Item Search

NameAudit NamePluginCategory
1.1.1.1 Syslog logging should be configured - configurationCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.1.1.1 Syslog logging should be configured - hip matchCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.1.1.1 Syslog logging should be configured - hostCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.1.1.1 Syslog logging should be configured - ip-tagCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.1.1.1 Syslog logging should be configured - systemCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.1.1.1 Syslog logging should be configured - user-idCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
1.1.1.2 SNMPv3 traps should be configured - configurationCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
1.1.1.2 SNMPv3 traps should be configured - hip matchCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
1.1.1.2 SNMPv3 traps should be configured - hostCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
1.1.1.2 SNMPv3 traps should be configured - ip-tagCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
1.1.1.2 SNMPv3 traps should be configured - user-idCIS Palo Alto Firewall 9 Benchmark L2 v1.0.0Palo_Alto
2.1 Ensure that IP addresses are mapped to usernames - User ID AgentsCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION

2.1 Ensure that IP addresses are mapped to usernames - User ID AgentsCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT

3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs - 'log group is configured'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
3.4 Ensure CloudTrail trails are integrated with CloudWatch Logs - 'LogWatch Log Delivery'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'alarm exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'metric filter exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.1 Ensure a log metric filter and alarm exist for unauthorized API calls - 'subscription exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.2 Ensure a log metric filter and alarm exist for Management Console sign-in without MFA - 'subscription exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.3 Ensure a log metric filter and alarm exist for usage of 'root' account - 'subscription exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.4 Ensure a log metric filter and alarm exist for IAM policy changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.5 Ensure a log metric filter and alarm exist for CloudTrail configuration changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.6 Ensure a log metric filter and alarm exist for AWS Management Console authentication failures - 'subscription exists'CIS Amazon Web Services Foundations L2 1.4.0amazon_aws
4.7 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs - 'subscription exists'CIS Amazon Web Services Foundations L2 1.4.0amazon_aws
4.8 Ensure a log metric filter and alarm exist for S3 bucket policy changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.9 Ensure a log metric filter and alarm exist for AWS Config configuration changes - 'subscription exists'CIS Amazon Web Services Foundations L2 1.4.0amazon_aws
4.10 Ensure a log metric filter and alarm exist for security group changes - 'subscription exists'CIS Amazon Web Services Foundations L2 1.4.0amazon_aws
4.11 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) - 'subscription exists'CIS Amazon Web Services Foundations L2 1.4.0amazon_aws
4.12 Ensure a log metric filter and alarm exist for changes to network gateways - 'subscription exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.13 Ensure a log metric filter and alarm exist for route table changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
4.14 Ensure a log metric filter and alarm exist for VPC changes - 'subscription exists'CIS Amazon Web Services Foundations L1 1.4.0amazon_aws
5.5 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.5 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFireCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFireCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.11 Ensure that access to every URL is loggedCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 9 Benchmark v1.0.0 L1Palo_Alto
6.12 Ensure all HTTP Header Logging options are enabled - User-AgentCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - User-AgentCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

7.3 Ensure 'Security Policy' denying any/all traffic exists at the bottom of the security policies rulesetCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure 'Security Policy' denying any/all traffic exists at the bottom of the security policies rulesetCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION