CSCv7|3.1

Title

Run Automated Vulnerability Scanning Tools

Description

Utilize an up-to-date SCAP-compliant vulnerability scanning tool to automatically scan all systems on the network on a weekly or more frequent basis to identify all potential vulnerabilities on the organization's systems.

Reference Item Details

Category: Continuous Vulnerability Management

Audit Items

View all Reference Audit Items

NamePluginAudit Name
5.1.1 Ensure Image Vulnerability Scanning is enabledGCPCIS Google Kubernetes Engine (GKE) Autopilot v1.1.0 L2
5.1.1 Ensure Image Vulnerability Scanning is enabledGCPCIS Google Kubernetes Engine (GKE) v1.7.0 L2
5.5.2 Ensure Node Auto-Repair is enabled for GKE nodesGCPCIS Google Kubernetes Engine (GKE) v1.7.0 L2
5.27 Ensure that container health is checked at runtimeUnixCIS Docker v1.7.0 L1 Docker - Linux
6.7 Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing trafficPalo_AltoCIS Palo Alto Firewall 10 v1.2.0 L1
6.7 Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing trafficPalo_AltoCIS Palo Alto Firewall 11 v1.1.0 L1
6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is availablePalo_AltoCIS Palo Alto Firewall 10 v1.2.0 L1
6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is availablePalo_AltoCIS Palo Alto Firewall 11 v1.1.0 L1
9.1.3.1 Ensure that Defender for Servers is set to 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.3.2 Ensure that 'Vulnerability assessment for machines' component status is set to 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.3.3 Ensure that 'Endpoint protection' component status is set to 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.3.4 Ensure that 'Agentless scanning for machines' component status is set to 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.3.5 Ensure that 'File Integrity Monitoring' component status is set to 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.4.1 Ensure That Microsoft Defender for Containers Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.5.1 Ensure That Microsoft Defender for Storage Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.6.1 Ensure That Microsoft Defender for App Services Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.7.1 Ensure That Microsoft Defender for Azure Cosmos DB Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.7.2 Ensure That Microsoft Defender for Open-Source Relational Databases Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.7.3 Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.7.4 Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.8.1 Ensure That Microsoft Defender for Key Vault Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.9.1 Ensure That Microsoft Defender for Resource Manager Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.16 Ensure that Microsoft Defender External Attack Surface Monitoring (EASM) is enabledmicrosoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.1.17 [LEGACY] Ensure That Microsoft Defender for DNS Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
9.2.1 Ensure That Microsoft Defender for IoT Hub Is Set To 'On'microsoft_azureCIS Microsoft Azure Foundations v4.0.0 L2
18.5.14.1 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGONWindowsCIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker
18.5.14.1 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOLWindowsCIS Microsoft Windows 8.1 v2.4.1 L1 Bitlocker
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - NETLOGONWindowsCIS Microsoft Windows 8.1 v2.4.1 L1
18.5.14.1 Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication' and 'Require Integrity' set for all NETLOGON and SYSVOL shares' - SYSVOLWindowsCIS Microsoft Windows 8.1 v2.4.1 L1
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'WindowsCIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DC
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components...'WindowsCIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components'WindowsCIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DC
20.14 Ensure 'Automated mechanisms must be employed to determine the state of system components'WindowsCIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MS