Item Search

NameAudit NamePluginCategory
1.1 Use a Split-Horizon ArchitectureCIS BIND DNS v1.0.0 L1 Caching Only Name ServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.1 Use a Split-Horizon ArchitectureCIS BIND DNS v1.0.0 L1 Authoritative Name ServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5 Ensure proxy-arp is disabledCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.5 Ensure proxy-arp is disabledCIS Juniper OS Benchmark v2.0.0 L2Juniper

CONFIGURATION MANAGEMENT

3.6 Ensure ICMP Redirects are set to disabled (on all untrusted IPv4 networks)CIS Juniper OS Benchmark v2.0.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.6 Ensure ICMP Redirects are set to disabled (on all untrusted IPv4 networks)CIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.7 Ensure ICMP Redirects are set to disabled (on all untrusted IPv6 networks)CIS Juniper OS Benchmark v2.0.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.7 Ensure ICMP Redirects are set to disabled (on all untrusted IPv6 networks)CIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.4 Ensure Bogon Filtering is set (where EBGP is used)CIS Juniper OS Benchmark v2.0.0 L2Juniper
4.1.4 Ensure Bogon Filtering is set (where EBGP is used)CIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.5 Ensure Ingress Filtering is set for EBGP peersCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.5 Ensure Ingress Filtering is set for EBGP peersCIS Juniper OS Benchmark v2.0.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.6 Ensure RPKI is set for Origin Validation of EBGP peersCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure 'Applications and Threats Update Schedule' is set to download and install updates at daily or shorter intervalsCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
4.6.1 Create administrative boundaries between resources using namespacesCIS Google Kubernetes Engine (GKE) v1.5.0 L1GCP

SYSTEM AND COMMUNICATIONS PROTECTION

5.6.4 Ensure clusters are created with Private Endpoint Enabled and Public Access DisabledCIS Google Kubernetes Engine (GKE) v1.4.0 L2GCP
5.6.4 Ensure clusters are created with Private Endpoint Enabled and Public Access DisabledCIS Google Kubernetes Engine (GKE) v1.1.0 L2 MasterGCP
5.6.4 Ensure clusters are created with Private Endpoint Enabled and Public Access DisabledCIS Google Kubernetes Engine (GKE) v1.3.0 L2GCP
5.6.5 Ensure clusters are created with Private NodesCIS Google Kubernetes Engine (GKE) v1.1.0 L1 MasterGCP
5.6.5 Ensure clusters are created with Private NodesCIS Google Kubernetes Engine (GKE) v1.3.0 L1GCP
5.6.5 Ensure clusters are created with Private NodesCIS Google Kubernetes Engine (GKE) v1.4.0 L1GCP
5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes Benchmark v1.8.0 L1 MasterUnix
5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes Benchmark v1.7.1 L1 MasterUnix
5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes Benchmark v1.9.0 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes v1.20 Benchmark v1.0.1 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes v1.20 Benchmark v1.0.0 L1 MasterUnix

ACCESS CONTROL

5.9 Ensure that the host's network namespace is not sharedCIS Docker v1.5.0 L1 Docker LinuxUnix
5.9 Ensure that the host's network namespace is not sharedCIS Docker v1.3.1 L1 Docker LinuxUnix
5.30 Ensure that the host's user namespaces are not sharedCIS Docker v1.5.0 L1 Docker LinuxUnix
5.30 Ensure that the host's user namespaces are not sharedCIS Docker v1.3.1 L1 Docker LinuxUnix
5.31 Ensure that the host's user namespaces are not sharedCIS Docker v1.6.0 L1 Docker LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.3 Ensure no SQL Databases allow ingress 0.0.0.0/0 (ANY IP)CIS Microsoft Azure Foundations v1.3.1 L1microsoft_azure
6.16 Ensure that a Zone Protection Profile with an enabled SYN Flood Action of SYN Cookies is attached to all untrusted zonesCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
6.16 Ensure that a Zone Protection Profile with an enabled SYN Flood Action of SYN Cookies is attached to all untrusted zonesCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

6.17 Ensure that a Zone Protection Profile with tuned Flood Protection settings enabled for all flood types is attached to all untrusted zonesCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
6.17 Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set to appropriate actionsCIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto
6.18 Ensure all zones have Zone Protection Profiles that drop specially crafted packetsCIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto
6.18 Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set to appropriate actionsCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
6.18 Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set to appropriate actionsCIS Palo Alto Firewall 10 v1.0.0 L1Palo_Alto
6.18 Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set to appropriate actionsCIS Palo Alto Firewall 9 v1.0.1 L1Palo_Alto
6.19 Ensure all zones have Zone Protection Profiles that drop specially crafted packetsCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
6.19 Ensure all zones have Zone Protection Profiles that drop specially crafted packetsCIS Palo Alto Firewall 10 v1.0.0 L1Palo_Alto
6.19 Ensure all zones have Zone Protection Profiles that drop specially crafted packetsCIS Palo Alto Firewall 9 v1.0.1 L1Palo_Alto
6.19 Ensure all zones have Zone Protection Profiles that drop specially crafted packetsCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure 'Security Policy' denying any/all traffic to/from IP addresses on Trusted Threat Intelligence Sources ExistsCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
8.2 Ensure 'SSL Inbound Inspection' is required for all untrusted traffic destined for servers using SSL or TLSCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto