2.1.1 Ensure 'Pre-Login Banner' is set - warning message | CIS Fortigate Level 1 v1.1.0 | FortiGate | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
2.1.2 Ensure 'Post-Login-Banner' is set - enable | CIS Fortigate Level 1 v1.1.0 | FortiGate | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
2.1.5 Ensure hostname is set | CIS Fortigate Level 1 v1.1.0 | FortiGate | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1 Ensure a fully-synchronized High Availability peer is configured | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1.2 Set 'no ip proxy-arp' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1.4 Set 'ip verify unicast source reachable-via' | CIS Cisco IOS 16 L1 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1.4 Set 'ip verify unicast source reachable-via' | CIS Cisco IOS 17 L1 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Link Monitoring Failure Condition | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Path Monitoring Failure Condition | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2 Ensure access to Configuration utility by clients using TLS version 1.2 or later | CIS F5 Networks v1.0.0 L1 | F5 | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 0.0.0.0' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 0.0.0.0' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 10.0.0.0' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 127.0.0.0' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 127.0.0.0' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 169.254.0.0' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.0.2.0' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.0.2.0' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.168.0.0' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.168.0.0' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny host 255.255.255.255' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny host 255.255.255.255' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny internal networks' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - External interface has ACL applied | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately - Election Setings | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3 Ensure access to Configuration utility is restricted to needed IP addresses only | CIS F5 Networks v1.0.0 L1 | F5 | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3.1.1 Set 'key chain' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3.1.2 Set 'key' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3.1.2 Set 'key' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3.1.4 Set 'address-family ipv4 autonomous-system' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3.1.6 Set 'authentication key-chain' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3.1.6 Set 'authentication key-chain' | CIS Cisco IOS 17 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3.1.7 Set 'authentication mode md5' | CIS Cisco IOS 16 L1 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
4.1.3.3 ndpd-router | CIS IBM AIX 7.2 L1 v1.0.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
4.2.18 ip6forwarding | CIS IBM AIX 7.2 L1 v1.0.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
4.8 Ensure access SSH to CLI interface is restricted to needed IP addresses only | CIS F5 Networks v1.0.0 L1 | F5 | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
5.2 Ensure to exclude inode information from ETags HTTP Header | CIS F5 Networks v1.0.0 L1 | F5 | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
5.2.2 Ensure sudo commands use pty | CIS Red Hat EL7 Server L1 v3.1.1 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
6.19 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categories - continue on the URL categories | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.2 Ensure KeepAlive Is Enabled | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.4 Ensure KeepAliveTimeout is Set to a Value of 15 or Less | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.5 Ensure the Timeout Limits for Request Headers is Set to 40 or Less - mod_reqtimeout | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.6 Ensure Timeout Limits for the Request Body is Set to 20 or Less - mod_reqtimeout | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.6 Ensure Timeout Limits for the Request Body is Set to 20 or Less - RequestReadTimeout | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
10.3 Ensure the LimitRequestFieldsize Directive is Set to 1024 or Less | CIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.10 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Windows Server 2016 DC L2 v2.0.0 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.10 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Microsoft Windows Server 2016 MS L2 v2.0.0 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.10 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Microsoft Windows Server 2019 MS L2 v2.0.0 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Microsoft Windows 11 Stand-alone v2.0.0 L2 + BL | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.12 Ensure 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Microsoft Windows 11 Stand-alone v2.0.0 L2 + BL | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |