CSCv7|3.1

Title

Run Automated Vulnerability Scanning Tools

Description

Utilize an up-to-date SCAP-compliant vulnerability scanning tool to automatically scan all systems on the network on a weekly or more frequent basis to identify all potential vulnerabilities on the organization's systems.

Reference Item Details

Category: Continuous Vulnerability Management

Audit Items

View all Reference Audit Items

NamePluginAudit Name
2.1.1 Ensure That Microsoft Defender for Servers Is Set to 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.2 Ensure That Microsoft Defender for App Services Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.3 Ensure That Microsoft Defender for Databases Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.4 Ensure That Microsoft Defender for Azure SQL Databases Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.5 Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.6 Ensure That Microsoft Defender for Open-Source Relational Databases Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.7 Ensure That Microsoft Defender for Storage Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.8 Ensure That Microsoft Defender for Containers Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.9 Ensure That Microsoft Defender for Azure Cosmos DB Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.10 Ensure That Microsoft Defender for Key Vault Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.11 Ensure That Microsoft Defender for DNS Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.12 Ensure That Microsoft Defender for Resource Manager Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.15 Ensure that Auto provisioning of 'Log Analytics agent for Azure VMs' is Set to 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L1
2.1.16 Ensure that Auto provisioning of 'Vulnerability assessment for machines' is Set to 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.17 Ensure that Auto provisioning of 'Microsoft Defender for Containers components' is Set to 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.21 Ensure that Microsoft Defender for Cloud Apps integration with Microsoft Defender for Cloud is Selectedmicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.1.22 Ensure that Microsoft Defender for Endpoint integration with Microsoft Defender for Cloud is selectedmicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
2.2.1 Ensure That Microsoft Defender for IoT Hub Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
4.2.1 Ensure that Microsoft Defender for SQL is set to 'On' for critical SQL Serversmicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
4.2.2 Ensure that Vulnerability Assessment (VA) is enabled on a SQL server by setting a Storage Accountmicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
4.2.3 Ensure that Vulnerability Assessment (VA) setting 'Periodic recurring scans' is set to 'on' for each SQL servermicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
4.2.4 Ensure that Vulnerability Assessment (VA) setting 'Send scan reports to' is configured for a SQL servermicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L2
4.2.5 Ensure that Vulnerability Assessment (VA) setting 'Also send email notifications to admins and subscription owners' is set for each SQL Servermicrosoft_azureCIS Microsoft Azure Foundations v2.0.0 L1
5.1.1 Ensure Image Vulnerability Scanning is enabledGCPCIS Google Kubernetes Engine (GKE) v1.5.0 L1
5.5.2 Ensure Node Auto-Repair is enabled for GKE nodesGCPCIS Google Kubernetes Engine (GKE) v1.5.0 L1
5.27 Ensure that container health is checked at runtimeUnixCIS Docker v1.6.0 L1 Docker Linux
7.2 Use FLRTVC regularlyUnixCIS IBM AIX 7.2 L1 v1.1.0
18.5.14.1 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGONWindowsCIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker
18.5.14.1 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOLWindowsCIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGONWindowsCIS Microsoft Windows 8.1 v2.4.1 L1
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGON/RequireIntegrityWindowsCIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGON/RequireIntegrityWindowsCIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.0
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGON/RequireMutualAuthenticationWindowsCIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGON/RequireMutualAuthenticationWindowsCIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.0
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOLWindowsCIS Microsoft Windows 8.1 v2.4.1 L1
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOL/RequireIntegrityWindowsCIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOL/RequireIntegrityWindowsCIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.0
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOL/RequireMutualAuthenticationWindowsCIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.0
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOL/RequireMutualAuthenticationWindowsCIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.0
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'WindowsCIS Microsoft Windows Server 2016 STIG DC STIG v1.1.0
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'WindowsCIS Microsoft Windows Server 2016 STIG MS STIG v1.1.0
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'WindowsCIS Microsoft Windows Server 2019 STIG MS STIG v1.0.1
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'WindowsCIS Microsoft Windows Server 2019 STIG DC STIG v1.0.1