Mondoo
300+ policies available

CIS Benchmarks & Security Policies

Out-of-the-box security policies, CIS benchmarks, and compliance frameworks to protect your infrastructure.

What Are Security Benchmarks?

Security benchmarks are standardized sets of security configuration guidelines developed by industry experts and organizations like CIS (Center for Internet Security). They define the baseline security settings needed to protect systems from threats.

Mondoo provides over 300 out-of-the-box policies covering cloud platforms, operating systems, containers, Kubernetes, SaaS applications, and more. Each policy contains hundreds of individual checks validated against industry best practices.

CIS BenchmarksSOC 2HIPAAPCI DSSNISTISO 27001
10,000+
Individual security checks across all policies
70+
Platforms and technologies supported
100%
Fully customizable policies
Open Source
Built on cnspec, our open source policy engine
Maintained by Mondoo

Production-Ready Out of the Box

Every policy in Mondoo is actively maintained by our security research team. We continuously update policies to address new vulnerabilities, changing compliance requirements, and evolving best practices.

Most customers start with our built-in policies and see immediate value. Policy as Code is available when you need customization, but the out-of-the-box experience covers 95% of use cases.

Continuous Updates

Policies are updated regularly as new CVEs, benchmarks, and compliance changes are released.

Expert Curated

Our security team validates every check against real-world environments and vendor guidance.

Zero Configuration

Enable policies with one click. No YAML to write, no queries to learn—just results.

Immediate Value

Get security insights within minutes of connecting your first asset.

Policy as Code

Security Policies as Code

Mondoo uses a policy-as-code approach where all security policies are defined in human-readable YAML files powered by MQL (Mondoo Query Language). This enables version control, code review, and GitOps workflows for your security configuration.

YAML-Based Policies

Define policies in human-readable YAML format. Easy to understand, modify, and share across teams.

Mondoo Query Language

Powerful query language to inspect any resource. Query cloud APIs, OS configurations, and application settings.

GitOps Ready

Store policies in Git, use pull requests for changes, and automate deployment through CI/CD pipelines.

policy.mql.yaml
policies:
  - uid: custom-security-policy
    name: Custom Security Policy
    version: "1.0.0"
    authors:
      - name: Your Team
    groups:
      - title: SSH Configuration
        checks:
          - uid: ssh-protocol-2
            title: Ensure SSH Protocol is set to 2
            mql: sshd.config.params["Protocol"] == 2
            impact: 80
          - uid: ssh-root-login
            title: Ensure SSH root login is disabled
            mql: sshd.config.params["PermitRootLogin"] == "no"
            impact: 90

Modify Built-In Policies

Enable or disable individual checks, adjust check behavior to meet your needs with properties.

Create Your Own Policies

Write custom policies using MQL to enforce organization-specific security requirements and best practices.

Exceptions & Waivers

Document and manage exceptions for specific assets or checks with approval workflows and expiration dates.

Custom Risk Scoring

Define custom impact scores and risk weights based on your business context and compliance requirements.

Fully Customizable Benchmarks

Every benchmark in Mondoo can be customized to match your organization's specific requirements. Disable checks that don't apply, adjust severity levels, or create entirely new policies from scratch.

CIS SecureSuite Certified

Mondoo is the first CIS SecureSuite vendor certified for Cloud and Kubernetes security, covering AWS, Azure, GCP, EKS, AKS, and GKE.

Learn More

Popular Benchmarks

CIS AWS Foundations Benchmark - Level 1

Essential AWS security configuration baseline

CIS Azure Foundations Benchmark - Level 1

Essential Azure security configuration baseline

CIS Google Cloud Platform Benchmark - Level 1

Essential GCP security configuration

CIS Kubernetes Benchmark - Level 1

Essential Kubernetes cluster security (Master & Worker)

CIS Red Hat Enterprise Linux 9 Benchmark

RHEL 9 security configuration (Level 1 & 2)

CIS Windows Server 2025 Benchmark

Windows Server 2025 DC & Member Server (Level 1, 2, NG)

CIS Microsoft 365 E3 Benchmark

M365 E3 security baseline (Level 1 & 2)

Filter by technology

155 policies

AWS Best Practices for Compute

Security best practices for AWS compute services

AWS Best Practices·Services

AWS Best Practices for Database Services

Security configuration for AWS database services

AWS Best Practices·Services

AWS Best Practices for EC2

Security hardening for EC2 instances

AWS Best Practices·Services

AWS Best Practices for Encryption and Keys

KMS and encryption best practices

AWS Best Practices·Services

AWS Best Practices for HIPAA Security

AWS operational controls for HIPAA compliance

AWS Best Practices·Healthcare

AWS Best Practices for IAM

Identity and access management best practices

AWS Best Practices·Services

AWS Best Practices for NIST 1800-25

Data integrity best practices

AWS Best Practices·NIST

AWS Best Practices for NIST 800-171

AWS controls for protecting CUI per NIST 800-171

AWS Best Practices·NIST

AWS Best Practices for NIST 800-172

Enhanced security requirements for CUI

AWS Best Practices·NIST

AWS Best Practices for NIST 800-181

Workforce framework for cybersecurity

AWS Best Practices·NIST

AWS Best Practices for NIST 800-53 rev 5

AWS operational best practices aligned with NIST 800-53 revision 5 controls

AWS Best Practices·NIST

AWS Best Practices for NIST CSF

AWS operational best practices for NIST Cyber Security Framework

AWS Best Practices·NIST

AWS Best Practices for NIST Privacy Framework

Privacy risk management aligned with NIST

AWS Best Practices·NIST

AWS Best Practices for PCI-DSS Security

Payment card industry security controls for AWS

AWS Best Practices·Financial

AWS Best Practices for S3

S3 bucket security configuration

AWS Best Practices·Services

AWS Best Practices for Serverless

Lambda and serverless security controls

AWS Best Practices·Services

AWS Cost Control Policy

Cost optimization and governance policies

AWS Best Practices·Cost

BSI SiSyPHuS Windows 10

German BSI configuration recommendations for Windows 10

Government Standards·Germany

BSI SYS.1.2 Windows Server 2016/2019/2022

BSI baseline for Windows Server systems

Government Standards·Germany

BSI SYS.1.3 Linux and Unix Servers

BSI security requirements for Linux/Unix servers

Government Standards·Germany

CIS AlmaLinux OS 10 Benchmark

AlmaLinux 10 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS AlmaLinux OS 8 Benchmark

AlmaLinux 8 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS AlmaLinux OS 9 Benchmark

AlmaLinux 9 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Amazon EKS Benchmark - Level 1

Amazon EKS security baseline

CIS Benchmarks·Kubernetes

CIS Amazon EKS Benchmark - Level 2

Advanced EKS hardening (Worker Node)

CIS Benchmarks·Kubernetes

CIS Amazon Linux 2 Benchmark

Amazon Linux 2 security (Level 1 & 2)

CIS Benchmarks·Linux

CIS Amazon Linux 2023 Benchmark

Amazon Linux 2023 security (Level 1 & 2)

CIS Benchmarks·Linux

CIS Amazon Linux Benchmark

Amazon Linux security (Level 1 & 2)

CIS Benchmarks·Linux

CIS Apple macOS 10.15 Catalina Benchmark

macOS Catalina security (Level 1 & 2)

CIS Benchmarks·macOS

CIS Apple macOS 11 Big Sur Benchmark

macOS Big Sur security (Level 1 & 2)

CIS Benchmarks·macOS

CIS Apple macOS 12 Monterey Benchmark

macOS Monterey security (Level 1 & 2)

CIS Benchmarks·macOS

CIS Apple macOS 13 Ventura Benchmark

macOS Ventura security (Level 1 & 2)

CIS Benchmarks·macOS

CIS Apple macOS 14 Sonoma Benchmark

macOS Sonoma security (Level 1 & 2)

CIS Benchmarks·macOS

CIS Apple macOS 15 Sequoia Benchmark

macOS Sequoia security (Level 1 & 2)

CIS Benchmarks·macOS

CIS Apple macOS 26 Tahoe Benchmark

macOS Tahoe security (Level 1 & 2)

CIS Benchmarks·macOS

CIS AWS Database Services Benchmark - Level 1

Security for RDS, DynamoDB, and other AWS databases

CIS Benchmarks·Cloud

CIS AWS Foundations Benchmark - Level 1

Essential AWS security configuration baseline

CIS Benchmarks·Cloud

CIS AWS Foundations Benchmark - Level 2

Advanced AWS security hardening controls

CIS Benchmarks·Cloud

CIS Azure AKS Benchmark - Level 1

Azure Kubernetes Service security baseline

CIS Benchmarks·Kubernetes

CIS Azure AKS Benchmark - Level 2

Advanced AKS security hardening

CIS Benchmarks·Kubernetes

CIS Azure Compute Services Benchmark - Level 1

Azure VM and compute security baseline

CIS Benchmarks·Cloud

CIS Azure Compute Services Benchmark - Level 2

Advanced Azure compute hardening

CIS Benchmarks·Cloud

CIS Azure Database Services Benchmark - Level 1

Azure SQL and database security baseline

CIS Benchmarks·Cloud

CIS Azure Database Services Benchmark - Level 2

Advanced Azure database hardening

CIS Benchmarks·Cloud

CIS Azure Foundations Benchmark - Level 1

Essential Azure security configuration baseline

CIS Benchmarks·Cloud

CIS Azure Foundations Benchmark - Level 2

Advanced Azure security hardening controls

CIS Benchmarks·Cloud

CIS Azure Windows Server 2019 Benchmark

Azure-specific Windows Server 2019 hardening

CIS Benchmarks·Windows

CIS Azure Windows Server 2022 Benchmark

Azure-specific Windows Server 2022 hardening

CIS Benchmarks·Windows

CIS CentOS Linux 6 Benchmark

CentOS 6 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS CentOS Linux 7 Benchmark

CentOS 7 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS CentOS Linux 8 Benchmark

CentOS 8 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Cisco IOS XE 17.x Benchmark

Cisco IOS XE security (Level 1 & 2)

CIS Benchmarks·Network

CIS Cisco IOS XR 7.x Benchmark

Cisco IOS XR security (Level 1 & 2)

CIS Benchmarks·Network

CIS Cisco NX-OS Benchmark

Cisco Nexus switch security (Level 1 & 2)

CIS Benchmarks·Network

CIS Debian Linux 10 Benchmark

Debian 10 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Debian Linux 11 Benchmark

Debian 11 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Debian Linux 12 Benchmark

Debian 12 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Debian Linux 8 Benchmark

Debian 8 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Debian Linux 9 Benchmark

Debian 9 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Distribution Independent Linux Benchmark

Generic Linux security baseline (Level 1 & 2)

CIS Benchmarks·Linux

CIS GitHub Benchmark

GitHub organization security (Level 1 & 2)

CIS Benchmarks·SaaS

CIS GitLab Benchmark

GitLab security configuration (Level 1 & 2)

CIS Benchmarks·SaaS

CIS Google Cloud Platform Benchmark - Level 1

Essential GCP security configuration

CIS Benchmarks·Cloud

CIS Google Cloud Platform Benchmark - Level 2

Advanced GCP security hardening

CIS Benchmarks·Cloud

CIS Google Container-Optimized OS Benchmark

Security for Google Container-Optimized OS

CIS Benchmarks·Kubernetes

CIS Google GKE Benchmark - Level 1

Google Kubernetes Engine security baseline

CIS Benchmarks·Kubernetes

CIS Google GKE Benchmark - Level 2

Advanced GKE security hardening

CIS Benchmarks·Kubernetes

CIS Google Workspace Benchmark

Google Workspace Enterprise security (Level 1 & 2)

CIS Benchmarks·SaaS

CIS IBM AIX 7 Benchmark

IBM AIX 7.x security configuration (Level 1 & 2)

CIS Benchmarks·Unix

CIS Kubernetes Benchmark - Level 1

Essential Kubernetes cluster security (Master & Worker)

CIS Benchmarks·Kubernetes

CIS Kubernetes Benchmark - Level 2

Advanced Kubernetes hardening (Master & Worker)

CIS Benchmarks·Kubernetes

CIS Kubernetes V1.23 Benchmark

Kubernetes 1.23 specific security controls

CIS Benchmarks·Kubernetes

CIS Kubernetes V1.24 Benchmark

Kubernetes 1.24 specific security controls

CIS Benchmarks·Kubernetes

CIS Linux Mint 22 Benchmark

Linux Mint 22 workstation security (Level 1 & 2)

CIS Benchmarks·Linux

CIS Microsoft 365 E3 Benchmark

M365 E3 security baseline (Level 1 & 2)

CIS Benchmarks·SaaS

CIS Microsoft 365 E5 Benchmark

M365 E5 security baseline (Level 1 & 2)

CIS Benchmarks·SaaS

CIS Microsoft Exchange Server 2019 Benchmark

Exchange 2019 security (Edge, Mailbox, MDM)

CIS Benchmarks·Applications

CIS Microsoft Intune Windows 10 Benchmark

Intune-managed Windows 10 security

CIS Benchmarks·Windows

CIS Microsoft Intune Windows 11 Benchmark

Intune-managed Windows 11 security

CIS Benchmarks·Windows

CIS NGINX Benchmark

NGINX security (Webserver, Proxy, Loadbalancer)

CIS Benchmarks·Applications

CIS Oracle Cloud Infrastructure Benchmark - Level 1

OCI security configuration baseline

CIS Benchmarks·Cloud

CIS Oracle Linux 10 Benchmark

Oracle Linux 10 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Oracle Linux 6 Benchmark

Oracle Linux 6 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Oracle Linux 7 Benchmark

Oracle Linux 7 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Oracle Linux 8 Benchmark

Oracle Linux 8 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Oracle Linux 9 Benchmark

Oracle Linux 9 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Red Hat Enterprise Linux 10 Benchmark

RHEL 10 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Red Hat Enterprise Linux 6 Benchmark

RHEL 6 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Red Hat Enterprise Linux 7 Benchmark

RHEL 7 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Red Hat Enterprise Linux 8 Benchmark

RHEL 8 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Red Hat Enterprise Linux 9 Benchmark

RHEL 9 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Red Hat OpenShift v4 Benchmark - Level 1

OpenShift Container Platform security baseline

CIS Benchmarks·Kubernetes

CIS Red Hat OpenShift v4 Benchmark - Level 2

Advanced OpenShift hardening

CIS Benchmarks·Kubernetes

CIS Rocky Linux 10 Benchmark

Rocky Linux 10 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Rocky Linux 8 Benchmark

Rocky Linux 8 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Rocky Linux 9 Benchmark

Rocky Linux 9 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS SUSE Linux Enterprise 11 Benchmark

SLES 11 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS SUSE Linux Enterprise 12 Benchmark

SLES 12 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS SUSE Linux Enterprise 15 Benchmark

SLES 15 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Ubuntu Linux 14.04 LTS Benchmark

Ubuntu 14.04 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Ubuntu Linux 16.04 LTS Benchmark

Ubuntu 16.04 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Ubuntu Linux 18.04 LTS Benchmark

Ubuntu 18.04 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Ubuntu Linux 20.04 LTS Benchmark

Ubuntu 20.04 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Ubuntu Linux 22.04 LTS Benchmark

Ubuntu 22.04 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS Ubuntu Linux 24.04 LTS Benchmark

Ubuntu 24.04 security configuration (Level 1 & 2)

CIS Benchmarks·Linux

CIS VMware ESXi 6.7 Benchmark

ESXi 6.7 security (Corporate & High Security)

CIS Benchmarks·Virtualization

CIS VMware ESXi 7.0 Benchmark

ESXi 7 security (Corporate & High Security)

CIS Benchmarks·Virtualization

CIS VMware ESXi 8.0 Benchmark

ESXi 8 security (Corporate & High Security)

CIS Benchmarks·Virtualization

CIS Windows 10 Enterprise Benchmark

Windows 10 desktop security (Level 1, 2, BitLocker, NG)

CIS Benchmarks·Windows

CIS Windows 11 Enterprise Benchmark

Windows 11 desktop security (Level 1, 2, BitLocker)

CIS Benchmarks·Windows

CIS Windows Server 2016 Benchmark

Windows Server 2016 DC & Member Server (Level 1, 2, NG)

CIS Benchmarks·Windows

CIS Windows Server 2019 Benchmark

Windows Server 2019 DC & Member Server (Level 1, 2, NG)

CIS Benchmarks·Windows

CIS Windows Server 2022 Benchmark

Windows Server 2022 DC & Member Server (Level 1, 2, NG)

CIS Benchmarks·Windows

CIS Windows Server 2025 Benchmark

Windows Server 2025 DC & Member Server (Level 1, 2, NG)

CIS Benchmarks·Windows

DISA Arista MLS DCS-7000 Series NDM STIG

DoD STIG for Arista network devices

DISA STIG·Network

Mondoo AWS GuardDuty

AWS GuardDuty findings integration

Mondoo Policies·Cloud

Mondoo AWS IAM Access Analyzer

IAM policy analysis and recommendations

Mondoo Policies·Cloud

Mondoo AWS Security

Comprehensive AWS security posture assessment

Mondoo Policies·Cloud

Mondoo Azure Security

Comprehensive Azure security assessment

Mondoo Policies·Cloud

Mondoo Container Secrets Security

Detect secrets in container images

Mondoo Policies·Containers

Mondoo DNS Security

DNS security configuration assessment

Mondoo Policies·Network

Mondoo Dockerfile Security

Container image security best practices

Mondoo Policies·Containers

Mondoo Email Security

Email security configuration (SPF, DKIM, DMARC)

Mondoo Policies·Network

Mondoo Endpoint Detection and Response

EDR agent presence and configuration

Mondoo Policies·Security

Mondoo GitHub Organization Security

GitHub org security configuration

Mondoo Policies·SaaS

Mondoo GitHub Repository Best Practices

Repository operational best practices

Mondoo Policies·SaaS

Mondoo GitHub Repository Security

Repository security settings

Mondoo Policies·SaaS

Mondoo GitLab Security

GitLab security configuration

Mondoo Policies·SaaS

Mondoo Google Cloud Cost Control

GCP cost optimization policies

Mondoo Policies·Cloud

Mondoo Google Cloud Security

GCP security posture assessment

Mondoo Policies·Cloud

Mondoo Google Cloud Tagging

GCP resource tagging standards

Mondoo Policies·Cloud

Mondoo Google Workspace Security

Google Workspace security assessment

Mondoo Policies·SaaS

Mondoo HTTP Security

HTTP/HTTPS security headers and config

Mondoo Policies·Network

Mondoo Kubernetes Best Practices

K8s operational best practices

Mondoo Policies·Kubernetes

Mondoo Kubernetes Security

Kubernetes cluster and workload security

Mondoo Policies·Kubernetes

Mondoo Linux Security

Linux server security baseline

Mondoo Policies·Operating Systems

Mondoo Linux Workstation Security

Linux desktop security baseline

Mondoo Policies·Operating Systems

Mondoo macOS Security

macOS security baseline

Mondoo Policies·Operating Systems

Mondoo MCP Security

Model Context Protocol security assessment

Mondoo Policies·Security

Mondoo Microsoft 365 Security

M365 security configuration baseline

Mondoo Policies·SaaS

Mondoo Microsoft Entra ID Security

Azure AD / Entra ID security

Mondoo Policies·SaaS

Mondoo NTLMv1 Audit

Detect legacy NTLMv1 authentication

Mondoo Policies·Security

Mondoo Okta Organization Security

Okta identity security configuration

Mondoo Policies·SaaS

Mondoo Shodan Security

External exposure assessment via Shodan

Mondoo Policies·Network

Mondoo Slack Team Security

Slack workspace security settings

Mondoo Policies·SaaS

Mondoo SMBv1 Audit

Detect legacy SMBv1 protocol usage

Mondoo Policies·Security

Mondoo TLS/SSL Security

TLS configuration and certificate validation

Mondoo Policies·Network

Mondoo VMware vSphere ESXi Security

ESXi host security baseline

Mondoo Policies·Virtualization

Mondoo VMware vSphere Security Baseline

vSphere environment security

Mondoo Policies·Virtualization

Mondoo Windows Security

Windows server security baseline

Mondoo Policies·Operating Systems

Mondoo Windows Workstation Security

Windows desktop security baseline

Mondoo Policies·Operating Systems

NSA PowerShell Security Measures

NSA guidance for PowerShell security

Security Best Practices·Windows

NSA/CISA Kubernetes Hardening Guide v1.2

Joint guidance for securing Kubernetes clusters

Security Best Practices·Kubernetes

VMware vSphere Security Configuration Guide 7

VMware official security guide for vSphere 7

Security Best Practices·Virtualization

VMware vSphere Security Configuration Guide 8

VMware official security guide for vSphere 8

Security Best Practices·Virtualization

Need Custom Policies?

Create your own security policies using cnspec's policy-as-code framework. Write policies in YAML with MQL and enforce them across your infrastructure.