The IT-Grundschutz Standards and Catalogues are a set of recommendations designed to assist an organization in achieving an appropriate security level for information throughout an organization. The Federal Office for Information Security (BSI) in Germany develops and maintains the BSI Standards, of which IT-Grundschutz is a part of. The Standards and Catalogues provide methods, processes, procedures, and approaches to information security management, risk analysis, and business continuity management.
The BSI-100-2 Report provides details on the vulnerability status of specific services and devices, such as FTP, Telnet, password audits, firewall, and other policy and services audit checks. The devices and services presented within this report can be considered areas of high risk to an organization. This report can assist the analyst by providing a comprehensive view of outstanding risks that need to be addressed. Tenable.sc Continuous View (CV) provides the analyst with the most current information of existing vulnerabilities that need to be remediated, and can aid in actively identify and responding to threats quickly and efficiently. This report compliments the IT-Grundschutz BSI-100-2 Dashboard, which can be found here: IT-Grundschutz BSI-100-2 Dashboard.
The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessment. This report requires the IT-Grundschutz BSI Audit File along with the following below:
- Tenable.sc 4.8.2
- Nessus 8.5.1
- Local Checks
- Compliance Data
Tenable.sc Continuous View (CV) is the market-defining continuous network monitoring platform, which includes active vulnerability detection with Nessus. Tenable.sc CV assists organizations by alerting to vulnerabilities concerns, which aids in actively identify and responding to threats quickly and efficiently. By using Tenable.sc CV, an organization will obtain the most comprehensive and integrated view of its network.
The following chapters are included in the report:
Executive Summary: This chapter contains several components including one monitoring the top ten areas of concern, and two components each displaying severity levels on twelve key areas on a network.
Information Related Concerns: This chapter provides specific information on policies and audit checks within a network. Some of the areas detected include login activity, password policy, USB and CD-ROM’s audit checks. The areas defined within this component pose security risks for an organization, and should be investigated further.
Network/Device Concerns: This chapter presents specific information on protocols, services, and policy checks. Some of the services detected include monitoring FTP, Telnet, log and firewall activity. The services defined within this component pose security risks for an organization, and should be investigated further.