Item Search

NameAudit NamePluginCategory
1.1.2 Ensure 'Enable Password' is setCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.2.1 Ensure 'Domain Name' is setCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL deny is configured'CIS Cisco IOS 12 L1 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL permit tcp is configured'CIS Cisco IOS 12 L1 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.4 Ensure 'Unused Interfaces' is disableCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.4.1.3 Ensure known default accounts do not existCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

1.4.4.2 Ensure 'aaa authorization exec' is configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.6.1 Ensure 'SSH source restriction' is set to an authorized IP addressCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.6.3 Ensure 'RSA key pair' is greater than or equal to 2048 bitsCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

1.7.1 Ensure 'HTTP source restriction' is set to an authorized IP addressCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

CONFIGURATION MANAGEMENT, MAINTENANCE

1.7.3 Ensure 'SSL AES 256 encryption' is set for HTTPS accessCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, MAINTENANCE

1.8.1 Ensure 'console session timeout' is less than or equal to '5' minutesCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL

1.10.3 Ensure 'syslog hosts' is configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY

1.10.4 Ensure 'logging with the device ID' is configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY

1.10.5 Ensure 'logging history severity level' is set to greater than or equal to '5'CIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY

1.10.10 Ensure email logging is configured for critical to emergencyCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY

1.11.3 Ensure 'snmp-server host' is set to 'version 3'CIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1 Ensure 'OSPF authentication' is enabledCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1 Ensure DNS services are configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Ensure intrusion prevention is enabled for untrusted interfacesCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.11 Ensure Java applet filtering is enabledCIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.12 Ensure explicit deny in access lists is configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

17.2.5 Ensure 'Audit Other Account Management Events' is set to include 'Success' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

F5BI-AP-000231 - The F5 BIG-IP appliance must be configured to deny access when revocation data is unavailable using OCSP.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000020 - The FortiGate device must automatically audit account removal actionsDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000030 - The FortiGate device must have only one local account to be used as the account of last resort in the event the authentication server is unavailable.DISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000035 - The FortiGate device must allow full access to only those individuals or roles designated by the ISSM.DISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000040 - The FortiGate device must audit the execution of privileged functionsDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000055 - The FortiGate device must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.DISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000060 - The FortiGate device must log all user activity.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000065 - The FortiGate device must generate audit records when successful/unsuccessful attempts to modify administrator privileges occurDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000070 - The FortiGate device must generate audit records when successful/unsuccessful attempts to delete administrator privileges occurDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000105 - The FortiGate device must allocate audit record storage capacity in accordance with organization-defined audit record storage requirementsDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000115 - The FortiGate device must generate an immediate real-time alert of all audit failure events requiring real-time alerts.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000120 - The FortiGate device must synchronize internal information system clocks using redundant authoritative time sourcesDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

FGFW-ND-000135 - The FortiGate device must protect audit tools from unauthorized access.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000145 - The FortiGate device must prohibit installation of software without explicit privileged status.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000155 - The FortiGate device must limit privileges to change the software resident within software libraries.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000165 - The FortiGate device must use LDAP for authentication.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000170 - The FortiGate device must be running an operating system release that is currently supported by the vendor.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000175 - The FortiGate device must generate log records for a locally developed list of auditable eventsDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

FGFW-ND-000180 - The FortiGate device must conduct backups of system-level information contained in the information system when changes occur.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

FGFW-ND-000200 - The FortiGate device must prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accountsDISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000220 - The FortiGate device must enforce a minimum 15-character password length.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000225 - The FortiGate device must enforce password complexity by requiring that at least one uppercase character be used.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000245 - The FortiGate device must use LDAPS for the LDAP connection.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000255 - The FortiGate device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000275 - The FortiGate device must terminate idle sessions after 10 minutes of inactivity.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000305 - The FortiGate device must only install patches or updates that are validated by the vendor via digital signature or hash.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT