1.1.1.1 Syslog logging should be configured - configuration | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
1.1.1.1 Syslog logging should be configured - hip match | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
1.1.1.1 Syslog logging should be configured - host | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
1.1.1.1 Syslog logging should be configured - ip-tag | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
1.1.1.1 Syslog logging should be configured - system | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
1.1.1.1 Syslog logging should be configured - user-id | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
1.1.1.2 SNMPv3 traps should be configured - configuration | CIS Palo Alto Firewall 9 Benchmark L2 v1.0.0 | Palo_Alto | |
1.1.1.2 SNMPv3 traps should be configured - hip match | CIS Palo Alto Firewall 9 Benchmark L2 v1.0.0 | Palo_Alto | |
1.1.1.2 SNMPv3 traps should be configured - host | CIS Palo Alto Firewall 9 Benchmark L2 v1.0.0 | Palo_Alto | |
1.1.1.2 SNMPv3 traps should be configured - ip-tag | CIS Palo Alto Firewall 9 Benchmark L2 v1.0.0 | Palo_Alto | |
1.1.1.2 SNMPv3 traps should be configured - user-id | CIS Palo Alto Firewall 9 Benchmark L2 v1.0.0 | Palo_Alto | |
2.1 Ensure that IP addresses are mapped to usernames - User ID Agents | CIS Palo Alto Firewall 7 Benchmark L2 v1.0.0 | Palo_Alto | IDENTIFICATION AND AUTHENTICATION |
2.1 Ensure that IP addresses are mapped to usernames - User ID Agents | CIS Palo Alto Firewall 6 Benchmark L2 v1.0.0 | Palo_Alto | IDENTIFICATION AND AUTHENTICATION |
2.1 Ensure that IP addresses are mapped to usernames - Zones | CIS Palo Alto Firewall 7 Benchmark L2 v1.0.0 | Palo_Alto | CONFIGURATION MANAGEMENT |
2.1 Ensure that IP addresses are mapped to usernames - Zones | CIS Palo Alto Firewall 6 Benchmark L2 v1.0.0 | Palo_Alto | CONFIGURATION MANAGEMENT |
3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs - 'log group is configured' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs - 'LogWatch Log Delivery' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'alarm exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'metric filter exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.2 Ensure a log metric filter and alarm exist for Management Console sign-in without MFA - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.3 Ensure a log metric filter and alarm exist for usage of 'root' account - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.4 Ensure a log metric filter and alarm exist for IAM policy changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.6 Ensure a log metric filter and alarm exist for AWS Management Console authentication failures - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.4.0 | amazon_aws | |
4.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.4.0 | amazon_aws | |
4.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.9 Ensure a log metric filter and alarm exist for AWS Config configuration changes - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.4.0 | amazon_aws | |
4.10 Ensure a log metric filter and alarm exist for security group changes - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.4.0 | amazon_aws | |
4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.4.0 | amazon_aws | |
4.12 Ensure a log metric filter and alarm exist for changes to network gateways - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.13 Ensure a log metric filter and alarm exist for route table changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
4.14 Ensure a log metric filter and alarm exist for VPC changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.4.0 | amazon_aws | |
5.5 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 6 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
5.5 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 7 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
5.6 Ensure alerts are enabled for malicious files detected by WildFire | CIS Palo Alto Firewall 6 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
5.6 Ensure alerts are enabled for malicious files detected by WildFire | CIS Palo Alto Firewall 7 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
6.11 Ensure that access to every URL is logged | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
6.12 Ensure all HTTP Header Logging options are enabled - Log Container Page | CIS Palo Alto Firewall 7 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - Log Container Page | CIS Palo Alto Firewall 6 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - Log Container Page | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
6.12 Ensure all HTTP Header Logging options are enabled - Referer | CIS Palo Alto Firewall 7 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - Referer | CIS Palo Alto Firewall 6 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - Referer | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
6.12 Ensure all HTTP Header Logging options are enabled - User-Agent | CIS Palo Alto Firewall 6 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - User-Agent | CIS Palo Alto Firewall 7 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-For | CIS Palo Alto Firewall 7 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-For | CIS Palo Alto Firewall 6 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
7.3 Ensure 'Security Policy' denying any/all traffic exists at the bottom of the security policies ruleset | CIS Palo Alto Firewall 6 Benchmark L2 v1.0.0 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
7.3 Ensure 'Security Policy' denying any/all traffic exists at the bottom of the security policies ruleset | CIS Palo Alto Firewall 7 Benchmark L2 v1.0.0 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |