Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 1 of 4
• 157 Total
Next
Next ››
Name
Audit Name
Plugin
Category
1.1 Ensure 'Web content' is on non-system partition
CIS IIS 10 v1.2.0 Level 1
Windows
1.1 Ensure web content is on non-system partition
CIS IIS 10 v1.1.1 Level 1
Windows
1.1.1 Ensure a separate partition for containers has been created
CIS Docker v1.5.0 L1 Linux Host OS
Unix
1.2 Use Dedicated Least Privileged Account for MySQL Daemon/Service
CIS MySQL 8.0 Enterprise Linux OS L1 v1.2.1
Unix
1.2 Use Dedicated Least Privileged Account for MySQL Daemon/Service
CIS MySQL 8.0 Enterprise Linux OS L1 v1.1.0
Unix
1.2.1 Ensure that the --anonymous-auth argument is set to false
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.2.11 Ensure that the admission control plugin AlwaysAdmit is not set
CIS Kubernetes Benchmark v1.6.1 L1 Master
Unix
1.3 Ensure device is physically secured
CIS Juniper OS Benchmark v2.0.0 L1
Juniper
1.14 Ensure that 'Guests can invite' is set to 'No'
CIS Microsoft Azure Foundations v1.3.1 L2
microsoft_azure
1.17 Ensure a support role has been created to manage incidents with AWS Support
CIS Amazon Web Services Foundations L1 1.5.0
amazon_aws
1.17 Ensure a support role has been created to manage incidents with AWS Support
CIS Amazon Web Services Foundations L1 1.4.0
amazon_aws
1.17 Ensure a support role has been created to manage incidents with AWS Support
CIS Amazon Web Services Foundations L1 2.0.0
amazon_aws
1.20 Ensure that IAM Access analyzer is enabled for all regions
CIS Amazon Web Services Foundations L1 1.5.0
amazon_aws
3.2.2 Ensure that the --authorization-mode argument is not set to AlwaysAllow
CIS Google Kubernetes Engine (GKE) v1.1.0 L1 Worker
Unix
4.1.9 Minimize access to create persistent volumes
CIS Google Kubernetes Engine (GKE) v1.5.0 L1
GCP
4.1.10 Minimize access to the proxy sub-resource of nodes
CIS Google Kubernetes Engine (GKE) v1.5.0 L1
GCP
4.1.11 Minimize access to the approval sub-resource of certificatesigningrequests objects
CIS Google Kubernetes Engine (GKE) v1.5.0 L1
GCP
4.1.12 Minimize access to webhook configuration objects
CIS Google Kubernetes Engine (GKE) v1.5.0 L1
GCP
4.1.13 Minimize access to the service account token creation
CIS Google Kubernetes Engine (GKE) v1.5.0 L1
GCP
4.2.6 Ensure that the --make-iptables-util-chains argument is set to true
CIS Kubernetes Benchmark v1.7.1 L1 Worker
Unix
4.2.6 Ensure that the --make-iptables-util-chains argument is set to true
CIS Kubernetes Benchmark v1.8.0 L1 Worker
Unix
5.1.2 Minimize access to secrets
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.1.2 Minimize access to secrets
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.1.3 Minimize wildcard use in Roles and ClusterRoles
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.1.3 Minimize wildcard use in Roles and ClusterRoles - clusterroles
CIS Kubernetes Benchmark v1.8.0 L1 Worker
Unix
5.1.3 Minimize wildcard use in Roles and ClusterRoles - roles
CIS Kubernetes Benchmark v1.8.0 L1 Worker
Unix
5.1.4 Minimize access to create pods
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.1.4 Minimize access to create pods
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.1.9 Minimize access to create persistent volumes
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.1.9 Minimize access to create persistent volumes
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.1.10 Minimize access to the proxy sub-resource of nodes
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.1.10 Minimize access to the proxy sub-resource of nodes
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.1.11 Minimize access to the approval sub-resource of certificatesigningrequests objects
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.1.11 Minimize access to the approval sub-resource of certificatesigningrequests objects
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.1.12 Minimize access to webhook configuration objects
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.1.12 Minimize access to webhook configuration objects
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.1.13 Minimize access to the service account token creation
CIS Kubernetes Benchmark v1.7.1 L1 Master
Unix
5.1.13 Minimize access to the service account token creation
CIS Kubernetes Benchmark v1.8.0 L1 Master
Unix
5.17 Ensure that host devices are not directly exposed to containers
CIS Docker v1.5.0 L1 Docker Linux
Unix
7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone
CIS Palo Alto Firewall 10 v1.1.0 L2
Palo_Alto
7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone
CIS Palo Alto Firewall 9 v1.0.1 L2
Palo_Alto
7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone
CIS Palo Alto Firewall 10 v1.1.0 L1
Palo_Alto
7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone
CIS Palo Alto Firewall 10 v1.0.0 L1
Palo_Alto
7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone
CIS Palo Alto Firewall 9 v1.0.1 L1
Palo_Alto
7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone
CIS Palo Alto Firewall 10 v1.0.0 L2
Palo_Alto
7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone
CIS Palo Alto Firewall 11 v1.0.0 L1
Palo_Alto
7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone
CIS Palo Alto Firewall 11 v1.0.0 L2
Palo_Alto
8.3 Ensure that Resource Locks are set for mission critical Azure resources
CIS Microsoft Azure Foundations v1.3.1 L2
microsoft_azure
8.5 Enable role-based access control (RBAC) within Azure Kubernetes Services
CIS Microsoft Azure Foundations v1.3.1 L1
microsoft_azure
9.4 Ensure the web app has 'Client Certificates (Incoming client certificates)' set to 'On'
CIS Microsoft Azure Foundations v1.3.1 L2
microsoft_azure
‹‹ Previous
Previous
Page 1 of 4
• 157 Total
Next
Next ››