Item Search

NameAudit NamePluginCategory
1.1.1.3 Ensure mounting of jffs2 filesystems is disabled - /etc/modprobe.d/CIS.confCIS Amazon Linux v2.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.2.1 Ensure that the --profiling argument is set to falseCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.3.1 Ensure that the --terminated-pod-gc-threshold argument is set as appropriateCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.3 Ensure that the config file permissions are set to 644 or more restrictiveCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.5 Ensure that the scheduler file permissions are set to 644 or more restrictiveCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.6 Ensure that the scheduler file ownership is set to root:rootCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.7 Ensure that the etcd pod specification file permissions are set to 644 or more restrictiveCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.8 Ensure that the etcd pod specification file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.8 Ensure that the etcd.conf file ownership is set to root:rootCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.10 Ensure that the Container Network Interface file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.4.13 Ensure that the admin.conf file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.4.21 Ensure that the Kubernetes PKI key file permissions are set to 600CIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

1.6.1 Ensure that the cluster-admin role is only used where requiredCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

1.6.8 Place compensating controls in the form of PSP and RBAC for privileged containers usage - clusterrolebindingCIS Kubernetes 1.11 Benchmark v1.3.0 L2Unix

CONFIGURATION MANAGEMENT

1.7.4 Do not admit containers wishing to share the host network namespaceCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.1.10 Ensure that the --hostname-override argument is not setCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.1.11 Ensure that the --event-qps argument is set to 0CIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure that the kubelet.conf file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.2.3 Ensure that the kubelet file permissions are set to 644 or more restrictiveCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.3 Ensure that the kubelet service file permissions are set to 644 or more restrictiveCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.3 Ensure that the kubelet service file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.4 Ensure that the kubelet service file ownership is set to root:rootCIS Kubernetes 1.8 Benchmark v1.2.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.4 Ensure that the kubelet service file ownership is set to root:rootCIS Kubernetes 1.13 Benchmark v1.4.1 L1Unix

CONFIGURATION MANAGEMENT

2.2.5 Ensure that the proxy file permissions are set to 644 or more restrictiveCIS Kubernetes 1.7.0 Benchmark v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.5 Ensure that the proxy kubeconfig file permissions are set to 644 or more restrictiveCIS Kubernetes 1.11 Benchmark v1.3.0 L1Unix

CONFIGURATION MANAGEMENT

2.2.15 Ensure mail transfer agent is configured for local-only modeCIS Amazon Linux v2.1.0 L1Unix

CONFIGURATION MANAGEMENT

2.4.1 Set permissions on BIND chroot-ed directories '/var/named/chroot/var/named/ddns'CIS ISC BIND 9.0/9.5 v2.0.0Unix

CONFIGURATION MANAGEMENT

2.4.1 Set permissions on BIND chroot-ed directories '/var/named/chroot/var/run/named/*'CIS ISC BIND 9.0/9.5 v2.0.0Unix

CONFIGURATION MANAGEMENT

2.11.11 - Permissions and Ownership - '/etc/motd bin:bin 644'CIS AIX 5.3/6.1 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.12.7 - Miscellaneous Config - Block talk/write - '/etc/csh.login contains mesg n'CIS AIX 5.3/6.1 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

3.1 Ensure that docker.service file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.3 Ensure that docker.socket file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.4 Verify that docker-registry.service file permissions are set to 644 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.7 Ensure that registry certificate file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.8 Verify that Docker environment file permissions are set to 644 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.9 Ensure that TLS CA certificate file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.9 Verify that docker-network environment file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.10 Ensure the ScoreBoard File Is SecuredCIS Apache HTTP Server 2.2 L1 v3.6.0Unix

CONFIGURATION MANAGEMENT

3.17 Verify that registry certificate file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.18 Verify that registry certificate file permissions are set to 444 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.19 Ensure that /etc/default/docker file ownership is set to root:rootCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.25 Verify that Docker socket file ownership is set to root:docker - /var/run/docker.sockCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.1.2 Ensure auditd service is enabledCIS Amazon Linux v2.1.0 L2Unix

CONFIGURATION MANAGEMENT

4.2.2.1 Ensure syslog-ng service is enabledCIS Amazon Linux v2.1.0 L1Unix

CONFIGURATION MANAGEMENT

5.1.3 Ensure permissions on /etc/cron.hourly are configuredCIS Amazon Linux v2.1.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.4 Ensure SSH X11 forwarding is disabledCIS Amazon Linux v2.1.0 L1Unix

CONFIGURATION MANAGEMENT

5.26 Ensure container health is checked at runtimeCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

6.1.7 Ensure permissions on /etc/shadow- are configuredCIS Amazon Linux v2.1.0 L1Unix

CONFIGURATION MANAGEMENT

6.2.9 Ensure users own their home directoriesCIS Amazon Linux v2.1.0 L1Unix

CONFIGURATION MANAGEMENT

10.6 Enable strict servlet ComplianceCIS Apache Tomcat 8 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT