Item Search

NameAudit NamePluginCategory
1.1 Keep ESXi system properly patchedCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
1.1.1.1 Syslog logging should be configuredCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY

1.2.3 Ensure HTTP and Telnet options are disabled for the management interfaceCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

CONFIGURATION MANAGEMENT

1.3 Verify no unauthorized kernel modules are loaded on the hostCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
1.3.3 Ensure 'Minimum Uppercase Letters' is greater than or equal to 1CIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.4 Enable system data files and security update installs - 'CriticalUpdateInstall'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for device managementCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

ACCESS CONTROL

1.5 Enable OS X update installsCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.1 Configure NTP time synchronizationCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

AUDIT AND ACCOUNTABILITY

2.1.1 Disable Bluetooth, if no paired devices existCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix
2.2 Configure the ESXi host firewall to restrict access to services running on the hostCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

2.3 Disable Managed Object Browser (MOB)CIS VMware ESXi 5.5 v1.2.0 Level 1VMware
2.3 Ensure that User-ID is only enabled for internal trusted interfacesCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY

2.3.1 Set an inactivity interval of 20 minutes or less for the screen saverCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

2.4 Do not use default self-signed certificates for ESXi communicationCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
2.6 Ensure that the User-ID service account does not have interactive logon rightsCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

ACCESS CONTROL

2.7 Ensure remote access capabilities for the User-ID service account are forbidden.CIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.7.3 iCloud DriveCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix
2.8.2 Time Machine Volumes Are EncryptedCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.9 Pair the remote control infrared receiver if enabled - 'DeviceEnabled = 1'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

3.3 Configure Security Auditing Flags - 'audit successful/failed file attribute modification events'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

4.2 Enable 'Show Wi-Fi status in menu bar'CIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

4.5 Ensure Encryption of Data at Rest - enableEncryptionCIS MongoDB 5 L2 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.5 Ensure ftp server is not runningCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

5.1.1 Secure Home FoldersCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

5.1.4 Check System folder for world writable filesCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.1.5 Check Library folder for world writable filesCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

ACCESS CONTROL

5.2.1 Configure account lockout thresholdCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.2.2 Set a minimum password lengthCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.2.8 Password HistoryCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3 Reduce the sudo timeout periodCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.4 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.4 Ensure that new entries are appended to the end of the log fileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

AUDIT AND ACCOUNTABILITY

5.7 Choosing Wildfire public cloud regionCIS Palo Alto Firewall 11 v1.2.0 L2Palo_Alto

CONFIGURATION MANAGEMENT

5.8 Ensure that 'Inline Cloud Analysis' on Wildfire profiles is enabledCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.12 Create a custom message for the Login ScreenCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.18 Install an approved tokend for smartcard authenticationCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix
6.1 Enable bidirectional CHAP authentication for iSCSI traffic.CIS VMware ESXi 5.5 v1.2.0 Level 1VMware

IDENTIFICATION AND AUTHENTICATION

6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in useCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.4 Zero out VMDK files prior to deletionCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

6.6 Ensure a Vulnerability Protection Profile is set to block attacks against critical and high vulnerabilities, and set to default on medium, low, and informational vulnerabilitiesCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

RISK ASSESSMENT

6.20 Ensure that 'Wildfire Inline ML Action' on antivirus profiles are set to reset-both on all decoders except 'imap' and 'pop3'CIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.21 Ensure that 'Wildfire Inline ML' on antivirus profiles are set to enable for all file typesCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.25 Ensure that 'DNS Policies' is configured on Anti-Spyware profiles if 'DNS Security' license is availableCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

7.2 Ensure 'Service setting of ANY' in a security policy allowing traffic does not existCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

ACCESS CONTROL, MEDIA PROTECTION

7.3 Ensure 'Security Policy' denying any/all traffic to/from IP addresses on Trusted Threat Intelligence Sources ExistsCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

ACCESS CONTROL, MEDIA PROTECTION

8.2.1 Disconnect unauthorized devices - Floppy DevicesCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

MEDIA PROTECTION

8.2.5 Disconnect unauthorized devices - USB DevicesCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

MEDIA PROTECTION

8.2.7 Prevent unauthorized connection of devices.CIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

8.4.24 Disable VM Console Copy operationsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

CONFIGURATION MANAGEMENT