Item Search

NameAudit NamePluginCategory
1.3.2 Ensure that the --profiling argument is set to falseCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.1 Ensure that the API server pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.3 Ensure that the controller manager pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.4 Ensure that the controller manager pod specification file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.8 Ensure that the etcd pod specification file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.10 Ensure that the Container Network Interface file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.13 Ensure that the admin.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.15 Ensure that the scheduler.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.16 Ensure that the scheduler.conf file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.16 Ensure that the scheduler.conf file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.17 Ensure that the controller-manager.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - clusterrolebindingCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix

CONFIGURATION MANAGEMENT

1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - rolebindingCIS Kubernetes 1.11 Benchmark v1.3.0 L2Unix

CONFIGURATION MANAGEMENT

1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - rolebindingCIS Kubernetes 1.13 Benchmark v1.4.1 L2Unix

CONFIGURATION MANAGEMENT

1.6.9 Place compensating controls in the form of PSP and RBAC for privileged containers usage - clusterrolebindingCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix

CONFIGURATION MANAGEMENT

1.6.9 Place compensating controls in the form of PSP and RBAC for privileged containers usage - pspCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix

CONFIGURATION MANAGEMENT

1.6.9 Place compensating controls in the form of PSP and RBAC for privileged containers usage - rolebindingCIS Kubernetes 1.8 Benchmark v1.2.0 L2Unix

CONFIGURATION MANAGEMENT

1.7.2 Do not admit containers wishing to share the host process ID namespaceCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

1.7.3 Do not admit containers wishing to share the host IPC namespaceCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.1.8 Ensure Host Name is setCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.2.2 Ensure that the config file ownership is set to root:rootCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.4 Ensure that the kubelet file ownership is set to root:rootCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.8 Ensure that the client certificate authorities file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.9 Ensure that the kubelet configuration file ownership is set to root:rootCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.4.2 Disable Internet SharingCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.4.4 Disable Printer SharingCIS Apple macOS 10.13 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.10.2 - TCP Wrappers - creating a hosts.deny file - creation - '/etc/hosts.deny root:system 600'CIS AIX 5.3/6.1 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.10.3 - TCP Wrappers - creating a hosts.allow file - creation - '/etc/hosts.allow root:system 600'CIS AIX 5.3/6.1 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.12.7 - Miscellaneous Config - Block talk/write - '/etc/profile contains mesg n'CIS AIX 5.3/6.1 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.13 Service or SID name - 'Non-default'CIS v1.1.0 Oracle 11g OS L1Unix

CONFIGURATION MANAGEMENT

3.3 Verify that docker-registry.service file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.5 Verify that docker.socket file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.11 Verify that docker-registry environment file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.12 Verify that docker-registry environment file permissions are set to 644 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.16 Ensure that Docker socket file permissions are set to 660 or more restrictiveCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.23 Verify that Docker server certificate key file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.24 Verify that Docker server certificate key file permissions are set to 400CIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.02 init.ora - 'global_names = TRUE'CIS v1.1.0 Oracle 11g OS L1Unix

CONFIGURATION MANAGEMENT

4.09 init.ora - 'Avoid using utl_file_dir parameters'CIS v1.1.0 Oracle 11g OS L1Unix

CONFIGURATION MANAGEMENT

5.10 Ensure Access to .ht* Files Is RestrictedCIS Apache HTTP Server 2.2 L1 v3.6.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

5.26 sqlnet.ora - 'ssl_server_dn_match = YES'CIS v1.1.0 Oracle 11g OS L2Unix

CONFIGURATION MANAGEMENT

9.1.4 Set User/Group Owner and Permission on /etc/cron.dailyCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.1.7 Set User/Group Owner and Permission on /etc/cron.dCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

11.2 Remove OS Information from Login Warning Banners - /etc/motdCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT