by Cody Dumont
September 9, 2014
Governance, Risk Management, and Compliance is a substantial part of any information assurance program. The GRC requires information systems to be audited, regardless of the standard to which the audit is performed. These reports provide the audit results for Adtran AOS, Cisco IOS, Dell Force10 FTOS, Extreme ExtremeXOS, HP ProCurve, Huawei VRP, and Juniper Junos.
One of the initial steps in a successful GRC program is to set configuration guidelines and establish a supportable set of security policies. Tenable.sc Continuous View (CV) can measure compliance, using audit files that cover a wide range of major regulations and other auditable standards. Tenable provides over 500 audit files, which are available for download from the Customer Support Portal, in categories such as operating systems, applications, databases, and network devices. Tenable products can be used to audit systems based on SCAP content, and many Tenable audit policies have been certified by the Center for Internet Security (CIS). For more information on using audit files, see the Nessus Compliance Checks: Auditing System Configurations and Content document.
The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessment. The report requirements are:
- Tenable.sc 4.8.1
- Nessus 8.5.2
- Compliance Data
Audit files can be customized to match the values defined in an organization’s corporate policies. The organization can review several audit files and then create a specific audit file that applies directly its policies. When an audit is performed, for each individual compliance check, Nessus attempts to determine if the host is compliant, non-compliant, or if the results are inconclusive and need to be verified manually. Unlike a vulnerability check that only reports if the vulnerability is actually present, a compliance check always reports a result. This way, the data can be used as the basis of an audit report to show that a host passed or failed a specific test, or if it could not be properly tested.
Tenable.sc CV is the market leader in providing a unique combination of vulnerability detection, compliance auditing, and reporting. Tenable.sc CV supports auditing more technologies than any other vendor including operating systems, network devices, hypervisors, databases, tablets, phones, web servers, and critical infrastructure. Nessus is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. This makes Tenable.sc CV the market-defining continuous network monitoring platform, and Nessus the market-defining vulnerability scanning for auditors and security analysts.
Adtran AOS Compliance Checks - Tenable.sc CV using Nessus has the ability to access APIs used to audit systems running the Adtran operating system (AOS). The Adtran AOS Compliance Checks include checks for password policy, enabled services, insecure service configuration, authentication, logging & audit settings, and SNMP & NTP configuration settings. Valid SSH credentials for root or an administrator with full privileges are required. More information about audit files can be found in the Tenable Discussion Forums, Customer Support Portal, Nessus Compliance Checks, and Nessus Compliance Reference.
Cisco IOS Compliance Checks - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Cisco IOS operating system. This compliance check can be run against a Saved, Running or Startup configuration. The compliance checks review the specified configuration and then report on the settings as specified in the info and item lines. The feature checks can also verify the IOS version, feature set, and use regex to parse out the configuration data. More information about audit files can be found in the Tenable Discussion Forums, Customer Support Portal, Nessus Compliance Checks, and Nessus Compliance Reference.
Dell Force10 FTOS Compliance Checks - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Dell Force10 FTOS system. Dell Force10 (FTOS) devices comprise a wide range of high-capacity switches. The Dell Force10 audit checks include password policy, enabled services, lockout policy, insecure service configurations, authentication related settings, SNMP & NTP configuration, and logging and audit settings. More information about audit files can be found in the Tenable Discussion Forums, Customer Support Portal, Nessus Compliance Checks, and Nessus Compliance Reference.
Extreme ExtremeXOS Compliance Checks - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Extreme ExtremeXOS. The Extreme ExtremeXOS audit includes checks for the password policy, banner configuration, inactivity timeout setting, logging & audit settings, insecure services, device license information, and SNMP settings. More information about audit files can be found in the Tenable Discussion Forums, Customer Support Portal, Nessus Compliance Checks, and Nessus Compliance Reference.
HP ProCurve Compliance Checks - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running HP ProCurve switches. The Tenable HP ProCurve audit file is based on an HP whitepaper on hardening ProCurve switches. The audit includes checks for disabling insecure services and enabling access control (e.g., TACACS, RADIUS). More information about audit files can be found in the Tenable Discussion Forums, Customer Support Portal, Nessus Compliance Checks, and Nessus Compliance Reference.
Huawei VRP Compliance Checks - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Huawei VRP operating system. The Versatile Routing Platform (VRP) software runs on a wide variety of routing and switching devices produced by Huawei. The audit checks include password policy, banner configuration, inactivity timeout, logging and auditing settings, insecure services, device and license information, and SNMP settings. More information about audit files can be found in the Tenable Discussion Forums, Customer Support Portal, Nessus Compliance Checks, and Nessus Compliance Reference.
Juniper Junos Compliance Checks - Tenable.sc CV using Nessus has the ability to access the APIs used to audit systems running the Junos and ScreenOS operating systems. The audit files for Juniper products support several audit checks, such as syslog settings, interface configuration settings, several authentication methods, and many more auditable settings. More information about audit files can be found in the Tenable Discussion Forums, Customer Support Portal, Nessus Compliance Checks, and Nessus Compliance Reference.