U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CIS Google Container-Optimized OS Benchmark 1.2.0 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Google Container-Optimized OS cpe:/o:google:container-optimized_os:- (View CVEs)

Checklist Highlights

Checklist Name:
CIS Google Container-Optimized OS Benchmark
Checklist ID:
1238
Version:
1.2.0
Type:
Compliance
Review Status:
Final
Authority:
Third Party: Center for Internet Security (CIS)
Original Publication Date:
05/31/2024

Checklist Summary:

All CIS Benchmarks™ focus on technical configuration settings used to maintain and/or increase the security of the addressed technology, and they should be used in conjunction with other essential cyber hygiene tasks like: • Monitoring the base operating system for vulnerabilities and quickly updating with the latest security patches. • Monitoring applications and libraries for vulnerabilities and quickly updating with the latest security patches. In the end, the CIS Benchmarks are designed as a key component of a comprehensive cybersecurity program. This document provides prescriptive guidance for establishing a secure posture for Linux systems based on Container-Optimized OS and are running on Google Cloud Platform. Level-1 recommendations are supported starting from COS-89+. The guidance within broadly assumes that operations are being performed as the root user. Operations performed using sudo instead of the root user may produce unexpected results, or fail to make the intended changes to the system. Non-root users may not be able to access certain areas of the system, especially after remediation has been performed. It is advisable to verify root users path integrity and the integrity of any programs being run prior to execution of commands and scripts included in this benchmark. To obtain the latest version of this guide, please visit https://www.cisecurity.org/cis-benchmarks/. If you have questions, comments, or have identified ways to improve this guide, please write us at benchmarkinfo@cisecurity.org.

Checklist Role:

  • Operating System
  • Virtualization Server

Known Issues:

Not provided.

Target Audience:

This benchmark is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel who plan to develop, deploy, assess, or secure solutions that incorporate Container-Optimized OS and are running on Google Cloud Platform.

Target Operational Environment:

  • Managed

Testing Information:

Not provided.

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

Not provided.

Disclaimer:

https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/

Product Support:

https://www.cisecurity.org/support

Point of Contact:

benchmarkinfo@cisecurity.org

Sponsor:

Not provided.

Licensing:

https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/

Change History:

Update to 1.2.0 - 6/10/2024

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 06/10/2024