Item Search

NameAudit NamePluginCategory
1.1.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.2 Ensure that the API server pod specification file ownership is set to root:rootCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.3 Ensure that the controller manager pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.4 Ensure that the controller manager pod specification file ownership is set to root:rootCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.5 Ensure that the scheduler pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.7 Ensure that the etcd pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.8 Ensure that the etcd pod specification file ownership is set to root:rootCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.12 Ensure that the etcd data directory ownership is set to etcd:etcdCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.14 Ensure that the admin.conf file ownership is set to root:rootCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.15 Ensure that the scheduler.conf file permissions are set to 644 or more restrictiveCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 644 or more restrictiveCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.1.21 Ensure that the Kubernetes PKI key file permissions are set to 600CIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
1.2.13 Ensure that the admission control plugin SecurityContextDeny is set if PodSecurityPolicy is not usedCIS Kubernetes Benchmark v1.6.1 L1 MasterUnix
3.1.1 Ensure that the proxy kubeconfig file permissions are set to 644 or more restrictiveCIS Google Kubernetes Engine (GKE) v1.1.0 L1 WorkerUnix
3.1.3 Ensure that the kubelet configuration file has permissions set to 644 or more restrictiveCIS Google Kubernetes Engine (GKE) v1.1.0 L1 WorkerUnix
3.1.4 Ensure that the kubelet configuration file ownership is set to root:rootCIS Google Kubernetes Engine (GKE) v1.1.0 L1 WorkerUnix
3.2.6 Ensure that the --protect-kernel-defaults argument is set to trueCIS Google Kubernetes Engine (GKE) v1.1.0 L1 WorkerUnix
4.1.2 Ensure that the kubelet service file ownership is set to root:rootCIS Kubernetes Benchmark v1.6.1 L1 WorkerUnix
4.1.3 If proxy kubeconfig file exists ensure permissions are set to 644 or more restrictiveCIS Kubernetes Benchmark v1.6.1 L1 WorkerUnix
4.1.5 Ensure that default service accounts are not actively used.CIS Google Kubernetes Engine (GKE) v1.1.0 L1 MasterGCP
4.1.5 Ensure that default service accounts are not actively used.CIS Google Kubernetes Engine (GKE) v1.3.0 L1GCP
4.1.5 Ensure that the --kubeconfig kubelet.conf file permissions are set to 644 or more restrictiveCIS Kubernetes Benchmark v1.6.1 L1 WorkerUnix
4.1.6 Ensure that the --kubeconfig kubelet.conf file ownership is set to root:rootCIS Kubernetes Benchmark v1.6.1 L1 WorkerUnix
4.1.8 Ensure that the client certificate authorities file ownership is set to root:rootCIS Kubernetes Benchmark v1.6.1 L1 WorkerUnix
4.1.9 Ensure that the kubelet --config configuration file has permissions set to 644 or more restrictiveCIS Kubernetes Benchmark v1.6.1 L1 WorkerUnix
4.1.10 Ensure that the kubelet --config configuration file ownership is set to root:rootCIS Kubernetes Benchmark v1.6.1 L1 WorkerUnix
4.2.1 Minimize the admission of privileged containersCIS Google Kubernetes Engine (GKE) v1.1.0 L1 MasterGCP
4.2.2 Minimize the admission of containers wishing to share the host process ID namespaceCIS Google Kubernetes Engine (GKE) v1.1.0 L1 MasterGCP
4.2.3 Minimize the admission of containers wishing to share the host IPC namespaceCIS Google Kubernetes Engine (GKE) v1.1.0 L1 MasterGCP
4.2.4 Minimize the admission of containers wishing to share the host network namespaceCIS Google Kubernetes Engine (GKE) v1.1.0 L1 MasterGCP
4.2.5 Minimize the admission of containers with allowPrivilegeEscalationCIS Google Kubernetes Engine (GKE) v1.1.0 L1 MasterGCP
4.2.6 Minimize the admission of root containersCIS Google Kubernetes Engine (GKE) v1.1.0 L2 MasterGCP
4.2.9 Minimize the admission of containers with capabilities assignedCIS Google Kubernetes Engine (GKE) v1.1.0 L2 MasterGCP
4.6 Ensure that HEALTHCHECK instructions have been added to container imagesCIS Docker v1.3.1 L1 Docker LinuxUnix
4.7 Ensure update instructions are not used alone in DockerfilesCIS Docker v1.3.1 L1 Docker LinuxUnix
4.8 Ensure Compute Instances Are Launched With Shielded VM EnabledCIS Google Cloud Platform v3.0.0 L2GCP

CONFIGURATION MANAGEMENT

4.9 Ensure that COPY is used instead of ADD in DockerfilesCIS Docker v1.3.1 L1 Docker LinuxUnix
5.1 Ensure that, if applicable, an AppArmor Profile is enabledCIS Docker v1.3.1 L1 Docker LinuxUnix
5.1.4 Minimize Container Registries to only those approvedCIS Google Kubernetes Engine (GKE) v1.3.0 L2GCP
5.1.4 Minimize Container Registries to only those approvedCIS Google Kubernetes Engine (GKE) v1.1.0 L2 MasterGCP
5.2 Ensure that, if applicable, SELinux security options are setCIS Docker v1.3.1 L2 Docker LinuxUnix
5.3 Ensure that Linux kernel capabilities are restricted within containersCIS Docker v1.3.1 L1 Docker LinuxUnix
5.3 Ensure that, if applicable, SELinux security options are setCIS Docker v1.6.0 L2 Docker LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

5.14 Ensure that the 'on-failure' container restart policy is set to '5'CIS Docker v1.3.1 L1 Docker LinuxUnix
5.28 Ensure that the PIDs cgroup limit is usedCIS Docker v1.3.1 L1 Docker LinuxUnix
8.3.4 Ensure standard processes are used for VM deploymentCIS VMware ESXi 6.7 v1.2.0 Level 1VMware
8.3.4 Ensure standard processes are used for VM deploymentCIS VMware ESXi 7.0 v1.1.0 Level 1VMware
8.3.4 Ensure standard processes are used for VM deploymentCIS VMware ESXi 7.0 v1.3.0 Level 1VMware
8.3.4 Ensure standard processes are used for VM deploymentCIS VMware ESXi 7.0 v1.2.0 Level 1VMware