CIS Fortigate 7.0.x Level 2 v1.2.0

Audit Details

Name: CIS Fortigate 7.0.x Level 2 v1.2.0

Updated: 1/24/2024

Authority: CIS

Plugin: FortiGate

Revision: 1.0

Estimated Item Count: 23

File Details

Filename: CIS_Fortigate_7.0.x_v1.2.0_L2.audit

Size: 47.6 kB

MD5: 4577586f90cfe1c082325cb4cb9447eb
SHA256: f6d8e6400ca93f369fc6addda67272104edb7a314e898836be79f959584158b0

Audit Items

DescriptionCategories
2.1.6 Ensure the latest firmware is installed

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.1.7 Disable USB Firmware and configuration installation

CONFIGURATION MANAGEMENT

2.1.8 Disable static keys for TLS

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.1.9 Enable Global Strong Encryption

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.3.1 Ensure only SNMPv3 is enabled

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.2 Allow only trusted hosts in SNMPv3

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.5.1 Ensure High Availability configuration is enabled

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.1 Ensure that unused policies are reviewed regularly

CONFIGURATION MANAGEMENT

4.1.1 Detect Botnet connections

SYSTEM AND INFORMATION INTEGRITY

4.2.1 Ensure Antivirus Definition Push Updates are Configured

SYSTEM AND INFORMATION INTEGRITY

4.2.2 Apply Antivirus Security Profile to Policies

SYSTEM AND INFORMATION INTEGRITY

4.2.3 Enable Outbreak Prevention Database

SYSTEM AND INFORMATION INTEGRITY

4.2.4 Enable AI /heuristic based malware detection

SYSTEM AND INFORMATION INTEGRITY

4.2.5 Enable grayware detection on antivirus

SYSTEM AND INFORMATION INTEGRITY

4.3.1 Enable Botnet C&C Domain Blocking DNS Filter

SYSTEM AND INFORMATION INTEGRITY

4.4.2 Block applications running on non-default ports

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.1.1 Ensure Security Fabric is Configured

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.1.1 Apply a Trusted Signed Certificate for VPN Portal

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.1.2 Enable Limited TLS Versions for SSL VPN

ACCESS CONTROL, CONFIGURATION MANAGEMENT

7.1 Configuring the maximum login attempts and lockout period

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

8.1.1 Enable Event Logging

AUDIT AND ACCOUNTABILITY

8.2.1 Encrypt Log Transmission to FortiAnalyzer / FortiManager

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.3.1 Centralized Logging and Reporting

AUDIT AND ACCOUNTABILITY