Item Search

NameAudit NamePluginCategory
1.1 Ensure Minimum Password Length is set to 14 or higherCIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

1.2 Ensure Disallow Palindromes is selectedCIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

1.3 Ensure Password Complexity is set to 3CIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

1.5 Ensure Password Expiration is set to 90 daysCIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

1.7 Ensure Lockout users after password expiration is set to 1CIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

1.8 Ensure Deny access to unused accounts is selectedCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

1.9 Ensure Days of non-use before lock-out is set to 30CIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

1.11 Ensure Deny access after failed login attempts is selectedCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

1.12 Ensure Maximum number of failed attempts allowed is set to 5 or fewerCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

1.13 Ensure Allow access again after time is set to 300 or more secondsCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

2.1.1 Ensure 'Login Banner' is set - message banner msgvalueCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

2.1.1 Ensure 'Login Banner' is set - message banner onCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

2.1.3 Ensure Core Dump is enabledCIS Check Point Firewall L1 v1.1.0CheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.5 Ensure unused interfaces are disabledCIS Check Point Firewall L1 v1.1.0CheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.6 Ensure DNS server is configured - primaryCIS Check Point Firewall L1 v1.1.0CheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.6 Ensure DNS server is configured - tertiaryCIS Check Point Firewall L1 v1.1.0CheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.7 Ensure IPv6 is disabled if not usedCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.1.10 Ensure DHCP is disabledCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.2.1 Ensure SNMP agent is disabledCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.2.2 Ensure SNMP version is set to v3-OnlyCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.2.3 Ensure SNMP traps is enabled - coldStartCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.2.3 Ensure SNMP traps is enabled - configurationChangeCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.2.3 Ensure SNMP traps is enabled - configurationSaveCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.2.4 Ensure SNMP traps receivers is setCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.3.1 Ensure NTP is enabled and IP address is set for Primary and Secondary NTP server - ntp server primaryCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.3.2 Ensure timezone is properly configuredCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.4.1 Ensure 'System Backup' is set.CIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.4.2 Ensure 'Snapshot' is setCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.4.3 Configuring Scheduled BackupsCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.5.1 Ensure CLI session timeout is set to less than or equal to 10 minutesCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

2.5.3 Ensure Client Authentication is secured.CIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.5.4 Ensure Radius or TACACS+ server is configured - aaa serverCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

2.5.4 Ensure Radius or TACACS+ server is configured - tacacs-servers state onCIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

2.5.5 Ensure allowed-client is set to those necessary for device managementCIS Check Point Firewall L2 v1.1.0CheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.1 Ensure mgmtauditlogs is set to onCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.6.2 Ensure auditlog is set to permanentCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

3.3 Use Checkpoint Sections and TitlesCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.4 Ensure Hit count is Enable for the rulesCIS Check Point Firewall L2 v1.1.0CheckPoint

SECURITY ASSESSMENT AND AUTHORIZATION

3.6 Ensure no Allow Rule with Any in Source filed present in the Firewall RulesCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.7 Ensure no Allow Rule with Any in Services filed present in the Firewall RulesCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.12 Ensure Anti-Spoofing is enabled and action is set to Prevent for all InterfacesCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.13 Ensure Disk Space Alert is setCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

3.14 Ensure Accept RIP is not enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.15 Ensure Accept Domain Name over TCP (Zone Transfer) is not enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.18 Ensure Allow bi-directional NAT is enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.19 Ensure Automatic ARP Configuration NAT is enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

GEN005160 - Any X Windows host must write .Xauthority files.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

OL6-00-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-06-000013 - The system package management tool must cryptographically verify the authenticity of system software packages during installation.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

VCWN-65-000009 - The vCenter Server for Windows must use Active Directory authentication.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

IDENTIFICATION AND AUTHENTICATION