Item Search

NameAudit NamePluginCategory
1.3 Ensure Password Complexity is set to 3CIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

1.5 Ensure Password Expiration is set to 90 daysCIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

1.10 Ensure 'Install unknown apps' is set to 'Disabled'AirWatch - CIS Google Android v1.3.0 L1MDM

CONFIGURATION MANAGEMENT

1.10 Ensure 'Install unknown apps' is set to 'Disabled'MobileIron - CIS Google Android v1.3.0 L1MDM

CONFIGURATION MANAGEMENT

1.11 Ensure Deny access after failed login attempts is selectedCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

2.1.6 Ensure DNS server is configured - primaryCIS Check Point Firewall L1 v1.1.0CheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.3 Ensure SNMP traps is enabled - linkUpLinkDownCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.2.3 Ensure SNMP traps is enabled - lowDiskSpaceCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.3.1 Ensure NTP is enabled and IP address is set for Primary and Secondary NTP server - ntp activeCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.3.1 Ensure NTP is enabled and IP address is set for Primary and Secondary NTP server - ntp server primaryCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.3.1 Ensure NTP is enabled and IP address is set for Primary and Secondary NTP server - ntp server secondaryCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.4.1 Ensure 'System Backup' is set.CIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.4.2 Ensure 'Snapshot' is setCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.4.3 Configuring Scheduled BackupsCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.5.1 Ensure CLI session timeout is set to less than or equal to 10 minutesCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

2.5.4 Ensure Radius or TACACS+ server is configured - aaa serverCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

2.5.5 Ensure allowed-client is set to those necessary for device managementCIS Check Point Firewall L2 v1.1.0CheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Configure a Default Drop/Cleanup RuleCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1.13 Ensure 'Allow trusting new enterprise app authors' is set to 'Disabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.14 Ensure 'Allow trusting new enterprise app authors' is set to 'Disabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L1 Institutionally OwnedMDM

CONFIGURATION MANAGEMENT

3.3 Use Checkpoint Sections and TitlesCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.4 Ensure Hit count is Enable for the rulesCIS Check Point Firewall L2 v1.1.0CheckPoint

SECURITY ASSESSMENT AND AUTHORIZATION

3.5 Ensure no Allow Rule with Any in Destination filed present in the Firewall RulesCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.6 Ensure no Allow Rule with Any in Source filed present in the Firewall RulesCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.7 Ensure no Allow Rule with Any in Services filed present in the Firewall RulesCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.10 Ensure Drop Out of State TCP Packets is enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

SECURITY ASSESSMENT AND AUTHORIZATION

3.11 Ensure Drop Out of State ICMP Packets is enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

SECURITY ASSESSMENT AND AUTHORIZATION

3.12 Ensure Anti-Spoofing is enabled and action is set to Prevent for all InterfacesCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.18 Ensure Allow bi-directional NAT is enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.19 Ensure Automatic ARP Configuration NAT is enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.20 Ensure Logging is enabled for Track Options of Global PropertiesCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

4.3 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'MobileIron - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM
4.7 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'MobileIron - CIS Apple iPadOS 17 Institutionally Owned L1MDM

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.7 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'MobileIron - CIS Apple iOS 18 v1.0.0 L1 Institution OwnedMDM

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.7 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'MobileIron - CIS Apple iPadOS 18 v1.0.0 L1 End User OwnedMDM

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.7 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'MobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.8.7.1.5 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

18.8.7.1.5 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.7.1.3 (BL) Ensure 'Prevent installation of devices that match any of these device IDs: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

MEDIA PROTECTION

18.9.7.1.3 (BL) Ensure 'Prevent installation of devices that match any of these device IDs: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

MEDIA PROTECTION

18.9.7.1.3 (BL) Ensure 'Prevent installation of devices that match any of these device IDs: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

MEDIA PROTECTION

18.9.7.1.3 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 11 Enterprise v4.0.0 BitLockerWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.3 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.3 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.6 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 10 Enterprise v4.0.0 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.6 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.7 (L1) Ensure 'Prevent installation of devices that match any of these device IDs: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

MEDIA PROTECTION

OL6-00-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-06-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

WPAW-00-000600 - All high-value IT resources must be assigned to a specific administrative tier to separate highly sensitive resources from less sensitive resources.DISA MS Windows Privileged Access Workstation v3r1Windows

CONFIGURATION MANAGEMENT