Item Search

NameAudit NamePluginCategory
1.1.7 Ensure that the etcd pod specification file permissions are set to 600 or more restrictiveCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

1.1.11 - MobileIron - Turn Off AirDrop DiscoverabilityMobileIron - CIS Apple iOS 8 v1.0.0 L2MDM

ACCESS CONTROL

1.1.21 Ensure that the OpenShift PKI key file permissions are set to 600CIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

1.2.3 Ensure that the --token-auth-file parameter is not setCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.8 Verify that RBAC is enabledCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.2.19 Ensure that the healthz endpoint is protected by RBACCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.2.24 Ensure that the --request-timeout argument is setCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.2.27 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.28 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.32 Ensure that the API Server only makes use of Strong Cryptographic CiphersCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

CONFIGURATION MANAGEMENT

1.3.4 Ensure that the --root-ca-file argument is set as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

1.3.5 Ensure that the --bind-address argument is set to 127.0.0.1CIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.6 Ensure that the --peer-auto-tls argument is not set to trueCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

IDENTIFICATION AND AUTHENTICATION

3.1.1 Client certificate authentication should not be used for usersCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2 Ensure that the audit policy covers key security concernsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

AUDIT AND ACCOUNTABILITY

4.1.1 Ensure that the kubelet service file permissions are set to 644 or more restrictiveCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

4.1.3.7 Ensure kernel module loading and unloading is collected - delete_module 32 bitCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

4.1.5 Ensure that the --kubeconfig kubelet.conf file permissions are set to 644 or more restrictiveCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

4.1.8 Ensure that the client certificate authorities file ownership is set to root:rootCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL

4.1.16 Ensure kernel module loading and unloading is collectedCIS SUSE Linux Enterprise 12 v3.2.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.16 Ensure kernel module loading and unloading is collected - auditctl /sbin/modprobeCIS Red Hat 6 Server L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.16 Ensure kernel module loading and unloading is collected - auditctl /sbin/rmmodCIS Red Hat 6 Server L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.16 Ensure kernel module loading and unloading is collected - rules.d /sbin/insmodCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.16 Ensure kernel module loading and unloading is collected - rules.d /sbin/insmodCIS Red Hat 6 Server L2 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.1.16 Ensure kernel module loading and unloading is collected - rules.d modulesCIS Oracle Linux 6 Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.2.1 Activate Garbage collection in OpenShift Container Platform 4, as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

SYSTEM AND INFORMATION INTEGRITY

4.2.3 Ensure that the --authorization-mode argument is not set to AlwaysAllowCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure that the --client-ca-file argument is set as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.9 Minimize the admission of containers with capabilities assignedCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

CONFIGURATION MANAGEMENT

5.2.10 Minimize access to privileged Security Context ConstraintsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.4.1 Prefer using secrets as files over secrets as environment variablesCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.7.1 Create administrative boundaries between resources using namespacesCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be usedCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

9.2.3 Limit Password ReuseCIS Debian Linux 7 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

AuthenticationsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
CIS_Cisco_ASA_9.x_Firewall_v1.1.0_L2.audit from CIS Cisco ASA 9.x Firewall Benchmark v1.1.0CIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco
ClusterRolesCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift
CronJobsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
DeploymentConfigsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
DISA_STIG_MongoDB_Enterprise_Advanced_3.x_OS_Linux_v2r3.audit from DISA MongoDB Enterprise Advanced 3.x v2r3 STIGDISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix
DISA_STIG_MongoDB_Enterprise_Advanced_4.x_OS_v1r4.audit from DISA MongoDB Enterprise Advanced 4.x v1r4 STIGDISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix
feature-gatesCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift
GEN005180 - All .Xauthority files must have mode 0600 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

HorizontalPodAutoScalersCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
JobsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
OL08-00-040320 - The graphical display manager must not be installed on OL 8 unless approved.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RoutesCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
SOL-11.1-020510 - All .Xauthority files must have mode 0600 or less permissive.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SOL-11.1-020520 - The .Xauthority files must not have extended ACLs.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

StatefulSetsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift