1.1 Ensure Device is running Current Junos Software | CIS Juniper OS Benchmark v2.1.0 L1 | Juniper | SYSTEM AND INFORMATION INTEGRITY |
1.1 Ensure Device is running JTAC Recommended Software Release | CIS Juniper OS Benchmark v2.0.0 L1 | Juniper | CONFIGURATION MANAGEMENT |
1.3.1 Ensure 'Image Integrity' is correct | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | |
1.3.1 Ensure 'Image Integrity' is correct | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | SYSTEM AND INFORMATION INTEGRITY |
1.3.1 Ensure 'Image Integrity' is correct | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | SYSTEM AND INFORMATION INTEGRITY |
1.3.1 Ensure 'Image Integrity' is correct | CIS Cisco ASA 9.x Firewall L1 v1.1.0 | Cisco | CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION |
1.3.2 Ensure 'Image Authenticity' is correct | CIS Cisco ASA 9.x Firewall L1 v1.0.0 | Cisco | |
1.3.2 Ensure 'Image Authenticity' is correct | CIS Cisco Firewall ASA 9 L1 v4.1.0 | Cisco | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure 'Image Authenticity' is correct | CIS Cisco Firewall v8.x L1 v4.2.0 | Cisco | SYSTEM AND INFORMATION INTEGRITY |
1.3.2 Ensure 'Image Authenticity' is correct | CIS Cisco ASA 9.x Firewall L1 v1.1.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.7 Use the Latest OS Release | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.1.6 Ensure the latest firmware is installed | CIS Fortigate Level 2 v1.0.0 | FortiGate | |
2.1.6 Ensure the latest firmware is installed | CIS Fortigate Level 2 v1.1.0 | FortiGate | |
2.1.6 Ensure the latest firmware is installed | CIS Fortigate 7.0.x Level 2 v1.2.0 | FortiGate | |
2.1.6 Ensure the latest firmware is installed | CIS Fortigate 7.0.x v1.3.0 L2 | FortiGate | SECURITY ASSESSMENT AND AUTHORIZATION, RISK ASSESSMENT |
6.5.1 (L1) Host SSH daemon, if enabled, must use FIPS 140-2/140-3 validated ciphers | CIS VMware ESXi 8.0 v1.1.0 L1 Bare Metal | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
6.5.2 (L1) Host SSH daemon, if enabled, must use FIPS 140-2/140-3 validated cryptographic modules | CIS VMware ESXi 8.0 v1.1.0 L1 Bare Metal | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
7.4 Ensure the TLSv1.0 and TLSv1.1 Protocols are Disabled | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT |
7.4 Ensure the TLSv1.0 and TLSv1.1 Protocols are Disabled | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'Global SSLCipherSuite' | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'Global SSLCipherSuite' | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT |
7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'Global SSLHonorCipherOrder = On' | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'Global SSLHonorCipherOrder = On' | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT |
7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'VirtualHost SSLCipherSuite' | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'VirtualHost SSLCipherSuite' | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT |
7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'VirtualHost SSLHonorCipherOrder = On' | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.5 Ensure Weak SSL/TLS Ciphers Are Disabled - 'VirtualHost SSLHonorCipherOrder = On' | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | CONFIGURATION MANAGEMENT |
8.2 (L1) VMware Tools must have all software updates installed | CIS VMware ESXi 8.0 v1.1.0 L1 | VMware | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |