Item Search

NameAudit NamePluginCategory
1.1.4 Ensure that the controller manager pod specification file ownership is set to root:rootCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

1.1.6 Ensure that the scheduler pod specification file ownership is set to root:rootCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

1.1.8 Ensure that the etcd pod specification file ownership is set to root:rootCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

1.1.10 Ensure that the Container Network Interface file ownership is set to root:rootCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

1.1.16 Ensure that the scheduler.conf file ownership is set to root:rootCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.1.18 Ensure that the controller-manager.conf file ownership is set to root:rootCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

1.1.20 Ensure that the Kubernetes PKI certificate file permissions are set to 600 or more restrictiveCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

1.4.1 Set 'password' for 'enable secret'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL

3.5 Ensure the SQL Server's MSSQL Service Account is Not an AdministratorCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL

3.5 Ensure the SQL Server's MSSQL Service Account is Not an AdministratorCIS SQL Server 2016 Database L1 OS v1.4.0Windows

ACCESS CONTROL

3.6.3.3 FTPD: Disable root access to ftpCIS IBM AIX 7.1 L1 v2.1.0Unix

ACCESS CONTROL

3.7 Ensure the SQL Server's Full-Text Service Account is Not an AdministratorCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL

3.9 Ensure that TLS CA certificate file ownership is set to root:rootCIS Docker v1.6.0 L1 Docker LinuxUnix

ACCESS CONTROL

3.23 Ensure that the Containerd socket file ownership is set to root:rootCIS Docker v1.6.0 L2 Docker LinuxUnix

ACCESS CONTROL

4.1.2 Ensure that the kubelet service file ownership is set to root:rootCIS Kubernetes v1.24 Benchmark v1.0.0 L1 WorkerUnix

ACCESS CONTROL

4.1.8 Ensure that the client certificate authorities file ownership is set to root:rootCIS Kubernetes v1.23 Benchmark v1.0.1 L1 WorkerUnix

ACCESS CONTROL

4.2.20 Ensure sshd PermitRootLogin is disabledCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

4.3.1 Ensure sudo is installedCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL

4.3.1 Ensure sudo is installedCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

4.3.1 Ensure sudo is installedCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL

4.3.1 Ensure sudo is installedCIS Amazon Linux 2 v3.0.0 L1Unix

ACCESS CONTROL

4.3.2 Ensure sudo commands use ptyCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL

4.3.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS Debian 10 Workstation L1 v2.0.0Unix

ACCESS CONTROL

4.3.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

4.3.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

ACCESS CONTROL

4.3.6 Ensure sudo authentication timeout is configured correctlyCIS Debian 10 Server L1 v2.0.0Unix

ACCESS CONTROL

4.3.6 Ensure sudo authentication timeout is configured correctlyCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

4.3.6 Ensure sudo authentication timeout is configured correctlyCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.1 Ensure Options for the OS Root Directory Are RestrictedCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL

5.1.7 Avoid use of system:masters groupCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

5.1.8 Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes clusterCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

5.1.20 Ensure sshd PermitRootLogin is disabledCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL

5.2.1 Ensure sudo is installedCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL

5.2.1 Ensure sudo is installedCIS Debian Linux 11 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.1 Ensure sudo is installedCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.2.2 Ensure sudo commands use ptyCIS Debian Linux 12 v1.1.0 L1 ServerUnix

ACCESS CONTROL

5.2.4 Ensure users must provide password for privilege escalationCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

ACCESS CONTROL

5.2.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS Debian Linux 11 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.6 Minimize the admission of containers with allowPrivilegeEscalationCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

ACCESS CONTROL

5.3.1 Ensure sudo is installedCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.3.2 Ensure sudo commands use ptyCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.3.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS CentOS Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL

5.3.5 Ensure re-authentication for privilege escalation is not disabled globallyCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

ACCESS CONTROL

5.4 Ensure 'SUPER' is Not Granted to Non-Administrative UsersCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB

ACCESS CONTROL

5.18 Ensure that host devices are not directly exposed to containersCIS Docker v1.6.0 L1 Docker LinuxUnix

ACCESS CONTROL

5.32 Ensure that the Docker socket is not mounted inside any containersCIS Docker v1.6.0 L1 Docker LinuxUnix

ACCESS CONTROL

10.17 Setting Security Lifecycle Listener - check for config componentCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

ACCESS CONTROL

18.9.90.2 Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

ACCESS CONTROL

18.10.81.2 (L1) Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL