Item Search

NameAudit NamePluginCategory
1.1.8 Ensure that the --profiling argument is set to falseCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.2.1 Ensure that the --profiling argument is set to falseCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.2.1.1 Ensure 'Protection From Zone Elevation' is set to Enabled - mse7.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.10 Ensure 'Object Caching Protection' is set to Enabled - mse7.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.10 Ensure 'Object Caching Protection' is set to Enabled - mspub.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.10 Ensure 'Object Caching Protection' is set to Enabled - onent.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.10 Ensure 'Object Caching Protection' is set to Enabled - outlook.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.10 Ensure 'Object Caching Protection' is set to Enabled - spDesign.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.11 Ensure 'Consistent Mime Handling' is set to Enabled - outlook.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.11 Ensure 'Consistent Mime Handling' is set to Enabled - powerpnt.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.11 Ensure 'Consistent Mime Handling' is set to Enabled - spDesign.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.11 Ensure 'Consistent Mime Handling' is set to Enabled - winproj.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.12 Ensure 'Add-on Management' is set to Enabled - mspub.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.3 - MobileIron - Disable 'Form auto-fill' - 'Samsung SAFE'MobileIron - CIS Google Android 4 v1.0.0 L1MDM

CONFIGURATION MANAGEMENT

1.3.2 Ensure that the --profiling argument is set to falseCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.3.2 Ensure that the --profiling argument is set to falseCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.1 Ensure that the apiserver file permissions are set to 644 or more restrictiveCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.2 Ensure that the API server pod specification file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.4 Ensure that the controller manager pod specification file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.7 Ensure that the etcd pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.9 Ensure that the Container Network Interface file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.9 Ensure that the Container Network Interface file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.10 Ensure that the Container Network Interface file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.16 Ensure that the scheduler.conf file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.17 Ensure that the controller-manager.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.17 Ensure that the controller-manager.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.6.1 Ensure that the cluster-admin role is only used where requiredCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.6.1 Ensure that the cluster-admin role is only used where requiredCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.6.2 Create Pod Security Policies for your clusterCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.7.5 Do not admit containers with allowPrivilegeEscalationCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.7.7 Do not admit containers with dangerous capabilitiesCIS Kubernetes 1.11 Benchmark v1.3.0 L2Unix

CONFIGURATION MANAGEMENT

2.1.7 Ensure that the --protect-kernel-defaults argument is set to trueCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.1.9 Ensure that the --keep-terminated-pod-volumes argument is set to falseCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.1.10 Ensure that the --hostname-override argument is not setCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

2.1.12 Ensure that the --cadvisor-port argument is set to 0CIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.1.13 Ensure that the --cadvisor-port argument is set to 0CIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.1 Ensure that the kubelet.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.4 Ensure that the kubelet service file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.5 Ensure that the proxy kubeconfig file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.6 Ensure that the proxy kubeconfig file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.9 Ensure that the kubelet configuration file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

3.1.7 Ensure that the --profiling argument is set to falseCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

3.2 Ensure that docker.service file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.2.1 Ensure that the --profiling argument is set to falseCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

3.13 Ensure that Docker server certificate key file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.18 Ensure that daemon.json file permissions are set to 644 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.6 Ensure HEALTHCHECK instructions have been added to the container imageCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.7 Ensure privileged ports are not mapped within containersCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

7.4 Restrict at/cron to authorized users (/var/cron/allow)CIS FreeBSD v1.0.5Unix

CONFIGURATION MANAGEMENT