Item Search

NameAudit NamePluginCategory
1.1 Ensure Device is running Current Junos SoftwareCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND INFORMATION INTEGRITY

1.1 Ensure Device is running JTAC Recommended Software ReleaseCIS Juniper OS Benchmark v2.0.0 L1Juniper

CONFIGURATION MANAGEMENT

1.3.1 Ensure 'Image Integrity' is correctCIS Cisco ASA 9.x Firewall L1 v1.0.0Cisco
1.3.1 Ensure 'Image Integrity' is correctCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND INFORMATION INTEGRITY

1.3.1 Ensure 'Image Integrity' is correctCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND INFORMATION INTEGRITY

1.3.1 Ensure 'Image Integrity' is correctCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

1.3.2 Ensure 'Image Authenticity' is correctCIS Cisco ASA 9.x Firewall L1 v1.0.0Cisco
1.3.2 Ensure 'Image Authenticity' is correctCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND INFORMATION INTEGRITY

1.3.2 Ensure 'Image Authenticity' is correctCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND INFORMATION INTEGRITY

1.3.2 Ensure 'Image Authenticity' is correctCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.7 Use the Latest OS ReleaseCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

SYSTEM AND INFORMATION INTEGRITY

2.1.6 Ensure the latest firmware is installedCIS Fortigate Level 2 v1.1.0FortiGate
2.1.6 Ensure the latest firmware is installedCIS Fortigate Level 2 v1.0.0FortiGate
2.1.6 Ensure the latest firmware is installedCIS Fortigate 7.0.x Level 2 v1.2.0FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.5.1 (L1) Host SSH daemon, if enabled, must use FIPS 140-2/140-3 validated ciphersCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.5.2 (L1) Host SSH daemon, if enabled, must use FIPS 140-2/140-3 validated cryptographic modulesCIS VMware ESXi 8.0 v1.1.0 L1 Bare MetalUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure the TLSv1.0 and TLSv1.1 Protocols are DisabledCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

7.4 Ensure the TLSv1.0 and TLSv1.1 Protocols are DisabledCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'Global SSLCipherSuite'CIS Apache HTTP Server 2.4 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'Global SSLCipherSuite'CIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'Global SSLHonorCipherOrder = On'CIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'Global SSLHonorCipherOrder = On'CIS Apache HTTP Server 2.4 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'VirtualHost SSLCipherSuite'CIS Apache HTTP Server 2.4 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'VirtualHost SSLCipherSuite'CIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'VirtualHost SSLHonorCipherOrder = On'CIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'VirtualHost SSLHonorCipherOrder = On'CIS Apache HTTP Server 2.4 L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

8.2 (L1) VMware Tools must have all software updates installedCIS VMware ESXi 8.0 v1.1.0 L1VMware

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY