Item Search

NameAudit NamePluginCategory
2.1.1 Ensure 'Pre-Login Banner' is set - warning messageCIS Fortigate Level 1 v1.1.0FortiGate

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.1.2 Ensure 'Post-Login-Banner' is set - enableCIS Fortigate Level 1 v1.1.0FortiGate

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.1.5 Ensure hostname is setCIS Fortigate Level 1 v1.1.0FortiGate

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.1 Ensure a fully-synchronized High Availability peer is configuredCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.1.2 Set 'no ip proxy-arp'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.1.4 Set 'ip verify unicast source reachable-via'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.1.4 Set 'ip verify unicast source reachable-via'CIS Cisco IOS 17 L1 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Link Monitoring Failure ConditionCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Path Monitoring Failure ConditionCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2 Ensure access to Configuration utility by clients using TLS version 1.2 or laterCIS F5 Networks v1.0.0 L1F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 0.0.0.0'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 0.0.0.0'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 10.0.0.0'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 127.0.0.0'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 127.0.0.0'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 169.254.0.0'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.0.2.0'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.0.2.0'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.168.0.0'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.168.0.0'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny host 255.255.255.255'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny host 255.255.255.255'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny internal networks'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - External interface has ACL appliedCIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately - Election SetingsCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3 Ensure access to Configuration utility is restricted to needed IP addresses onlyCIS F5 Networks v1.0.0 L1F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1.1 Set 'key chain'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1.2 Set 'key'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1.2 Set 'key'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1.4 Set 'address-family ipv4 autonomous-system'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1.6 Set 'authentication key-chain'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1.6 Set 'authentication key-chain'CIS Cisco IOS 17 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1.7 Set 'authentication mode md5'CIS Cisco IOS 16 L1 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

4.1.3.3 ndpd-routerCIS IBM AIX 7.2 L1 v1.0.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

4.2.18 ip6forwardingCIS IBM AIX 7.2 L1 v1.0.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

4.8 Ensure access SSH to CLI interface is restricted to needed IP addresses onlyCIS F5 Networks v1.0.0 L1F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

5.2 Ensure to exclude inode information from ETags HTTP HeaderCIS F5 Networks v1.0.0 L1F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

5.2.2 Ensure sudo commands use ptyCIS Red Hat EL7 Server L1 v3.1.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.19 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categories - continue on the URL categoriesCIS Palo Alto Firewall 10 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.2 Ensure KeepAlive Is EnabledCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.4 Ensure KeepAliveTimeout is Set to a Value of 15 or LessCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.5 Ensure the Timeout Limits for Request Headers is Set to 40 or Less - mod_reqtimeoutCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.6 Ensure Timeout Limits for the Request Body is Set to 20 or Less - mod_reqtimeoutCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.6 Ensure Timeout Limits for the Request Body is Set to 20 or Less - RequestReadTimeoutCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

10.3 Ensure the LimitRequestFieldsize Directive is Set to 1024 or LessCIS Apache HTTP Server 2.4 L2 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.10 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Windows Server 2016 DC L2 v2.0.0Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.10 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Microsoft Windows Server 2016 MS L2 v2.0.0Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.10 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Microsoft Windows Server 2019 MS L2 v2.0.0Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Microsoft Windows 11 Stand-alone v2.0.0 L2 + BLWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.12 Ensure 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Microsoft Windows 11 Stand-alone v2.0.0 L2 + BLWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT