Item Search

NameAudit NamePluginCategory
1.1 Secure Login and Telnet Disabling - Disable telnet serverTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

1.1 Secure Login and Telnet Disabling - Enable SSH serverTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

1.2 Password Security Policy - a) The default password length shouldn't be below 8 charactersTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - b) The password must include either three of 'number', 'capital', 'lowercase', 'special-character' or set the 'character-set-num' value to 3-4Tenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - c) Configure 'strong-password dictionary' and 'same-consecutive' to avoid weak password - same-consecutiveTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - c) Configure 'strong-password dictionary' and 'same-consecutive' to avoid weak password - strong-password dictionaryTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - d) Check either of the following words exist in configuration fileTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - e) Check for strong-password max-lengthTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - e) Check for strong-password max-length - strong-password date-check enableTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - e) Check for strong-password max-length - strong-password username-related-chk inverseTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - f) The validity period of an account can be configuredTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.4 SNMP Security - b) SNMP serverTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.5 FTP/SFTP Access Authorization - sftp top-directoryTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

1.6 Support Web Access Security - b) ssl-context fieldTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - b) Disable encryption 3des-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - c) Disable encryption aes128-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - e) Disable encryption aes256-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - h) Disable hmac noneTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - j) Disable diffie-hellman group1-sha1Tenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - a) VersionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - b) ciphersuiteTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - c) pki-profileTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - d) renegotiateTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.1 Protection Policy for the CPS Control EngineTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

2.2 Maintain current AWS account contact detailsCIS Amazon Web Services Foundations v7.0.0 L1amazon_aws

INCIDENT RESPONSE

2.2 NTP Security Protection - a) Enable NTPTenable ZTE ROSNGZTE_ROSNG

AUDIT AND ACCOUNTABILITY

2.3 Disable the Proxy ARP Function - b) No inter-vlan-proxyTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.3 Disable the Proxy ARP Function - d) No local-proxy-arpTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.4 Disable the IP Unreachable FunctionTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.5 Product Default BannerTenable ZTE ROSNGZTE_ROSNG

ACCESS CONTROL

3.1 Authentication and Verification of OSPF Routing Protocols - authentication message-digestTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

3.1 Authentication and Verification of OSPF Routing Protocols - message-digest-keyTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

3.2 Authentication and Verification of ISIS Routing Protocols - authenticationTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

Ensure 'Image Integrity' is correctTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY

Ensure 'ip verify' is set to 'reverse-path' for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'OSPF authentication' is enabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - coldstartTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'snmp-server group' is set to 'v3 priv'Tenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure DNS services are configured correctly - domain-lookupTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

JUSX-DM-000055 - The Juniper SRX Services Gateway must generate log records containing the full-text recording of privileged commands.DISA Juniper SRX Services Gateway NDM v3r3Juniper

AUDIT AND ACCOUNTABILITY

JUSX-DM-000163 - The Juniper SRX Services Gateway must limit the number of sessions per minute to an organization-defined number for SSH to protect remote access management from unauthorized access.DISA Juniper SRX Services Gateway NDM v3r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

OpenStack Networks and their attached subnetsTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

OpenStack Subnet DetailsTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

Rackspace Networks and their attached subnetsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Rackspace Subnet DetailsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of all Domains created since the last scanTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of all Domains updated since the last scanTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of DomainsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of Ports and their detailsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of Ports and their detailsTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT