Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 2 of 6
• 254 Total
Next
Next ››
Name
Audit Name
Plugin
Category
1.1.9 Ensure that the Container Network Interface file permissions are set to 644 or more restrictive
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.1.10 Ensure that the Container Network Interface file ownership is set to root:root
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.1.11 Ensure that the etcd data directory permissions are set to 700 or more restrictive
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.1.13 Ensure that the admin.conf file permissions are set to 644 or more restrictive
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.1.16 Ensure that the scheduler.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.1.17 Ensure that the controller-manager.conf file permissions are set to 644 or more restrictive
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.1.18 Ensure that the controller-manager.conf file ownership is set to root:root
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
3.1.2 Ensure that the proxy kubeconfig file ownership is set to root:root
CIS Google Kubernetes Engine (GKE) v1.1.0 L1 Worker
Unix
3.1.3 Ensure that the kubelet configuration file has permissions set to 644 or more restrictive
CIS Google Kubernetes Engine (GKE) v1.4.0 L1 Node
Unix
4.1.1 Ensure that the kubelet service file permissions are set to 644 or more restrictive
CIS Kubernetes Benchmark v1.6.1 L1 Worker
Unix
4.1.2 Minimize access to secrets
CIS Google Kubernetes Engine (GKE) v1.1.0 L1 Master
GCP
4.1.2 Minimize access to secrets
CIS Google Kubernetes Engine (GKE) v1.3.0 L1
GCP
4.1.4 If proxy kubeconfig file exists ensure ownership is set to root:root
CIS Kubernetes Benchmark v1.6.1 L1 Worker
Unix
4.1.4 Minimize access to create pods
CIS Google Kubernetes Engine (GKE) v1.1.0 L1 Master
GCP
4.1.6 Ensure that Service Account Tokens are only mounted where necessary
CIS Google Kubernetes Engine (GKE) v1.1.0 L1 Master
GCP
4.1.9 Ensure that the kubelet --config configuration file has permissions set to 600 or more restrictive
CIS RedHat OpenShift Container Platform 4 v1.2.0 L1
OpenShift
4.1.9 Ensure that the kubelet --config configuration file has permissions set to 600 or more restrictive
CIS RedHat OpenShift Container Platform 4 v1.5.0 L1
OpenShift
4.2 Ensure that containers use only trusted base images
CIS Docker v1.3.1 L1 Docker Linux
Unix
4.2.7 Minimize the admission of containers with the NET_RAW capability
CIS Google Kubernetes Engine (GKE) v1.1.0 L1 Master
GCP
4.2.8 Minimize the admission of containers with added capabilities
CIS Google Kubernetes Engine (GKE) v1.1.0 L1 Master
GCP
4.3 Ensure that unnecessary packages are not installed in the container
CIS Docker v1.3.1 L1 Docker Linux
Unix
4.6.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS Google Kubernetes Engine (GKE) v1.1.0 L2 Master
GCP
4.6.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS Google Kubernetes Engine (GKE) v1.3.0 L2
GCP
4.6.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS Google Kubernetes Engine (GKE) v1.4.0 L2
GCP
5.1.4 Minimize Container Registries to only those approved
CIS Google Kubernetes Engine (GKE) v1.4.0 L2
GCP
5.2.2 Minimize the admission of containers wishing to share the host process ID namespace
CIS RedHat OpenShift Container Platform 4 v1.2.0 L1
OpenShift
5.2.2 Minimize the admission of containers wishing to share the host process ID namespace
CIS RedHat OpenShift Container Platform 4 v1.3.0 L1
OpenShift
5.2.7 Minimize the admission of containers with the NET_RAW capability
CIS RedHat OpenShift Container Platform 4 v1.4.0 L1
OpenShift
5.2.7 Minimize the admission of containers with the NET_RAW capability
CIS RedHat OpenShift Container Platform 4 v1.3.0 L1
OpenShift
5.2.7 Minimize the admission of containers with the NET_RAW capability
CIS RedHat OpenShift Container Platform 4 v1.5.0 L1
OpenShift
5.2.8 Minimize the admission of containers with added capabilities - defaultAddCapabilities
CIS RedHat OpenShift Container Platform 4 v1.3.0 L1
OpenShift
5.2.8 Minimize the admission of containers with added capabilities - defaultAddCapabilities
CIS RedHat OpenShift Container Platform 4 v1.4.0 L1
OpenShift
5.2.8 Minimize the admission of containers with the NET_RAW capability
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.2.9 Minimize the admission of containers with capabilities assigned
CIS RedHat OpenShift Container Platform 4 v1.2.0 L2
OpenShift
5.2.9 Minimize the admission of containers with capabilities assigned
CIS RedHat OpenShift Container Platform 4 v1.4.0 L1
OpenShift
5.2.9 Minimize the admission of containers with capabilities assigned
CIS RedHat OpenShift Container Platform 4 v1.5.0 L2
OpenShift
5.2.9 Minimize the admission of containers with capabilities assigned
CIS RedHat OpenShift Container Platform 4 v1.3.0 L2
OpenShift
5.4.2 Ensure the GKE Metadata Server is Enabled
CIS Google Kubernetes Engine (GKE) v1.3.0 L2
GCP
5.5.1 Ensure Container-Optimized OS (cos_containerd) is used for GKE node images
CIS Google Kubernetes Engine (GKE) v1.4.0 L2
GCP
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS RedHat OpenShift Container Platform 4 v1.2.0 L2
OpenShift
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS RedHat OpenShift Container Platform 4 v1.5.0 L2
OpenShift
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS Kubernetes Benchmark v1.8.0 L2 Master
Unix
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS Kubernetes Benchmark v1.7.1 L2 Master
Unix
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS RedHat OpenShift Container Platform 4 v1.4.0 L1
OpenShift
5.7.2 Ensure that the seccomp profile is set to docker/default in your pod definitions
CIS RedHat OpenShift Container Platform 4 v1.4.0 L2
OpenShift
5.10.5 Ensure use of Binary Authorization
CIS Google Kubernetes Engine (GKE) v1.1.0 L2 Master
GCP
5.18 Ensure that the default ulimit is overwritten at runtime if needed
CIS Docker v1.5.0 L1 Docker Linux
Unix
5.18 Ensure that the default ulimit is overwritten at runtime if needed
CIS Docker v1.3.1 L1 Docker Linux
Unix
5.27 Ensure that Docker commands always make use of the latest version of their image
CIS Docker v1.3.1 L1 Docker Linux
Unix
5.28 Ensure that the PIDs cgroup limit is used
CIS Docker v1.5.0 L1 Docker Linux
Unix
‹‹ Previous
Previous
Page 2 of 6
• 254 Total
Next
Next ››