Tenable Cisco Firepower Management Center OS Best Practices Audit

Audit Details

Name: Tenable Cisco Firepower Management Center OS Best Practices Audit

Updated: 12/8/2023

Authority: TNS

Plugin: Unix

Revision: 1.16

Estimated Item Count: 390

File Details

Filename: Tenable_Best_Practices_Cisco_Firepower_Management_Center_OS.audit

Size: 772 kB

MD5: 70df093653703e6fdac6b6e719b77175
SHA256: 9205f61897ae3e4ec55d30215497acaffa3f759e01627115add1eb9494ba952a

Audit Items

DescriptionCategories
Audit SGID executables

AUDIT AND ACCOUNTABILITY

Audit SUID executables

AUDIT AND ACCOUNTABILITY

Audit system file permissions - dpkg

SYSTEM AND INFORMATION INTEGRITY

Audit system file permissions - rpm

SYSTEM AND INFORMATION INTEGRITY

Audit system file permissions - zypper

SYSTEM AND INFORMATION INTEGRITY

chrony is not installed - NTP server

AUDIT AND ACCOUNTABILITY

chrony is not installed - User

AUDIT AND ACCOUNTABILITY

Disable Automounting

CONFIGURATION MANAGEMENT

Ensure /etc/hosts.allow is configured

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure /etc/hosts.deny is configured

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure access to the su command is restricted - pam_wheel.so

ACCESS CONTROL

Ensure access to the su command is restricted - wheel group contains root

ACCESS CONTROL

Ensure address space layout randomization (ASLR) is enabled - sysctl

SYSTEM AND INFORMATION INTEGRITY

Ensure address space layout randomization (ASLR) is enabled - sysctl.conf

SYSTEM AND INFORMATION INTEGRITY

Ensure AIDE is installed - dpkg

CONFIGURATION MANAGEMENT

Ensure AIDE is installed - rpm

AUDIT AND ACCOUNTABILITY

Ensure AIDE is installed - zypper

AUDIT AND ACCOUNTABILITY

Ensure all groups in /etc/passwd exist in /etc/group

ACCESS CONTROL

Ensure all users last password change date is in the past

IDENTIFICATION AND AUTHENTICATION

Ensure all users' home directories exist

CONFIGURATION MANAGEMENT

Ensure at/cron is restricted to authorized users - at.allow

ACCESS CONTROL

Ensure at/cron is restricted to authorized users - at.deny

ACCESS CONTROL

Ensure at/cron is restricted to authorized users - cron.allow

ACCESS CONTROL

Ensure at/cron is restricted to authorized users - cron.deny

ACCESS CONTROL

Ensure audit log storage size is configured

AUDIT AND ACCOUNTABILITY

Ensure audit logs are not automatically deleted

AUDIT AND ACCOUNTABILITY

Ensure authentication required for single user mode

ACCESS CONTROL

Ensure Avahi Server is not enabled

CONFIGURATION MANAGEMENT

Ensure bogus ICMP responses are ignored - /etc/sysctl

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure bogus ICMP responses are ignored - sysctl

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure broadcast ICMP requests are ignored - /etc/sysctl

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure broadcast ICMP requests are ignored - sysctl

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers

AUDIT AND ACCOUNTABILITY

Ensure changes to system administration scope (sudoers) is collected - /etc/sudoers.d

AUDIT AND ACCOUNTABILITY

Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers

AUDIT AND ACCOUNTABILITY

Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d

AUDIT AND ACCOUNTABILITY

Ensure chrony is configured - NTP server

AUDIT AND ACCOUNTABILITY

Ensure chrony is configured - User

AUDIT AND ACCOUNTABILITY

Ensure core dumps are restricted - limits.conf

ACCESS CONTROL

Ensure core dumps are restricted - sysctl

ACCESS CONTROL

Ensure core dumps are restricted - sysctl.conf

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Ensure CUPS Server is not enabled

CONFIGURATION MANAGEMENT

Ensure daytime services are not enabled

CONFIGURATION MANAGEMENT

Ensure DCCP is disabled

CONFIGURATION MANAGEMENT

Ensure default deny firewall policy - Chain FORWARD

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure default deny firewall policy - Chain INPUT

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure default deny firewall policy - Chain OUTPUT

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure default group for the root account is GID 0

ACCESS CONTROL

Ensure default user shell timeout is 900 seconds or less - /etc/profile

ACCESS CONTROL

Ensure DHCP Server is not enabled

CONFIGURATION MANAGEMENT