CAS Implementation Group 1 Audit File

Audit Details

Name: CAS Implementation Group 1 Audit File

Updated: 4/12/2023

Authority: TNS

Plugin: Unix

Revision: 1.3

Estimated Item Count: 31

File Details

Filename: CAS_Implementation_Group_1_Audit_File.audit

Size: 49.5 kB

MD5: 8b83e3ee9b912336699e280dfde1df84
SHA256: 5927345fe6cef5b3c25fb51d1c9c5b83a9db160c109d772a9baa99675c62da9c

Audit Items

DescriptionCategories
CAS_Implementation_Group_1_Audit_File.audit
CIS Control 1 (1.4) Maintain Detailed Asset Inventory

CONFIGURATION MANAGEMENT

CIS Control 1 (1.6) Ensure that unauthorized assets are removed, quarantined or the inventory is updated

CONFIGURATION MANAGEMENT

CIS Control 2 (2.1(a)) Maintain and Inventory of Authorized Software

CONFIGURATION MANAGEMENT

CIS Control 2 (2.1(b)) Maintain and Inventory of Authorized Software

CONFIGURATION MANAGEMENT

CIS Control 3 (3.4(a)) Deploy Automated Operating System Patch Management Tools

SYSTEM AND INFORMATION INTEGRITY

CIS Control 3 (3.4(b)) Deploy Automated Operating System Patch Management Tools

SYSTEM AND INFORMATION INTEGRITY

CIS Control 3 (3.4(c)) Deploy Automated Operating System Patch Management Tools

SYSTEM AND INFORMATION INTEGRITY

CIS Control 3 (3.6(a)) Deploy Automated Software Patch Management Tools

SYSTEM AND INFORMATION INTEGRITY

CIS Control 3 (3.6(b)) Deploy Automated Software Patch Management Tools

SYSTEM AND INFORMATION INTEGRITY

CIS Control 4 (4.2) Change Default Passwords

IDENTIFICATION AND AUTHENTICATION

CIS Control 4 (4.3) Ensure the Use of Dedicated Administrative Accounts

ACCESS CONTROL

CIS Control 5 (5.1) Establish Secure Configurations

CONFIGURATION MANAGEMENT

CIS Control 6 (6.2(a)) Activate Audit Logging

AUDIT AND ACCOUNTABILITY

CIS Control 6 (6.2(b)) Activate Audit Logging

AUDIT AND ACCOUNTABILITY

CIS Control 7 (7.7) Use of DNS Filtering Services

ACCESS CONTROL

CIS Control 8 (8.4) Configure Anti-Malware Scanning of Removable Media

SYSTEM AND INFORMATION INTEGRITY

CIS Control 8 (8.5) Configure Devices to Not Auto Run Content
CIS Control 10 (10.1) Ensure Regular Automated Backups

CONTINGENCY PLANNING

CIS Control 10 (10.2) Perform Complete System Backups

CONTINGENCY PLANNING

CIS Control 10 (10.4) Protect Backups

CONTINGENCY PLANNING

CIS Control 10 (10.5) Ensure All Backups Have at Least One Offline Backup Destination

CONTINGENCY PLANNING

CIS Control 12 (12.1) Maintain an Inventory of Network Boundaries

SECURITY ASSESSMENT AND AUTHORIZATION

CIS Control 12 (12.4(a)) Deny Communications Over Unauthorized Ports

SYSTEM AND COMMUNICATIONS PROTECTION

CIS Control 12 (12.4(b)) Deny Communications Over Unauthorized Ports

SYSTEM AND COMMUNICATIONS PROTECTION

CIS Control 13 (13.1) Maintain an Inventory of Sensitive Information

CONFIGURATION MANAGEMENT

CIS Control 13 (13.2) Remove Sensitive Data or Systems Not Regularly Accessed by Organization

CONFIGURATION MANAGEMENT

CIS Control 13 (13.6) Encrypt Mobile Device Data

ACCESS CONTROL

CIS Control 14 (14.6) Protect Information Through Access Control Lists

ACCESS CONTROL

CIS Control 16 (16.8(a)) Disable Any Unassociated Accounts

ACCESS CONTROL

CIS Control 16 (16.8(b)) Disable Any Unassociated Accounts

ACCESS CONTROL