by Josef Weiss
September 25, 2014
Governance, Risk Management, and Compliance is a substantial part of any information assurance program. The GRC requires information systems to be audited, regardless of the standard to which the audit is performed. These dashboards provide the audit results for Adtran AOS, Cisco IOS, Dell Force10 FTOS, Extreme ExtremeXOS, HP ProCurve, Huawei VRP, and Juniper Junos.
One of the initial steps in a successful GRC program is to set configuration guidelines and establish a supportable set of security policies. Tenable.sc Continuous View (CV) can measure compliance using audit files that cover a wide range of major regulations and other auditable standards. Tenable provides over 500 audit files, which are available for download from the Tenable Support Portal, in categories such as operating systems, applications, databases, and network devices. Tenable products can be used to audit systems based on SCAP content, and many Tenable audit policies have been certified by the Center for Internet Security (CIS). More information about audit files can be found in the Tenable Discussion Forums, Tenable Support Portal, Nessus Compliance Checks, and Nessus Compliance Reference.
The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessments.
The dashboard requirements are:
- Tenable.sc 4.8.1
- Nessus 8.5.2
- Compliance Data
Audit files can be customized to match the values defined by an organization's corporate policies. Audit files are easily created or modified to support the organizations existing security policies. When an audit is performed, for each individual compliance check, Nessus attempts to determine if the host is compliant, non-compliant, or if the results are inconclusive and need to be verified manually. Unlike a vulnerability check that only reports if the vulnerability is actually present, a compliance check always reports a result. This way, the data can be used as the basis of an audit report to show that a host passed or failed a specific test, or if it could not be properly tested.
Tenable.sc CV is the market leader in providing a unique combination of vulnerability detection, compliance auditing, and reporting. Tenable.sc CV supports auditing more technologies than any other vendor, including operating systems, network devices, hypervisors, databases, tablets, phones, web servers, and critical infrastructure. Nessus is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. This makes Tenable.sc CV the market-defining continuous network monitoring platform, and Nessus the market-defining vulnerability scanning for auditors and security analysts.
Adtran AOS - Tenable.sc CV using Nessus has the ability to access APIs used to audit systems running the Adtran operating system (AOS). The Adtran AOS Compliance Checks include checks for password policy, enabled services, insecure service configuration, authentication, logging & audit settings, and SNMP & NTP configuration settings. Valid SSH credentials for root or an administrator with full privileges are required.
Cisco IOS - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Cisco IOS operating system. This compliance check can be run against a Saved, Running or Startup configuration. The compliance checks review the specified configuration and then report on the settings as specified in the info and item lines. The feature checks can also verify the IOS version, feature set, and use regex to parse out the configuration data.
Dell Force10 (FTOS) - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Dell Force10 FTOS system. Dell Force10 (FTOS) devices comprise a wide range of high-capacity switches. The Dell Force10 audit checks include password policy, enabled services, lockout policy, insecure service configurations, authentication related settings, SNMP & NTP configuration, and logging and audit settings.
ExtremeXOS - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Extreme ExtremeXOS. The Extreme ExtremeXOS audit includes checks for the password policy, banner configuration, inactivity timeout setting, logging & audit settings, insecure services, device license information, and SNMP settings.
HP ProCurve - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running HP ProCurve switches. The Tenable HP ProCurve audit file is based on an HP whitepaper on hardening ProCurve switches. The audit includes checks for disabling insecure services and enabling access control (e.g., TACACS, RADIUS).
Huawei VRP - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Huawei VRP operating system. The Versatile Routing Platform (VRP) software runs on a wide variety of routing and switching devices produced by Huawei. The audit checks include password policy, banner configuration, inactivity timeout, logging and auditing settings, insecure services, device and license information, and SNMP settings.
Juniper Junos - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Junos and ScreenOS operating systems. The audit files for Juniper products support several audit checks, such as syslog settings, interface configuration settings, several authentication methods, and many more auditable settings.