klionht.blogg.se

Cis benchmark scripts
Cis benchmark scripts












cis benchmark scripts
  1. CIS BENCHMARK SCRIPTS PROFESSIONAL
  2. CIS BENCHMARK SCRIPTS FREE
  3. CIS BENCHMARK SCRIPTS WINDOWS

Image credit: Center for Internet Securityįor each group, you have a set of recommended actions or “to-do’s.” Using the tool you can report on whether the control is implemented, whether there is a policy backing the control, and you may indicate whether you have this control automated and reported to the business. The workbook goes into good detail on each of the 20 critical controls laid out by CIS, in three separate “Implementation Groups” (IGs). It’s wonderful, and I encourage you to check it out.

CIS BENCHMARK SCRIPTS FREE

One extremely valuable resource that I like to use is a free “Initial Assessment” tool published by AuditScripts. The best way to do this is to perform an initial assessment against a standardized and reputable security control framework such as the NIST Cyber Security Framework (CSF) or the Center for Internet Security (CIS).

cis benchmark scripts

In other words, you want to be able to highlight the risks that they are choosing to accept by not spending that extra money. Besides being able to paint a picture of “what good looks like” for stakeholders on a conceptual level, you also need to clearly illustrate the risks that their business faces. Please see this post for more details.Įspecially in the small and mid-sized enterprise space, it can be very difficult to persuade customers to spend additional money on their technology investments “because security.” Therefore, education is an important part of your job as an advisor in this area. See User Agreement for details.Note: I have updated this workbook to reflect changes in v8 of the CIS Controls framework. Such communications and work product are private and confidential. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. This IS includes security measures (e.g., authentication and access controls) to protect USG interests – not for your personal benefit or privacy.Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose.At any time, the USG may inspect and seize data stored on this IS.The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.Government (USG) Information System (IS) that is provided for USG-authorized use only.īy using this IS (which includes any device attached to this IS), you consent to the following conditions: SUSE Linux Enterprise Server 12 STIG Benchmark – Ver 2, Rel 3.Oracle Linux 7 STIG Benchmark – Ver 2, Rel 4.MS Internet Explorer 11 STIG Benchmark – Ver 1, Rel 16.

CIS BENCHMARK SCRIPTS WINDOWS

  • Mozilla Firefox STIG for Windows Benchmark – Ver 5, Rel 3.
  • Mozilla Firefox STIG for RHEL Benchmark – Ver 5, Rel 3.
  • McAfee VirusScan 8.8 Local Client STIG Benchmark – Ver 1, Rel 3.
  • Google Chrome Current Windows STIG Benchmark – Ver 2, Rel 4.
  • Canonical Ubuntu 18.04 LTS STIG Benchmark – Ver 2, Rel 3.
  • Adobe Acrobat Reader DC Continuous Track STIG Benchmark – Ver 2, Rel 1.
  • Sunset – Adobe ColdFusion 11 STIG – Ver 2, Rel 1.
  • Red Hat Enterprise Linux 7 STIG for Chef – Ver 3, Rel 4.
  • Red Hat Enterprise Linux 8 STIG for Ansible – Ver 1, Rel 3.
  • Red Hat Enterprise Linux 7 STIG for Ansible – Ver 3, Rel 4.
  • SUSE Linux Enterprise Server (SLES) 15 STIG – Ver 1, Rel 3.
  • SUSE Linux Enterprise Server (SLES) 12 STIG – Ver 2, Rel 4.
  • Red Hat Enterprise Linux 8 STIG – Ver 1, Rel 3.
  • Red Hat Enterprise Linux 7 STIG – Ver 3, Rel 4.
  • IBM zVM using CA VMSecure STIG – Ver 2, Rel 1.
  • General Purpose Operating System SRG – Ver 2, Rel 1.
  • Canonical Ubuntu 18.04 LTS STIG – Ver 2, Rel 4.
  • Apple macOS 11 (Big Sur) STIG – Ver 1, Rel 3.
  • Unclassified Operating System STIGs and Overviews:
  • Microsoft Windows 2012 Server Domain Name System STIG – Ver 2, Rel 3.
  • Microsoft Office System 2016 STIG – Ver 2, Rel 1.
  • Microsoft Office 365 ProPlus STIG – Ver 2, Rel 3.
  • Red Hat JBoss Enterprise Application Platform (EAP) 6.3 STIG – Ver 2, Rel 2.
  • Apache Tomcat Application Sever 9 STIG – Ver 2, Rel 3.
  • Adobe Acrobat Reader DC Continuous Track STIG – Ver 2, Rel 1.
  • CIS BENCHMARK SCRIPTS PROFESSIONAL

    Adobe Acrobat Professional DC Continuous Track STIG – Ver 2, Rel 1.














    Cis benchmark scripts