Item Search

NameAudit NamePluginCategory
2.1 Ensure that IP addresses are mapped to usernames - User ID AgentsCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
2.1 Ensure that IP addresses are mapped to usernames - User ID AgentsCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2 Ensure that WMI probing is disabledCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
2.2 Ensure that WMI probing is disabledCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

2.3 Ensure that User-ID is only enabled for internal trusted interfacesCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
2.3 Ensure that User-ID is only enabled for internal trusted interfacesCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabledCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabledCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs - 'log group is configured'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs - 'LogWatch Log Delivery'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'alarm exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'metric filter exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'subscription exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.2 Ensure a log metric filter and alarm exist for Management Console sign-in without MFA - 'subscription exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.3 Ensure a log metric filter and alarm exist for usage of 'root' account - 'subscription exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.4 Ensure a log metric filter and alarm exist for IAM policy changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.6 Ensure a log metric filter and alarm exist for AWS Management Console authentication failures - 'subscription exists'CIS Amazon Web Services Foundations L2 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs - 'subscription exists'CIS Amazon Web Services Foundations L2 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.9 Ensure a log metric filter and alarm exist for AWS Config configuration changes - 'subscription exists'CIS Amazon Web Services Foundations L2 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.10 Ensure a log metric filter and alarm exist for security group changes - 'subscription exists'CIS Amazon Web Services Foundations L2 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) - 'subscription exists'CIS Amazon Web Services Foundations L2 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.12 Ensure a log metric filter and alarm exist for changes to network gateways - 'subscription exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.13 Ensure a log metric filter and alarm exist for route table changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

4.14 Ensure a log metric filter and alarm exist for VPC changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.3.0amazon_aws

AUDIT AND ACCOUNTABILITY

5.5 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
5.5 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFire - log-type 'wildfire'CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
5.6 Ensure alerts are enabled for malicious files detected by WildFire - log-type 'wildfire'CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - User-AgentCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
6.12 Ensure all HTTP Header Logging options are enabled - User-AgentCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.14 Ensure alerting after a threshold of credit card or Social Security numbers is detected is enabled - Data Filtering ProfileCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
6.14 Ensure alerting after a threshold of credit card or Social Security numbers is detected is enabled - Data ObjectCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto