Item Search

NameAudit NamePluginCategory
1.1.7 Ensure that the etcd pod specification file permissions are set to 600 or more restrictiveCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

1.1.21 Ensure that the OpenShift PKI key file permissions are set to 600CIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

1.2.3 Ensure that the --token-auth-file parameter is not setCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

CONFIGURATION MANAGEMENT, MAINTENANCE

1.2.8 Verify that RBAC is enabledCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.2.19 Ensure that the healthz endpoint is protected by RBACCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.2.24 Ensure that the --request-timeout argument is setCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.2.27 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.28 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.32 Ensure that the API Server only makes use of Strong Cryptographic CiphersCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

CONFIGURATION MANAGEMENT

1.3.4 Ensure that the --root-ca-file argument is set as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

1.3.5 Ensure that the --bind-address argument is set to 127.0.0.1CIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.11 Disable Apache services - Make sure that network/http:apache2 is disabled.CIS Solaris 10 L1 v5.2Unix
2.6 Ensure that the --peer-auto-tls argument is not set to trueCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

IDENTIFICATION AND AUTHENTICATION

3.1.1 Client certificate authentication should not be used for usersCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2.2 Ensure that the audit policy covers key security concernsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

AUDIT AND ACCOUNTABILITY

4.1.1 Ensure that the kubelet service file permissions are set to 644 or more restrictiveCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

4.1.5 Ensure that the --kubeconfig kubelet.conf file permissions are set to 644 or more restrictiveCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

4.1.8 Ensure that the client certificate authorities file ownership is set to root:rootCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL

4.2.1 Activate Garbage collection in OpenShift Container Platform 4, as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

SYSTEM AND INFORMATION INTEGRITY

4.2.3 Ensure that the --authorization-mode argument is not set to AlwaysAllowCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

ACCESS CONTROL, MEDIA PROTECTION

4.2.4 Ensure that the --client-ca-file argument is set as appropriateCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.9 Minimize the admission of containers with capabilities assignedCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

CONFIGURATION MANAGEMENT

5.2.10 Minimize access to privileged Security Context ConstraintsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.3 Ensure password reuse is limited - password-authCIS Amazon Linux v2.1.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.3.3 Ensure password reuse is limited - system-authCIS Amazon Linux v2.1.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.4.1 Prefer using secrets as files over secrets as environment variablesCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.7.1 Create administrative boundaries between resources using namespacesCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.7.4 The default namespace should not be usedCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift

SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

AuthenticationsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
CIS_Cisco_IOS_XE_16.x_v2.1.0_L1.audit from CIS Cisco IOS XE 16.x Benchmark v2.1.0CIS Cisco IOS XE 16.x v2.1.0 L1Cisco
CIS_Cisco_IOS_XE_16.x_v2.1.0_L2.audit from CIS Cisco IOS XE 16.x Benchmark v2.1.0CIS Cisco IOS XE 16.x v2.1.0 L2Cisco
CIS_Cisco_IOS_XE_17.x_v2.1.0_L1.audit from CIS Cisco IOS XE 17.x Benchmark v2.1.0CIS Cisco IOS XE 17.x v2.1.0 L1Cisco
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

ClusterRolesCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift
CronJobsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
DaemonSetsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
DeploymentConfigsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
DISA_STIG_MongoDB_Enterprise_Advanced_3.x_DB_v2r3.audit from DISA MongoDB Enterprise Advanced 3.x v2r3 STIGDISA STIG MongoDB Enterprise Advanced 3.x v2r3 DBMongoDB
Ensure password reuse is limited - pam_pwhistory.soTenable Cisco Firepower Management Center OS Best Practices AuditUnix

IDENTIFICATION AND AUTHENTICATION

Ensure password reuse is limited - pam_unix.soTenable Cisco Firepower Management Center OS Best Practices AuditUnix

IDENTIFICATION AND AUTHENTICATION

feature-gatesCIS RedHat OpenShift Container Platform v1.6.0 L1OpenShift
GEN005180 - All .Xauthority files must have mode 0600 or less permissive.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN005190 - The .Xauthority files must not have extended ACLs.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

HorizontalPodAutoScalersCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
JobsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
ReplicaSetsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
RoutesCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
ServicesCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift
StatefulSetsCIS RedHat OpenShift Container Platform v1.6.0 L2OpenShift