Container Network Interface file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.16 Ensure that the scheduler.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.16 Ensure that the scheduler.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.18 Ensure that the controller-manager.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
1.1.18 Ensure that the controller-manager.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictive
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
1.3.4 Ensure that the --service-account-private-key-file argument is set as appropriate
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.4.1 Ensure that the --profiling argument is set to false
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.8 Ensure that 'Notify all admins when other admins reset their password?' is set to 'Yes'
CIS Microsoft Azure Foundations v1.3.1 L2
microsoft_azure
2.1 Run the Docker daemon as a non-root user, if possible
CIS Docker v1.3.1 L2 Linux Host OS
Unix
2.1 Run the Docker daemon as a non-root user, if possible
CIS Docker v1.5.0 L2 Linux Host OS
Unix
2.4 Ensure Docker is allowed to make changes to iptables - daemon.json
CIS Docker v1.5.0 L1 Docker Linux
Unix
2.4 Ensure Docker is allowed to make changes to iptables - dockerd
CIS Docker v1.5.0 L1 Docker Linux
Unix
2.4 Ensure Docker is allowed to make changes to iptables - dockerd
CIS Docker v1.3.1 L1 Docker Linux
Unix
2.14 Ensure containers are restricted from acquiring new privileges
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.3 Ensure that docker.socket file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.7 Ensure that registry certificate file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.9 Ensure that TLS CA certificate file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.9 Ensure that TLS CA certificate file ownership is set to root:root
CIS Docker v1.3.1 L1 Docker Linux
Unix
3.11 Ensure that Docker server certificate file ownership is set to root:root
CIS Docker v1.3.1 L1 Docker Linux
Unix
3.13 Ensure that the Docker server certificate key file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.17 Ensure that the daemon.json file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.19 Ensure that the /etc/default/docker file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.22 Ensure that the /etc/sysconfig/docker file ownership is set to root:root
CIS Docker v1.5.0 L1 Docker Linux
Unix
3.23 Ensure that the Containerd socket file ownership is set to root:root
CIS Docker v1.3.1 L1 Docker Linux
Unix
4.1 Ensure that a user for the container has been created
CIS Docker v1.5.0 L1 Docker Linux
Unix
4.1.2 Ensure that the kubelet service file ownership is set to root:root
CIS Kubernetes Benchmark v1.7.1 L1 Worker
Unix
4.1.2 Ensure that the kubelet service file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Worker
Unix
4.1.6 Ensure that the --kubeconfig kubelet.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.8.0 L1 Worker
Unix
4.1.7 Avoid use of system:masters group
CIS Google Kubernetes Engine (GKE) v1.5.0 L1
GCP
5.1.1 Ensure sudo is installed
CIS SUSE Linux Enterprise Workstation 12 L1 v3.0.0
Unix
5.1.8 Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.2.2 Ensure sudo commands use pty
CIS Amazon Linux 2 v2.0.0 L1
Unix
5.2.2 Minimize the admission of privileged containers
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.2.2 Minimize the admission of privileged containers
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.2.7 Minimize the admission of root containers
CIS Kubernetes Benchmark v1.7.1 L2 Master
Unix
5.4 Ensure that privileged containers are not used
CIS Docker v1.5.0 L1 Docker Linux
Unix
5.4 Ensure that privileged containers are not used
CIS Docker v1.3.1 L1 Docker Linux
Unix
5.23 Ensure that docker exec commands are not used with the user=root option
CIS Docker v1.5.0 L2 Docker Linux
Unix
5.25 Ensure that the container is restricted from acquiring additional privileges
CIS Docker v1.5.0 L1 Docker Linux
Unix
5.31 Ensure that the Docker socket is not mounted inside any containers
CIS Docker v1.5.0 L1 Docker Linux
Unix
6.1.1 Create baseline of executables that elevate to a different GUID (Not scored)
CIS IBM AIX 7.2 L2 v1.0.0
Unix
10.3 Restrict manager application
CIS Apache Tomcat 10 L2 v1.0.0 Middleware
Unix
10.13 Do not run applications as privileged
CIS Apache Tomcat 10 L1 v1.0.0
Unix
‹‹ Previous
Previous
Page 2 of 8
• 386 Total
Next
Next ››