| 1.1.1 Ensure that the --anonymous-auth argument is set to false | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 1.1.11 Ensure that the admission control policy is set to DenyEscalatingExec | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | ACCESS CONTROL |
| 1.1.19 Ensure that the --token-auth-file parameter is not set | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 1.1.32 Ensure that the admission control policy is set to NodeRestriction | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | ACCESS CONTROL |
| 1.2 Enable Auto Update | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| 1.4.2 Ensure that the API server pod specification file ownership is set to root:root | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 1.4.7 Ensure that the etcd pod specification file permissions are set to 644 or more restrictive | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 1.4.9 Ensure that the Container Network Interface file permissions are set to 644 or more restrictive | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 1.4.10 Ensure that the Container Network Interface file ownership is set to root:root | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 1.4.11 Ensure that the etcd data directory permissions are set to 700 or more restrictive | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | |
| 1.4.12 Ensure that the etcd data directory ownership is set to etcd:etcd | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | |
| 1.4.17 Ensure that the controller-manager.conf file permissions are set to 644 or more restrictive | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 1.5.1 Ensure that the --cert-file and --key-file arguments are set as appropriate - ca-file | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 1.5.2 Ensure that the --client-cert-auth argument is set to true | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 1.5.7 Ensure that the --wal-dir argument is set as appropriate | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | AUDIT AND ACCOUNTABILITY |
| 1.6.5 Ensure that the seccomp profile is set to docker/default in your pod definitions | CIS Kubernetes 1.8 Benchmark v1.2.0 L2 | Unix | |
| 2.1.1 Ensure that the --allow-privileged argument is set to false | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | ACCESS CONTROL |
| 2.1.3 Ensure that the --authorization-mode argument is not set to AlwaysAllow | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | ACCESS CONTROL |
| 2.1.5 Ensure that the --read-only-port argument is set to 0 | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 2.1.9 Ensure that the --keep-terminated-pod-volumes argument is set to false | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 2.1.13 Ensure that the --cadvisor-port argument is set to 0 | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 2.1.14 Ensure that the RotateKubeletClientCertificate argument is not set to false | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 2.2.5 Ensure that the proxy kubeconfig file permissions are set to 644 or more restrictive | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 2.2.6 Ensure that the proxy kubeconfig file ownership is set to root:root | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 2.6.1.2 Ensure all user storage CoreStorage volumes are encrypted | CIS Apple macOS 10.12 L1 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
| 3.1.1 Ensure that the --anonymous-auth argument is set to false | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 3.1.5 Ensure that the --insecure-port argument is set to 0 | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 3.1.6 Ensure that the --secure-port argument is not set to 0 | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 3.1.9 Ensure that the admission control policy is set to NamespaceLifecycle | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | ACCESS CONTROL |
| 3.1.16 Ensure that the --service-account-lookup argument is set to true | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 3.2.1 Ensure that the --profiling argument is set to false | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| CIS Control 6 (6.2(a)) Activate Audit Logging | CAS Implementation Group 1 Audit File | Unix | AUDIT AND ACCOUNTABILITY |
| CIS Control 10 (10.1) Ensure Regular Automated Backups | CAS Implementation Group 1 Audit File | Unix | CONTINGENCY PLANNING |
| CIS_AlmaLinux_OS_8_v4.0.0_L1_Server.audit from CIS AlmaLinux OS 8 Benchmark v4.0.0 | CIS AlmaLinux OS 8 v4.0.0 L1 Server | Unix | |
| CIS_AlmaLinux_OS_8_v4.0.0_L1_Workstation.audit from CIS AlmaLinux OS 8 Benchmark v4.0.0 | CIS AlmaLinux OS 8 v4.0.0 L1 Workstation | Unix | |
| CIS_AlmaLinux_OS_9_v2.0.0_L1_Server.audit from CIS AlmaLinux OS 9 Benchmark v2.0.0 | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | |
| CIS_AlmaLinux_OS_9_v2.0.0_L2_Server.audit from CIS AlmaLinux OS 9 Benchmark v2.0.0 | CIS AlmaLinux OS 9 v2.0.0 L2 Server | Unix | |
| CIS_AlmaLinux_OS_9_v2.0.0_L2_Workstation.audit from CIS AlmaLinux OS 9 Benchmark v2.0.0 | CIS AlmaLinux OS 9 v2.0.0 L2 Workstation | Unix | |
| CIS_Amazon_Linux_2_STIG_v2.0.0_STIG.audit from CIS Amazon Linux 2 STIG v2.0.0 | CIS Amazon Linux 2 STIG v2.0.0 STIG | Unix | |
| CIS_Apache_Tomcat_9_L1_v1.2.0.audit from CIS Apache Tomcat 9 Benchmark | CIS Apache Tomcat 9 L1 v1.2.0 | Unix | |
| CIS_Bottlerocket_v1.0.0_L2.audit from CIS Bottlerocket Benchmark Level 2 | CIS Bottlerocket L2 | Unix | |
| CIS_Debian_Linux_11_v2.0.0_L2_Server.audit from CIS Debian Linux 11 Benchmark v2.0.0 | CIS Debian Linux 11 v2.0.0 L2 Server | Unix | |
| CIS_Debian_Linux_12_v1.1.0_L2_Workstation.audit from CIS Debian Linux 12 Benchmark v1.1.0 | CIS Debian Linux 12 v1.1.0 L2 Workstation | Unix | |
| CIS_Linux_Mint_22_v1.0.0_L2_Workstation.audit from CIS Linux Mint 22 Benchmark v1.0.0 | CIS Linux Mint 22 v1.0.0 L2 Workstation | Unix | |
| CIS_MacOS_Safari_Benchmark_v2.0.0_L2.audit from CIS MacOS Safari Benchmark v2.0.0 | CIS MacOS Safari v2.0.0 L2 | Unix | |
| CIS_Oracle_Linux_7_v4.0.0_L1_Workstation.audit from CIS Oracle Linux 7 Benchmark v4.0.0 | CIS Oracle Linux 7 v4.0.0 L1 Workstation | Unix | |
| CIS_Oracle_Linux_7_v4.0.0_L2_Workstation.audit from CIS Oracle Linux 7 Benchmark v4.0.0 | CIS Oracle Linux 7 v4.0.0 L2 Workstation | Unix | |
| CIS_Oracle_Linux_8_v4.0.0_L2_Workstation.audit from CIS Oracle Linux 8 Benchmark v4.0.0 | CIS Oracle Linux 8 v4.0.0 L2 Workstation | Unix | |
| CIS_Oracle_Server_18c_v1.1.0_L1_Linux.audit from CIS Oracle Database 18c Benchmark v1.1.0 | CIS Oracle Server 18c Linux v1.1.0 | Unix | |
| CIS_Rocky_Linux_10_v1.0.0_L1_Workstation.audit from CIS Rocky Linux 10 Benchmark v1.0.0 | CIS Rocky Linux 10 v1.0.0 L1 Workstation | Unix | |