1.1.7 Ensure that the etcd pod specification file permissions are set to 600 or more restrictive | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL, MEDIA PROTECTION |
1.1.21 Ensure that the OpenShift PKI key file permissions are set to 600 | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL, MEDIA PROTECTION |
1.2.3 Ensure that the --token-auth-file parameter is not set | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | CONFIGURATION MANAGEMENT, MAINTENANCE |
1.2.8 Verify that RBAC is enabled | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.2.19 Ensure that the healthz endpoint is protected by RBAC | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
1.2.24 Ensure that the --request-timeout argument is set | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
1.2.27 Ensure that the --etcd-certfile and --etcd-keyfile arguments are set as appropriate | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.28 Ensure that the --tls-cert-file and --tls-private-key-file arguments are set as appropriate | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.2.32 Ensure that the API Server only makes use of Strong Cryptographic Ciphers | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | CONFIGURATION MANAGEMENT |
1.3.4 Ensure that the --root-ca-file argument is set as appropriate | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
1.3.5 Ensure that the --bind-address argument is set to 127.0.0.1 | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
2.2.11 Disable Apache services - Make sure that network/http:apache2 is disabled. | CIS Solaris 10 L1 v5.2 | Unix | |
2.6 Ensure that the --peer-auto-tls argument is not set to true | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | IDENTIFICATION AND AUTHENTICATION |
3.1.1 Client certificate authentication should not be used for users | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
3.2.2 Ensure that the audit policy covers key security concerns | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | AUDIT AND ACCOUNTABILITY |
4.1.1 Ensure that the kubelet service file permissions are set to 644 or more restrictive | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL, MEDIA PROTECTION |
4.1.5 Ensure that the --kubeconfig kubelet.conf file permissions are set to 644 or more restrictive | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL, MEDIA PROTECTION |
4.1.8 Ensure that the client certificate authorities file ownership is set to root:root | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL |
4.2.1 Activate Garbage collection in OpenShift Container Platform 4, as appropriate | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | SYSTEM AND INFORMATION INTEGRITY |
4.2.3 Ensure that the --authorization-mode argument is not set to AlwaysAllow | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | ACCESS CONTROL, MEDIA PROTECTION |
4.2.4 Ensure that the --client-ca-file argument is set as appropriate | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.9 Minimize the admission of containers with capabilities assigned | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | CONFIGURATION MANAGEMENT |
5.2.10 Minimize access to privileged Security Context Constraints | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.3.3 Ensure password reuse is limited - password-auth | CIS Amazon Linux v2.1.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.3.3 Ensure password reuse is limited - system-auth | CIS Amazon Linux v2.1.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.1 Prefer using secrets as files over secrets as environment variables | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.1 Create administrative boundaries between resources using namespaces | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.7.4 The default namespace should not be used | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | SYSTEM AND COMMUNICATIONS PROTECTION |
6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-For | CIS Palo Alto Firewall 7 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
Authentications | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |
CIS_Cisco_IOS_XE_16.x_v2.1.0_L1.audit from CIS Cisco IOS XE 16.x Benchmark v2.1.0 | CIS Cisco IOS XE 16.x v2.1.0 L1 | Cisco | |
CIS_Cisco_IOS_XE_16.x_v2.1.0_L2.audit from CIS Cisco IOS XE 16.x Benchmark v2.1.0 | CIS Cisco IOS XE 16.x v2.1.0 L2 | Cisco | |
CIS_Cisco_IOS_XE_17.x_v2.1.0_L1.audit from CIS Cisco IOS XE 17.x Benchmark v2.1.0 | CIS Cisco IOS XE 17.x v2.1.0 L1 | Cisco | |
CISC-RT-000240 - The Cisco perimeter router must be configured to deny network traffic by default and allow network traffic by exception. | DISA STIG Cisco IOS-XR Router RTR v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
ClusterRoles | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | |
CronJobs | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |
DaemonSets | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |
DeploymentConfigs | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |
DISA_STIG_MongoDB_Enterprise_Advanced_3.x_DB_v2r3.audit from DISA MongoDB Enterprise Advanced 3.x v2r3 STIG | DISA STIG MongoDB Enterprise Advanced 3.x v2r3 DB | MongoDB | |
Ensure password reuse is limited - pam_pwhistory.so | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | IDENTIFICATION AND AUTHENTICATION |
Ensure password reuse is limited - pam_unix.so | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | IDENTIFICATION AND AUTHENTICATION |
feature-gates | CIS RedHat OpenShift Container Platform v1.6.0 L1 | OpenShift | |
GEN005180 - All .Xauthority files must have mode 0600 or less permissive. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005190 - The .Xauthority files must not have extended ACLs. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
HorizontalPodAutoScalers | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |
Jobs | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |
ReplicaSets | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |
Routes | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |
Services | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |
StatefulSets | CIS RedHat OpenShift Container Platform v1.6.0 L2 | OpenShift | |