Item Search

NameAudit NamePluginCategory
1.2.4 Create 'access-list' for use with 'line vty' - 'ACL permit tcp is configured'CIS Cisco IOS 12 L1 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 12 L1 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.1 Enable the Firewall Stealth RuleCIS Check Point Firewall L2 v1.1.0CheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.1 Ensure Caller ID is setCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Ensure access profile is set to use CHAPCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.2 Ensure a table existsCIS Red Hat EL8 Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.2 Ensure a table existsCIS Red Hat EL8 Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.5 Ensure a table existsCIS Red Hat EL7 Server L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.6 Ensure base chains exist - hook inputCIS Red Hat EL7 Server L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.6 Ensure base chains exist - hook outputCIS Red Hat EL7 Server L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.9 Ensure default deny firewall policy - forwardCIS Red Hat EL7 Server L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.9 Ensure default deny firewall policy - inputCIS Red Hat EL7 Server L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.9 Ensure default deny firewall policy - outputCIS Red Hat EL7 Server L1 v3.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.4 Ensure loopback traffic is configured - loCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.4 Ensure loopback traffic is configured - loCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.6 Ensure default deny firewall policy - forwardCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.6 Ensure default deny firewall policy - forwardCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.6 Ensure default deny firewall policy - inputCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.6 Ensure default deny firewall policy - inputCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.6 Ensure default deny firewall policy - outputCIS Ubuntu Linux 18.04 LTS Server L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.6 Ensure default deny firewall policy - outputCIS Ubuntu Linux 18.04 LTS Workstation L1 v2.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Ensure Common SNMP Community Strings are NOT usedCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

5.8 Ensure interface restrictions are set for SNMPCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

5.8 Ensure interface restrictions are set for SNMPCIS Juniper OS Benchmark v2.0.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

5.9 Ensure SNMP is set to OOB management onlyCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

5.9 Ensure SNMP is set to OOB management onlyCIS Juniper OS Benchmark v2.0.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

6.10.2.6 Ensure Web-Management Interface Restriction is SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

6.10.2.7 Ensure Web-Management Interface Restriction is set to OOB ManagementCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

6.11 Ensure a route table for the public subnets is createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure a route table for the private subnets is createdCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.13 Ensure Routing Table associated with Web tier ELB subnet have the default route (0.0.0.0/0) defined to allow connectivityCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.14 Ensure Routing Table associated with Web tier subnet have the default route (0.0.0.0/0) defined to allow connectivityCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.15 Ensure Routing Table associated with App tier subnet have the default route (0.0.0.0/0) defined to allow connectivityCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.16 Ensure Routing Table associated with Data tier subnet have NO default route (0.0.0.0/0) defined to allow connectivityCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

Authorized IP managersArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

Dedicated management port - 'set interface Mgmt state on'TNS Check Point GAiA Best PracticesCheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

FireEye - User connections are limited by subnet or VLANTNS FireEyeFireEye

SYSTEM AND COMMUNICATIONS PROTECTION

Management Network - 'add allowed-client host any-host' not setTNS Check Point GAiA Best PracticesCheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

Network Security - Use the Out-of-Band (OOB) interface for all management related trafficJuniper Hardening JunOS 12 Devices ChecklistJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:DMZ Interface - IP ManageableTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:DMZ Interface - Route ModeTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Permitted Management IP NetworkTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Trust Interface - IP ManageableTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Trust Interface - PINGTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Trust Interface - Route ModeTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Trust Interface - SNMPTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Trust Interface - SSHTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Trust Interface - SSLTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Trust Interface - WebTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Untrust Interface - IP ManageableTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION