2.1 Ensure that IP addresses are mapped to usernames - User ID Agents | CIS Palo Alto Firewall 9 Benchmark L2 v1.0.0 | Palo_Alto | |
2.1 Ensure that IP addresses are mapped to usernames - User ID Agents | CIS Palo Alto Firewall 8 Benchmark L2 v1.0.0 | Palo_Alto | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.1 Ensure that IP addresses are mapped to usernames - Zones | CIS Palo Alto Firewall 9 Benchmark L2 v1.0.0 | Palo_Alto | |
2.1 Ensure that IP addresses are mapped to usernames - Zones | CIS Palo Alto Firewall 8 Benchmark L2 v1.0.0 | Palo_Alto | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2 Ensure that WMI probing is disabled | CIS Palo Alto Firewall 9 Benchmark L2 v1.0.0 | Palo_Alto | |
2.2 Ensure that WMI probing is disabled | CIS Palo Alto Firewall 8 Benchmark L2 v1.0.0 | Palo_Alto | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
2.3 Ensure that User-ID is only enabled for internal trusted interfaces | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
2.3 Ensure that User-ID is only enabled for internal trusted interfaces | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabled | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabled | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs - 'log group is configured' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs - 'LogWatch Log Delivery' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'alarm exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'metric filter exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.2 Ensure a log metric filter and alarm exist for Management Console sign-in without MFA - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.3 Ensure a log metric filter and alarm exist for usage of 'root' account - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.4 Ensure a log metric filter and alarm exist for IAM policy changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.6 Ensure a log metric filter and alarm exist for AWS Management Console authentication failures - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.9 Ensure a log metric filter and alarm exist for AWS Config configuration changes - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.10 Ensure a log metric filter and alarm exist for security group changes - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) - 'subscription exists' | CIS Amazon Web Services Foundations L2 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.12 Ensure a log metric filter and alarm exist for changes to network gateways - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.13 Ensure a log metric filter and alarm exist for route table changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
4.14 Ensure a log metric filter and alarm exist for VPC changes - 'subscription exists' | CIS Amazon Web Services Foundations L1 1.3.0 | amazon_aws | AUDIT AND ACCOUNTABILITY |
5.5 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
5.5 Ensure all WildFire session information settings are enabled | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
5.6 Ensure alerts are enabled for malicious files detected by WildFire - log-type 'wildfire' | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
5.6 Ensure alerts are enabled for malicious files detected by WildFire - log-type 'wildfire' | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
6.12 Ensure all HTTP Header Logging options are enabled - Log Container Page | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - Referer | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - User-Agent | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
6.12 Ensure all HTTP Header Logging options are enabled - User-Agent | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-For | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-For | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
6.14 Ensure alerting after a threshold of credit card or Social Security numbers is detected is enabled - Data Filtering Profile | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |
6.14 Ensure alerting after a threshold of credit card or Social Security numbers is detected is enabled - Data Object | CIS Palo Alto Firewall 9 Benchmark v1.0.0 L1 | Palo_Alto | |