Item Search

NameAudit NamePluginCategory
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device managementCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device managementCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device managementCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device managementCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SNMPCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSHCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPSCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPSCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPSCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SNMPCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SNMPCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSHCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSHCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL deny is configured'CIS Cisco IOS 15 L1 v4.1.0Cisco
1.2.4 Create 'access-list' for use with 'line vty' - 'ACL deny is configured'CIS Cisco IOS 16 L1 v1.1.1Cisco
1.2.4 Create 'access-list' for use with 'line vty' - 'ACL deny is configured'CIS Cisco IOS 16 L1 v1.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL permit tcp is configured'CIS Cisco IOS 15 L1 v4.1.0Cisco
1.2.4 Create 'access-list' for use with 'line vty' - 'ACL permit tcp is configured'CIS Cisco IOS 16 L1 v1.1.1Cisco
1.2.4 Create 'access-list' for use with 'line vty' - 'ACL permit tcp is configured'CIS Cisco IOS 15 L1 v4.0.1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.4 Create 'access-list' for use with 'line vty' - 'ACL permit tcp is configured'CIS Cisco IOS 16 L1 v1.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS 15 L1 v4.1.0Cisco
1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS 16 L1 v1.1.1Cisco
1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS 15 L1 v4.0.1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS 16 L1 v1.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS 15 L1 v4.1.0Cisco
1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS 16 L1 v1.1.1Cisco
1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS 16 L1 v1.1.0Cisco
1.5.5 Set the ACL for each 'snmp-server community'CIS Cisco IOS 15 L1 v4.0.1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 15 L1 v4.1.0Cisco
1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 16 L1 v1.1.1Cisco
1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 15 L1 v4.0.1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 16 L1 v1.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 15 L1 v4.1.0Cisco
1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 16 L1 v1.1.1Cisco
1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 15 L1 v4.0.1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 16 L1 v1.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.5.7 Set 'snmp-server host' when using SNMPCIS Cisco IOS 16 L1 v1.1.0Cisco
1.5.7 Set 'snmp-server host' when using SNMPCIS Cisco IOS 15 L1 v4.1.0Cisco
1.5.7 Set 'snmp-server host' when using SNMPCIS Cisco IOS 16 L1 v1.1.1Cisco
1.5.7 Set 'snmp-server host' when using SNMPCIS Cisco IOS 15 L1 v4.0.1Cisco

AUDIT AND ACCOUNTABILITY

1.5.8 Set 'snmp-server enable traps snmp'CIS Cisco IOS 16 L1 v1.1.0Cisco
1.5.8 Set 'snmp-server enable traps snmp'CIS Cisco IOS 15 L1 v4.1.0Cisco
1.5.8 Set 'snmp-server enable traps snmp'CIS Cisco IOS 16 L1 v1.1.1Cisco
1.5.8 Set 'snmp-server enable traps snmp'CIS Cisco IOS 15 L1 v4.0.1Cisco

AUDIT AND ACCOUNTABILITY

3.2 Ensure SharePoint implements an information system isolation boundary that minimizes the number of non-security functions included within the boundary containing security functions.CIS Microsoft SharePoint 2019 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Ensure SharePoint implements an information system isolation boundary that minimizes the number of non-security functions.CIS Microsoft SharePoint 2016 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Ensure SharePoint implements an information system isolation boundary that minimizes the number of non-security functions.CIS Microsoft SharePoint 2016 OS v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Ensure SharePoint implements security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.CIS Microsoft SharePoint 2019 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Ensure SharePoint implements security functions as a layered structure minimizing interactions between layers of the design.CIS Microsoft SharePoint 2016 OS v1.1.0Windows
3.3 Ensure SharePoint implements security functions as a layered structure minimizing interactions between layers of the design.CIS Microsoft SharePoint 2016 OS v1.0.0Windows