Item Search

NameAudit NamePluginCategory
1.2.2 Restrict Access to VTY Sessions - line vty access-classCIS Cisco NX-OS L2 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.2 Restrict Access to VTY Sessions - line vty access-classCIS Cisco NX-OS L1 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.2 Restrict Access to VTY Sessions - VTY ACLCIS Cisco NX-OS L1 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.2 Restrict Access to VTY Sessions - VTY ACLCIS Cisco NX-OS L2 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL deny is configured'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL deny is configured'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL deny is configured'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL permit tcp is configured'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL permit tcp is configured'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL permit tcp is configured'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.4.2 If SNMPv2 is in use, set Restrictions on Access - ACLCIS Cisco NX-OS L1 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.4.2 If SNMPv2 is in use, set Restrictions on Access - snmp-serverCIS Cisco NX-OS L1 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.7 Set 'snmp-server host' when using SNMPCIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.7 Set 'snmp-server host' when using SNMPCIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.7 Set 'snmp-server host' when using SNMPCIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.8 Set 'snmp-server enable traps snmp'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.8 Set 'snmp-server enable traps snmp'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.8 Set 'snmp-server enable traps snmp'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - loggingCIS Cisco NX-OS L2 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - loggingCIS Cisco NX-OS L1 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - ntpCIS Cisco NX-OS L2 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - ntpCIS Cisco NX-OS L1 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - snmp-server hostCIS Cisco NX-OS L2 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - snmp-server hostCIS Cisco NX-OS L1 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - snmp-server traps/informsCIS Cisco NX-OS L2 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 Use Dedicated 'mgmt' Interface and VRF for Administrative Functions - snmp-server traps/informsCIS Cisco NX-OS L1 v1.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.12 (L2) Host integrated hardware management controller must deactivate internal networkingCIS VMware ESXi 8.0 v1.1.0 L2VMware

CONFIGURATION MANAGEMENT

3.1 Enable the Firewall Stealth RuleCIS Check Point Firewall L2 v1.1.0CheckPoint

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.1 Ensure Caller ID is setCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Ensure access profile is set to use CHAPCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Ensure SharePoint implements an information system isolation boundary that minimizes the number of non-security functions included within the boundary containing security functions.CIS Microsoft SharePoint 2019 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Ensure SharePoint implements security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.CIS Microsoft SharePoint 2019 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Ensure Common SNMP Community Strings are NOT usedCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

5.3 Ensure a client list is set for SNMPv1/v2 communitiesCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

5.8 Ensure interface restrictions are set for SNMPCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

5.9 Ensure SNMP is set to OOB management onlyCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

6.10.2.6 Ensure Web-Management Interface Restriction is SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

6.10.2.7 Ensure Web-Management Interface Restriction is set to OOB ManagementCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION