Item Search

NameAudit NamePluginCategory
1.1.11 Ensure that the admission control plugin AlwaysPullImages is setCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

ACCESS CONTROL

1.5.5 Ensure that the --peer-client-cert-auth argument is set to trueCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.5.5 Ensure that the --peer-client-cert-auth argument is set to trueCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

1.6.1.1 Ensure SELinux is not disabled in bootloader configurationCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is not disabled in bootloader configurationCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - 'enforcing'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - enforcing = 0CIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration - selinux = 0CIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.1.1 Ensure SELinux is not disabled in bootloader configuration -'selinux'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.1.2 Ensure the SELinux state is enforcingCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcingCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Current mode'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Current mode'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Mode from config file'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'Mode from config file'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'SELinux status'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'SELinux status'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'SELINUX'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.2 Ensure the SELinux state is enforcing - 'SELINUX'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.4 Ensure no unconfined daemons existCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.4 Ensure no unconfined daemons existCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.1.6 Ensure no unconfined daemons existCIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.2 Ensure SELinux is installedCIS Amazon Linux v2.1.0 L2Unix

ACCESS CONTROL

1.6.2.1 Ensure AppArmor is not disabled in bootloader configurationCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.2.1 Ensure AppArmor is not disabled in bootloader configurationCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.6.2.2 Ensure all AppArmor Profiles are enforcingCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcingCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'complian mode'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'profiles loaded'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.2.2 Ensure all AppArmor Profiles are enforcing - 'unconfined processes'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.3 Ensure SELinux or AppArmor are installedCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

ACCESS CONTROL

1.6.3 Ensure SELinux or AppArmor are installedCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

ACCESS CONTROL

1.6.3.2 Ensure all AppArmor Profiles are enforcing - 0 processes are unconfirmedCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

ACCESS CONTROL

2.2.7 Ensure that the certificate authorities file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.7 Set Group Read-Only for BIND Files and Non-Runtime Directories - directoriesCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

2.7 Set Group Read-Only for BIND Files and Non-Runtime Directories - filesCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

ACCESS CONTROL

2.9 Isolate BIND with chroot'ed SubdirectoryCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

3.1 Ensure that role-based access control is enabled and configured appropriatelyCIS MongoDB 3.4 Database Audit L1 v1.0.0MongoDB

ACCESS CONTROL

3.1 Ensure that role-based access control is enabled and configured appropriatelyCIS MongoDB 3.2 Database Audit L1 v1.0.0MongoDB

ACCESS CONTROL

3.4 Ensure that each role for each MongoDB database is needed and grants only the necessary privilegesCIS MongoDB 3.2 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.4 Ensure that each role for each MongoDB database is needed and grants only the necessary privilegesCIS MongoDB 3.4 Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

4.4 Restrict Access to All Key Files - group root/namedCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

ACCESS CONTROL

5.1 Ensure AppArmor Profile is EnabledCIS Docker Community Edition v1.1.0 L1 DockerUnix

ACCESS CONTROL

6.1.1 Audit system file permissionsCIS Amazon Linux v2.1.0 L2Unix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Audit system file permissionsCIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

6.1.1 Audit system file permissionsCIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

Audit system file permissions - dpkgTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Audit system file permissions - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Audit system file permissions - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

Ensure no unconfined daemons existTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL